|Wireless LAN PCI 802.11 b/g adapter WN5301A|
|Texas Instruments PCI-8x12/7x12/6x12 CardBus Controller|
Runasspc starts programs under another user account than the logged-in user.The application and the account information will be read from a secured crypt file, which built on command line with runasspc or the administrator interface runasspcadmin.
Each encrypted file receives his own password on runtime, created by the file itself, like a finger mark.
Before runasspc start the authorized application, the application will be checked on bit level (only exe and batch files).
Runasspc does not require an installation procedure. You only need to copy runasspc and a cryptfile on a computer to start it directly.
Runasspc can also be run without using a cyptfile. You can call runasspc with password in cleartext on commandline. It can be useful for tests.
computer, crypt file, programs, interface, application, information, encrypted file, password, command line, installation, Runasspc, batch files, credentials, created by, authorized, administrator, encrypted, the account, user account
Programs similar to Runasspc
|A2DCrypt 2048 Bits Encryption||March 04, 2010|
Encrypt files, folders and disks with a 2048-bit algorithm virtually unbreakable.
|File size: 1.84Mb||License: Shareware||Details|
|KaKa Folder Protector||November 22, 2012|
KaKa Foder protector is a powerful and easy-to-use program for protection
|File size: 1.44Mb||License: Freeware||Details|
|Wi-Fi WEP Key Generator||August 19, 2004|
Manage your Wi-Fi wireless easily with the Wi-Fi WEP Key Generator Utility
|File size: 2.05Mb||License: Shareware||Details|
|Advanced Encryption Package 2013 Professional||May 08, 2013|
128-2048 bit file encryption, secure file deletion, self-decrypting files
|File size: 6Mb||License: Shareware||Details|
Many organizations use disk image cloning to perform mass rollouts of Windows. This technique involves copying the disks of a fully installed and configured Windows computer onto the disk drives of other computers. These other computers effectively appear to have been through the same install process, and are immediately available for use. While this method saves hours of work and hassle over other rollout approaches, it has the major problem that every cloned system has an identical Computer Security...
|File size: 0.0498Mb||License: Freeware||Details|
|KeePass Password Safe Professional||September 08, 2012|
Store your passwords in single database locked with master key or key disk.
|File size: 1.7Mb||License: Freeware||Details|
|FoxCrypt File Protection standard||March 06, 2009|
Protect your sensitive files from revising or usurping by others.
|File size: 3.62Mb||License: Shareware||Details|
Skiffer software is used to encrypt information, primarily to be sent as e-mail. An add-in to Microsoft Outlook 2003 and 2007 is also available and makes it convenient to send encrypted messages from Outlook. Two accounts are available in the free version. You and the receiver of the messages must agree upon a key. After your first encrypted message, a computer-generated key can be assigned.
|File size: 1.5Mb||License: Freeware||Details|
|Advanced Folder Encryption||October 25, 2012|
Lock or Encrypt files, folders and drives in an easy and reliable way
|File size: 3.29Mb||License: Shareware||Details|
|Sage Password Recovery||October 10, 2006|
Recover your Sage Instant Accounts, Line 100, and Line 50 passwords.
|File size: 0.1491Mb||License: Shareware||Details|
removable media, wireless security, encrypter, file, ISP port blocking, protect, computer, helps, multiple, environments, file backup, information, hide ip, ssl tunnel, Password Protect, database, key, reset passwords, crypt, manage, receiver
VNT VT6656 USB-802.11 Wireless LAN AdapterNet driver
Adaptec AHA-151X/AHA-152X or AIC-6260/AIC-6360 SCSI Host Adapter (non-pnp)SCSIAdapter driver
Scientific-Atlanta WebSTAR 2000 series Cable ModemNet driver