FILES RASPS

Brand Owner (click to sort) Address Description
"SUPERIOR" NICHOLSON FILE COMPANY PROVIDENCE, R.I. FILES AND RASPS;
4 IN HAND COOPER INDUSTRIES, INC. Houston TX FILES AND RASPS;
AMERICAN COOPER INDUSTRIES, INC. Houston TX FILES AND RASPS;
AMERICAN FILE WKS. AMERICAN BRAND NICHOLSON FILE COMPANY PROVIDENCE, R.I. FILES AND RASPS;
ARCADE COOPER INDUSTRIES, INC. Houston TX FILES AND RASPS;
BLACK KING WALLACE-MURRAY CORPORATION Indianapolis IN FILES AND RASPS;
BLACK KING REX FILE COMPANY, THE NEWCOMERSTOWN OH FILES AND RASPS;
C. O. OBERG & CO. C.O. OBERG & CO:S AKTIEBOLAGET ESKILSTUNA, SWEDEN. FILES AND RASPS;
DELTA CARVER FILE COMPANY NOS. 3227-3233 FRANKFORD AVENUE AND PHILADELPHIA PA FILES AND RASPS;
DELTA CLEMSON BROS., INC. 22 COTTAGE ST. MIDDLETOWN NY 10940 FILES AND RASPS;
EAGLE NICHOLSON FILE COMPANY PROVIDENCE, R.I. FILES AND RASPS;
FISCHER ST. EGYDYER EISEN-UND STAHL-INDUSTRIE GESELLSCHAFT ELISABETHSTRASSE 14 VIENNA, AUSTRIA FILES AND RASPS;
GOLD MEDAL HENRY DISSTON & SONS, INCORPORATED FILES AND RASPS;
KEARNEY & FOOT CO. K & F KEARNEY & FOOT COMPANY FILES AND RASPS;
MAPLE LEAF NICHOLSON FILE COMPANY PROVIDENCE, R.I. FILES AND RASPS;
NICHOLSON FILE CO. PROVIDENCE, R.I. MADE IN U.S.A. PATENT INCREMENT CUT WARRANTED AND MADE FROM BEST FILE STEEL Nicholson File Company 23 Acorn Street Providence RI FILES AND RASPS;
PANSAR C.O. OBERG & CO:S AKTIEBOLAG ESKILSTUNA, SWEDEN. FILES AND RASPS;
ROYAL APEX BRANDS, INC. 1000 Lufkin Road Apex NC 27539 FILES AND RASPS;
THE ARCADE FILE WORKS WARRENTED FILES AND RASPS ANDERSON, IND. U.S.A. ARCADE FILE WORKS FILES AND RASPS;
VICTOR ARCADE FILE WORKS ANDERSON IN FILES AND RASPS;
WEED'S SPECIAL FILE AND HANDLE THE ARCADE FILE WORKS ANDERSON, IND. WEED'S IMPROVED CUT SPECIAL TEMPER ARCADE FILE WORKS FILES AND RASPS;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An encrypted file system that uses the encryption of files in a computer to restrict access to the files. Encrypted files are associated with a user. A decryption key is required in order to allow changes to be made to any of those files. Other files, such as those files which are less sensitive, may be unencrypted, and may be accessed even when the user is unavailable. These files may be read only files. A duplicate decryption technique may be allowed to allow access to the files, if the decryption key becomes unavailable. Certificates can verify access to the different files.