|
||||||
|
||
|
Home > Lock file software |
Related keywords: file, lock, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
1. | AudioLabel CD/DVD Labeler 3.20 (audiolabel.com) | ||
from the Freedb internet database, CD-Text and CDPlayer.ini file. Our cd label creator can even read and label your MP3 CDs using the ID3 tag and filename. Unlike other cd labeling software, you'll never be locked into a particular brand of label paper. All popular brands are supported and even non-standard labels can be adjusted using the "Label Alignment Wizard" | |||
Updated: 2, 2006 | Rating: 228 | Author: Cripple Creek Software | Size: 3870 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
2. | InfoLock 1.51 (whimsysoft.com) | ||
can help you to encrypt your information. InfoLock can encrypt file or text(which entered by yourself or copy from clipboard). InfoLock use some very safe arithmetic to encrypt your information.Such as DES, which was put out by IBM and NSA. And InfoLock use special arithmetic to encrypt your text to make sure you can copy or send it by email with out any difficulty | |||
Updated: 8, 2004 | Rating: 101 | Author: Wei Zhang | Size: 692 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
3. | Mp3 Filter 4.2.4 (hardcoded.net) | ||
your collection is: Hard drives, Multiple Mp3 CDs, anything. The file comparison process, which basically compare filename's words between them, is completely customizable. Mp3 Filter also have tons of other features: * Profile driven scans. * Incredibly fast comparing engine. * Supports MP3, WMA, OGG, M4A/M4P (iTunes format). * Easy to use profile | |||
Updated: 2, 2006 | Rating: 1578 | Author: Virgil Dupras | Size: 1083 kb | Shareware Go to category: Audio & Multimedia > Audio File Players Similar programs | |||
4. | MP3Guard MP3 Protection 2.0 (zappersoftware.com) | ||
This program is for musicians who want to sell or distribute mp3 files online. This program will encrypt your mp3 files. This includes an MP3 player for playing the MP3 files. Users cannot copy your files. This program is ideal for musicians who wish to sell mp3 files online. This program works, optionally, with ShareGuard to provide a lock and key | |||
Updated: 9, 2005 | Rating: 48 | Author: William Bradshaw | Size: 4621 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
5. | RainbowGround 1.1 (desktopfay.com) | ||
brightness and contrast sliders. They also affect resulting image. Lock buttons are used to lock groups of sliders so that a) all sliders in the group are linked and moved together and b) locked sliders are not affected by Randomize button. Randomize button changes positions of | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Kozhinov | Size: 511 kb | Freeware Go to category: Graphic Apps > CAD Similar programs | |||
6. | Transparent Screen Lock for WinNT/2000/XP/2003 2.10 (e-motional.com) | ||
protect your workstation or server with Transparent Screen Lock while viewing programs that are running. Any attempts to access the system will display a message box to request the password. Prevent access via CRTL-ALT-DEL. Includes a log file to track activity and failed login attempts. Save log file locally or at a remote network location. Use quick-launch | |||
Updated: 9, 2005 | Rating: 370 | Author: Sandra Buckingham | Size: 562 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
7. | Virtual Flower 1.2 (homepage.ntlworld.com) | ||
of rustling leaves, or visit an island with exotic flowers. The files are extremely tiny, most are four or five KB, suitable for inclusion in 3D scenes. Uses the popular VRML format - get the Cortona plug in to view them, or embed in web page with a java applet such a Blaxxun. You can also make anaglyph flowers which spring into 3D when you view them using red/ blue anaglyph | |||
Updated: 9, 2005 | Rating: 0 | Author: Robert Walker | Size: 2063 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
8. | Zip Backup to CD 3.18 (dh.dk) | ||
Backup to CD is designed to backup your data files using the standard Zip file format, allowing backup files to be viewed and restored with most zip file utilities. Zip Backup to CD distributes the files to be backedup in several stand alone Zip files of a size fitting a standard CD (CD-R) or a size chosen by the user and writes it to CD/DVD | |||
Updated: 9, 2005 | Rating: 0 | Author: Rene Mogensen | Size: 946 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
9. | AGILITA-Client 1.5 (download.agilita.de) | ||
