This application has been delevoped using the Xojo programming IDE and includes facilities that address the following:
Disk Drive Cataloguing: Records information about different volumes (physical and mapped drives), identifiable nodes (folders) and the files that reside in the latter. Recorded information includes soundex values relating to descriptive content and associated keywords that you can define for each of those catalogue elements.
Provides capacity to compare contents of two separate folders with options to complete standard tasks such as Delet/Copy/Replace for individual items plus Toolbox specific options to Archive elements in a number of configurable methods.
The average Windows device contains a mind boggling number of files, certainly many hundreds of thousands, with Windows containing more than 600,000 individual items. Personal content can easily match a similar number of items and this may seem daunting when contemplating the efforts that is likely to be required to initially generate the database content that might then deliver some degree of control and management for such a data set. As the saying goes "no pain, no gain" and only you can decide whether that may be an undertaking that would be of benefit to you.
I can personally atest that after undertaking the effort needed to catalogue my own laptop I was more than pleased to be able to identify files using search facilities based upon the descriptions and keywords that I had provided for my catalogued items. In my efforts I made extensive use of various export and import tools that are available in the Toolbox.
Text Message Encryption: Permits you to generate personally unique representations of text that might be communicated to another party with whom you have chosen to "share" the relevant encryption "key" that was used to convert plaintext into the generated ciphertext.
There are numerous reasons why you might wish to adopt such a level of security in relation to text based communications, such as email, but I suppose one prime incentive might simply be an ability to relay personal and confidential information hat you could be confident would not be useful to any party having an ability to access such communications on devices at either end of the "transmission" channel, which would in all likelihood include a security layer that offers protection whilst in transit.
Text To Speech: Interpret text and provide a spoken version to be relayed through the PC being used.
Morse Code: Translate text into morse code, and vice-versa, using a representation of the "dah" and "dit" characters. This facility also provides an ability for your PC to "transmit" an audible version of morse code.