Encrypted fileDirect useThis is a novel software integrating encryption technology with decryption technology, It can set password for any files and... | |
Download |
Encrypted fileDirect use Ranking & Summary
Advertisement
- License:
- Shareware
- Publisher Name:
- Copyright 2000-2010 MagicFile Co.Ltd.
- Publisher web site:
- File Size:
- 6.12 MB
Encrypted fileDirect use Tags
- CounterSign technology Password decryption Scanning Technology Assistive Technology peer2peer technology Virtualization Technology stream technology technology advertising technology COM Technology IntelliDraw technology Avoid Attack Technology IE password decryption restore technology VXA technology technology advisor Technology Guide search technology recognition technology encryption technology sattelite view technology SpiraClock technology technology architecture New Technology harmonium technology victorian technology OGRE rendering technology language integrating visualization technology technology screensaver Spread Spectrum technology Development Technology technology education science technology science and technology Technology Hobbies and Education Law Technology Useful Technology Integration .NET technology information technology GIS technology networking technology
Encrypted fileDirect use Description
This is a novel software integrating encryption technology with decryption technology. The features of this software can be concluded as follow: (1) Base on the encryption engine of microsoft,the software with mandatory encryption technology can be applied to all types of documents, and the encrypted document is stored in a special format. (2) With the correct password, the encrypted document will be directly executed without decrypting as another file stored in the hard disk. Especially, execution of the encrypted document does not depend on this software. In other words, the encrypted document can be executed in the computers without installed this software. (3) After executing, the encrypted document still remains the encrypted state. (4) The encrypted document even can be set the number of executions. Once reaching the number, the encrypted document will be automatically deleted. It is an effective measure to ensure document's security. Requirements50M disk space
Encrypted fileDirect use Related Software