be programmed separately. Included is the ability of automatically locking a record, multilinguality and a user-/group- and authorization concept. Also supported by the client are different report generators, so that printing is already included. Documents can be printed, presented as a preview on the | |||
Updated: 9, 2005 | Rating: 0 | Author: Ralf Becker | Size: 3060 kb | Commercial Go to category: Business > Databases & Tools Similar programs | |||
10. | All Organizer 2.0 (allthesoft.com) | ||
easily and securely. With our leading concurrency record locking mechanism.DreamyStar Organizer can also be used to share workgroup or small business member's personal information through Local Area Network(LAN) environment. An All-In-One powerful information organizer specialize in Personal and workgroup information manage. It can manage all your Personal information | |||
Updated: 9, 2005 | Rating: 36 | Author: Jordan Smith | Size: 2986 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
11. | Computers Hall 2.11 (ruslan.odessa.ua) | ||
window which to remove it is impossible or the keyboard, a mouse is locked; · The program remembers and uses the price for 1 hour of games and 1 hour of the Internet; · Roundoff of the sum of payment; · Return of the rest of money; · From one sight it is visible, what computer is free, what occupied, how many minutes are necessary to work, how many has fulfilled and when will be | |||
Updated: 3, 2005 | Rating: 16 | Author: Ruslan Scherbatuk | Size: 1798 kb | Demo Go to category: Business > Other Similar programs | |||
12. | Dreamystar Organizer 2.8 (dreamysoft.com) | ||
business information manage. With our leading concurrency record locking mechanism.workgroup members can share data effectively and conviently..This Software can manage all your address book,schedule,Notes,to do,anniversary,eBook,ePhoto,finance and secrets.Supports Data Password Protect,Data | |||
Updated: 3, 2005 | Rating: 0 | Author: smartstone Lee | Size: 3014 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
13. | eBooksWriter PRO 2005.15.195 (visualvision.com) | ||
VisualVision's EBooksWriter you can create ebooks with ease. It's a professional all-in-one visual environment, not just a compiler! - you build compact self extracting ebooks with one click; - one ebook, one source file. All visual, no compilation, no coding, no complications...; - no royalties: you're free to redistribute your ebook / ebrochure over the Internet | |||
Updated: 2, 2006 | Rating: 89 | Author: Aldo Ghigliano | Size: 2460 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
14. | Enigma 2 (enigma.homestead.com) | ||
to Encrypt and store almost anything so that only you can access the files through a master password chosen by you. Of course, all or any of your Encrypted files can be restored to their original state any time you choose. You can even backup and restore the entire database to and from CD to ensure that you lose nothing even if your hard disk dies With Enigma, you can | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Lamb | Size: 7500 kb | Demo Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
15. | LoanAmortizer Standard Edition 3.1 (loanamortizer.com) | ||
Once any amortization schedule is prepared it can be saved in a file for future reference, comparison or archive. Everything is completed automatically, accurately and is easy and simple to be used and handled. Canadian Mortgage calculations are also implemented in LoanAmortizer Standard Edition, both for mortgage and regular loans. LoanAmortizer Standard Edition is one of the few | |||
Updated: 9, 2005 | Rating: 0 | Author: George Athannassov | Size: 1407 kb | Shareware Go to category: Business > Other Similar programs | |||
16. | Recall 4.0 (acastat.com) | ||
and keep a personal log of special events. Create multiple files for family members or establish a file for each type of application, such as home, work, hobbies, and school. Recall can also be used to keep a personal log of daily or weekly activities. Record observations of employee performance which are date stamped, collect incidence reports, or create your own | |||
Updated: 9, 2005 | Rating: 42 | Author: Phil Crewson | Size: 2639 kb | Shareware Go to category: Business > Other Similar programs | |||
17. | Time & Chaos 5.6.5 (ChaosSoftware.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 9, 2005 | Rating: 0 | Author: Bill Tiede | Size: 3756 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
18. | TurboNote 3.4 (turbonote.com) | ||
change note colours and sizes, have them ring alarms, print them, lock them and keep your screen uncluttered by hiding them. Notes even stay around when you turn your computer off. TurboNote's Quick Launch feature also lets you open Web addresses, programs and files which appear in notes, simply by double-clicking. Network support suits organisation-wide deployment and | |||
Updated: 9, 2005 | Rating: 1234 | Author: Peter Hyde | Size: 542 kb | Freeware Go to category: Business > Other Similar programs | |||
19. | TurboNote+ desktop sticky notes v6.0 (turbonote.com) | ||
Web and email addresses. Change note colors and sizes, set alarms, lock them and keep your screen uncluttered by hiding them. Use handy templates for common messages or make up your own style with optional rich text editing, transparency control and images. TurboNotes stay around when you turn your | |||
Updated: 2, 2006 | Rating: 173 | Author: Vicki Hyde | Size: 1616 kb | Shareware Go to category: Business > Other Similar programs | |||
20. | ACProtect standard 1.20 (ultraprotect.com) | ||
is an application that allows you to protect Windows executable files(PE files) against piracy. Using public keys encryption algorithms (RSA) to create and verify the registration keys and unlock some RSA key locked code. It has an Embedded Protector against file dumping and unpackers. It also has many anti-debug tricks with specialized API system. Mutual | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
21. | AidAim CryptoPressStream 1.00 (aidaim.com) | ||
LoadFromStream, LoadFromFile, SaveToStream, SaveToFile methods, Lock and Unlock methods for multi-thread usage. CryptoPressStream includes TCPSManager thread-safe component that provides an easiest setting of compression and encryption parameters, and contains a list of opened streams. CryptoPressStream contains TCPSManager visual component, Component Reference, 7 demos, License | |||
Updated: 9, 2005 | Rating: 0 | Author: AidAim Software | Size: 1062 kb | Commercial Go to category: Development > Delphi Similar programs | |||
22. | Anti Piracy Tools 2004 Professional 2.1 (logicsoftware.net) | ||
OK, or blocks given registration code, returning the reason for code lock-up. This way, it is easy to implement any type of licensing: from single copy usage only to multiple licenses per one registration code. What is actually a brilliant idea is that the client DLL can pass the server query result | |||
Updated: 3, 2005 | Rating: 29 | Author: Logic Software | Size: 845 kb | Shareware Go to category: Development > Other Similar programs | |||
23. | AntiCrack Software Protector Basic 1.09 (anticrack.us) | ||
exe compressor.You can use it to compress and protect your exe dll files step by step. AntiCrack Software Protector uses public keys encryption algorithms (RSA) to create and verify the registration keys and unlock some RSA key locked code,it has embedded cryptor against dump and unpacker | |||
Updated: 9, 2005 | Rating: 535 | Author: Lusi Chen | Size: 1429 kb | Shareware Go to category: Development > Other Similar programs | |||
24. | Code-Lock 2.35 (chosenbytes.com) | ||
pirates? Stop using your obsolete software protections. Code-Lock, an advanced, secure software protection system, will stop crackers in their tracks. Code-Lock, featuring CodeSecure Technology for Visual Basic, C#, VB.NET and Delphi applications, has never been cracked. It is time to keep crackers awake while you sleep in peace. A lot of shareware are cracked by | |||
Updated: 9, 2005 | Rating: 16 | Author: Ryan Thian | Size: 2721 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
25. | EXECryptor 2.3.7 (softcomplete.com) | ||
(12-16 characters). A serial number can be time-limited, may be locked to Hardware ID, can contain encrypted registration information such as license type, allowed features and other user defined information. It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely prevents | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
26. | FlowChart.NET 4.0.3 (nocache.mindfusion.org) | ||
include an alignment grid, shadow effects, scrolling and zooming, locking, z-order and pen styles. Several automatic layout algorithms, link routing and graphs analysis functions make FlowChart.NET even more useful. Diagrams can be stored in files, printed on paper, exported to image files, serialized in .NET streams such as memory buffers or network sockets. The | |||
Updated: 2, 2006 | Rating: 54 | Author: MindFusion Ltd. | Size: 4943 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
27. | FlowChartX control 4 (mindfusion.org) | ||
include an alignment grid; shadow effects; scrolling and zooming; locking; z-order; and pen styles. Diagrams can be printed, exported as image files, stored in OLE compound documents or in separate documents. The control's programming model comprises more than 600 methods, properties, and events. Full source code is available for purchase too, giving you unlimited | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 3787 kb | Commercial Go to category: Development > Active X Similar programs | |||
28. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
to generate an installation-specific Serial Number on the end-user's computer which can be unlocked with a corresponding Unlock Code. Using KeyedAccess means you can create shareware-type versions of your MS Access application where some functionality is locked and is only unlocked when the user enters a valid key. When using the Installation Serial Number and Unlock Code | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
29. | LLLib Licensing Library 2.04 (gppsoftware.com) | ||
is a Software Licensing Library, supplied as .DLLs and .LIB files for 32-bit development. Comprehensive help file including detailed API documentation. Examples in C/C++ and VB. Supports unregistered licenses, time limited licenses, run limited licenses and full registrations, product numbers, registration numbers, number of concurrent users, locking to a machine and | |||
Updated: 9, 2005 | Rating: 0 | Author: Graham Plowman | Size: 1856 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
30. | PC Guard for Win32 5.00 (sofpro.com) | ||
access to your application (EXE/DLL) with password. - Hardware locking! Lock your software to target computer. - Evaluation (trial) version feature! Easily create demo version of your software with execution and date limitations. - Secure distribution! Securely distribute your | |||
Updated: 9, 2005 | Rating: 48 | Author: Blagoje Ceklic | Size: 841 kb | Commercial Go to category: Development > Management & Distribution Similar programs | |||
31. | PE Corrector 1.84 (gigamindsystems.com) | ||
Corrector is very useful when you need to correct PE files. Such correction may be very necessary in this cases: - Some compilers do not clear memory before compilation. Because of this the new exe file may contain binary trash in the header. But also it may contain even your personal security data from your disks (passwords, for example). PE Corrector can correct this | |||
Updated: 9, 2005 | Rating: 0 | Author: GigaMind Systems | Size: 630 kb | Shareware Go to category: Development > Source Editors Similar programs | |||
32. | QVCS-Enterprise 1.2.10 (qumasoft.com) | ||
and a custom Ant task to support scripting. See at a glance which files are checked out, which files have changed since check out, who most recently changed a file, etc. Perform common operations like check in or check out with the click of a button. Supports both text and binary | |||
Updated: 2, 2006 | Rating: 0 | Author: Jim Voris | Size: 2652 kb | Shareware Go to category: Development > Other Similar programs | |||
33. | ShareGuard Copy Protection 3.6 (zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 11474 kb | Shareware Go to category: Development > Other Similar programs | |||
34. | ShareGuard V1 1 (zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
35. | SoftwareShield System 2.4.10.17 (softwareshield.com) | ||
- A time limited license used for evaluation purposes. The Trial's functionality may be less than the standard product in which case this is a combined demo/trial. The day of expiration is generally set on the day the license is issued. Alternatively, the demo may expire after a certain number of days after installation or after it has been used a certain number of times - or | |||
Updated: 9, 2005 | Rating: 0 | Author: Zack Wickes | Size: 9037 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
36. | SQLExecMS 2.6 (laplas-soft.com) | ||
server performance counters;Check utilization of proc cache;Watch locks; Review space used by DB files, tables and indexes; Manage DB file and filegroups;Turn on and off trace flags;Manage scheduled jobs; Change SQL server and database options;Backup and restore databases; Analyze | |||
Updated: 2, 2006 | Rating: 433 | Author: Oleg Dantchenko | Size: 4928 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
37. | Copysafe Pro 2.0 (artistscope.com) | ||
not able to copy the images in any way. Options include Domain Lock, targeted hyperlink on the image, several display options, status messages, picture frames, batch file import and processing, multi-registry for use on several domains, import images by the folder and batch process more than | |||
Updated: 9, 2005 | Rating: 42 | Author: William Kent | Size: 3722 kb | Demo Go to category: Web Development > HTML Tools Similar programs | |||
38. | Instant ThumbView Free Edition 1.0 (contextmagic.com) | ||
But you have to start the program to browse and view any individual file. In the latest Windows versions Explorer can be switched into the Thumbnail view too. That is fine. But it can be a pain, if you are looking for one small image or just have to look at couple of files. Instant ThumbView | |||
Updated: 3, 2005 | Rating: 207 | Author: ContextMagic.com | Size: 198 kb | Freeware Go to category: Graphic Apps > Viewers Similar programs | |||
39. | Secure Image Express 4.0 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 2, 2006 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
40. | Secure Image Free 2.2 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 4206 kb | Freeware Go to category: Web Development > HTML Tools Similar programs | |||
41. | Secure Image Pro 4.0 (artistscope.com) | ||
the images on your web site and CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
42. | Zoner GIF Animator 4 (zoner.com) | ||
frame-refresh methods, easy definition of animation borders and its locking, frame printing, optimization of output file to shorten Internet loading times, direct access to the bitmap editor from the program environment, intuitive user interface. Zoner GIF Animator 4 is powerful tool for | |||
Updated: 9, 2005 | Rating: 42 | Author: Ales Hasala | Size: 5754 kb | Shareware Go to category: Graphic Apps > Animation Tools Similar programs | |||
43. | AllDay 7.0.1 (calcom.de) | ||
AllDay v7.0 is a calendar for year overviews. Gregorian, Julian, Jewish and Islamic calendar systems are supported. The application computes holidays, times of sunrise, sunset, moonrise, moonset and moon phase as well as number of day in year, number of week in year, julian day number, remaining days in year | |||
Updated: 3, 2005 | Rating: 16 | Author: Ulrich Hilger | Size: 1507 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
44. | .IRC 1.1 (joher.com) | ||
SOCKS4-5/HTTP Proxy, Notify/Ignore/Tree/Transfers/Browser/Files/Raw/Events/URL windows, Full Layout/Color/Font Customization, Opacity/Transparency support, Auto OnStart/Connect/Reconnect/OnConnect/Join/Rejoin/OnJoin/Away, Logging, Filtering, Sounds, Alarms, Locking, Aliases, Timers, Variables, Readable/Editable Config/Menu Files. Full Featured Windows .NET IRC | |||
Updated: 9, 2005 | Rating: 0 | Author: Jean-Hugues ROYER | Size: 644 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
45. | 12Ghosts Wash 7.10 (12ghosts.com) | ||
information. Removes history, cookies, temporary cached files, and the typed-address list of Internet Explorer, AOL, MSN, Netscape Navigator, and Opera. Many Windows options, as well as most-recently-used menus are wiped. It even deletes locked files (files that are in use, for example those ominous "index.dat" files). 12-Wash queues deletion for | |||
Updated: 9, 2005 | Rating: 232 | Author: Philip Ahrens | Size: 1500 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
46. | Ad-Rage 2003 1.0 (winguardpro.com) | ||
your programs, files and web pages all in one easy to use program. Give yourself peace of mind from people tampering with your PC with WinGuard Pro 2003 - Free Edition, stop people changing your settings, accessing unauthorized programs, and important files. Best of all it's completely FREE! Ad Rage 2003 is a popup window killer like no other. It requires no | |||
Updated: 3, 2005 | Rating: 149 | Author: Paul H | Size: 278 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
47. | Advanced Email Verifier 5.15 (glocksoft.com) | ||
Text (.CSV), HTML, Word, Lotus 1-2-3, QuattroPro, XML, MS Access files, and DBISAM tables (.dat files). You can also connect to the database on your disk and verify the email addresses directly from the database. AEV helps you maintain your mailing list clean and decrease the Internet traffic keeping you from sending undeliverable messages that cause a ping-pong of useless | |||
Updated: 2, 2006 | Rating: 42 | Author: Alex Markov | Size: 4148 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
48. | ArtistScope CD 2.0 (artistscope.com) | ||
content into an encrypted archive, combining all your data and image files into a single file. That archive will run similar to a mini web server and run from anywhere, from the user's hard-drive or CD. Almost anything that you can run on your web site can be run on ArtistScope CD. With a | |||
Updated: 9, 2005 | Rating: 101 | Author: William Kent | Size: 3943 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
49. | Atomic Newsgroup Explorer 1.40 (atompark.com) | ||
list of e-mail addresses using ANE! The list can be saved to a file, Windows Clipboard or MS Word or MS Excel application. Atomic Newsgroup Extractor does not depend upon any additional software the way many email grabbers depend on third-party libraries. The most important feature of ANE is an availability to work with private newsgroups locked by password and servers | |||
Updated: 2, 2006 | Rating: 42 | Author: Evgeny Medvednicov | Size: 1175 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
50. | Atrise HTMLock 1.12.0 (atrise.com) | ||
site, CD, DVD, or hard drive. You can password protect HTML and text files. The program is based on JavaScript technology, so it works virtually anywhere. The user-friendly wizard helps you to encrypt HTML and text files in just a few clicks. As the result you get a single HTML file | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Revvo | Size: 652 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
51. | Easy File & Folder Protector 4.14 (softstack.com) | ||
files and folders situated on local media of Windows 95/98/ME/NT/2000/XP with Easy File & Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File & Folder Protector has an easy-to-use user interface allowing you to allocate access to your files and folders | |||
Updated: 2, 2006 | Rating: 46 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
52. | Encrypt HTML source 2.03 (encrypt-html.com) | ||
text selection/copying, clipboard, and offline usage of encrypted files. Add referrer check (domain lock), encrypt HTML formatted emails, and compress html code. Hide HTML source from email spiders and site rippers. Encrypt HTML source will also keep away all web content filters and other censor software - they will not be able to analyze your web site and block it - this may | |||
Updated: 9, 2005 | Rating: 128 | Author: Robert Davies | Size: 2092 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
53. | FineBrowser 3.2.25 (finebrowser.com) | ||
You can change the order of the window tabs by using drag&drop, lock the important windows from accidental close and rename them with ease. The powerful bookmarks manager offers advanced management features, personal page ratings, comments, grouped favorites and more. FineBrowser is designed to work with image archive, wich is organized by the program using different sources | |||
Updated: 2, 2006 | Rating: 76 | Author: Alex Akimov | Size: 3415 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
54. | FineBrowser Free 3.2.24 (finebrowser.com) | ||
You can change the order of the window tabs by using drag&drop, lock the important windows from accidental close and rename them with ease. The powerful bookmarks manager offers advanced management features, personal page ratings, comments, grouped favorites and more. FineBrowser is designed to work with image archive, wich is organized by the program using different sources | |||
Updated: 2, 2006 | Rating: 16 | Author: Alex Akimov | Size: 3958 kb | Freeware Go to category: Network & Internet > Browsers Similar programs | |||
55. | G-Lock EasyMail 4.62 (glocksoft.com) | ||
G-Lock EasyMail was developed to help people run and manage mailing lists, newsletters, announcement lists and customer updates. G-Lock EasyMail is a powerful group mailer which sends your message directly from your outbox to the recipient's mail server (without using any ISP's SMTP server). Program supports multi-threaded delivery, and so works several times | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3281 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
56. | G-Lock EasyMail Professional 4.62 (glocksoft.com) | ||
and subject lines via its powerful mail-merge function. EasyMail Pro's distinctive voicemail capability also lets you add audio content to your messages. Supporting a wide range of compression formats, you can even set the recording to start playing when the mail is opened. HTML and Multi part (MIME) | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3324 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
57. | G-Lock Email Processor 1.98 (glocksoft.com) | ||
any data from the message body and message header and save it to a file of user definable format. Using Email Processor you are also able to send a text or HTML message to your recipients as well as forward the message you received to another email address. The program can be easily set up to | |||
Updated: 2, 2006 | Rating: 119 | Author: Alex Markov | Size: 2601 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
58. | Huey PC Remote Control 5.5 (gidsoftware.com) | ||
loss of screen resolution; Reasonable usability at 56k modem speeds; File transfer; Clipboard transfer; User definable hotkeys; User definable IP Port; Proxy socks support; Full screen mode; Login, logout or lock your computer remotely; Data compression; Optional Full Encryption; Swap mouse buttons for left handed users; Thin installation (1 x Client file, 3 x server | |||
Updated: 2, 2006 | Rating: 0 | Author: Glen Dean | Size: 1212 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
59. | Hyper Maker HTML 3000.27 (bersoft.com) | ||
pages, linked images, and sounds in a single, encrypted, compressed file. Your creations can include .gif, .bmp, .jpg, and .png graphics; .avi movies; TrueType fonts; and .wav and .mid sound files. A royalty-free setup/viewer program (with a Web browser look-and-feel and multilanguage support) | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Bernardo | Size: 2606 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
60. | IE Pets 1.0.0.1 (enjoysoft.com) | ||
needs together and give you single click ease of use. The Break Pet locks your browser from prying eyes. The Clean Pet consolidates the most common cleanup functions for Internet browsing and keeps your cookies and temporary Internet files where they should be, gone. The Library Pet gives you | |||
Updated: 9, 2005 | Rating: 0 | Author: Kurt Diesch | Size: 378 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
61. | Intelligent Mailbook 3.1.5 (i-mailbook.info) | ||
databases: never loose mail messages because of one damaged system file! Intelligent Mailbook can rebuild its internal e-mail databases from scratch, might they get damaged. In other e-mail programs this usually results in total-loss of all messages! If new mail is received, the Scroll-Lock | |||
Updated: 3, 2005 | Rating: 0 | Author: Barry Matinus | Size: 4626 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
62. | Cyber Internet Cafe Software - Internet Caffe 4.9.5 (antamedia.com) | ||
for cafe owners - it provides full billing and income control, locks unused computers, generates detailed reports and statistics and supports different password protected employee accounts. Process payments quickly and efficiently and improve your business with various reports and statistics. Low price, beautiful interface, user friendly, feature rich, suitable for Internet and | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladan Antanasijevic | Size: 2567 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
63. | Lock Webpages 2003 1.0.2 (winguardpro.com) | ||
Lock Web Pages can lock out internet sites that you do not want users accessing. It comes with some websites build-in that block sexually explicit content, and you can add more of your own. It can also stop people installing new programs on your computer, and has the option to block popup | |||
Updated: 3, 2005 | Rating: 0 | Author: paul hull | Size: 560 kb | Commercial Go to category: Network & Internet > Other Similar programs | |||
64. | Netvester 2002 1.2 (netvester.com) | ||
the World Wide Web is filled with a huge amount of pictures. What's worse is knewing web addresses that contain countless pictures you have to click on if you want them (apart from all annoying popups, long loading time of websites). Netvester 2002 takes over the downloading of all pictures! You know web sites that are filled with countless pictures or galleries? Try out Netvester | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Schaefer | Size: 4342 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
65. | Instant Remote Control 2.2.9 (omniquad.com) | ||
multiple licenses-requires to be installed only on the administrator's computers used to control other PCs-a single license can support large networks-no warning displayed at remote end-creates a tree of all computers on your network automatically-manually enter IP details and access PCs not listed as well-works by sending a preconfigured host to a would-be host machine-the host | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Sobstel | Size: 2341 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
66. | MyPadlock 1.4 (pages.prodigy.net) | ||
you can see, security 'you' control. For text communication and file encryption get MyPadLock. Encryption keys are not random - you choose the keys to lock your information and you can change the keys as often as necessary. Keys are not saved in the secured information. If fact, your keys are not on your computer at all. They're in your head or wherever you wrote them | |||
Updated: 9, 2005 | Rating: 0 | Author: Don Kreuzberg | Size: 3264 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
67. | PrivacyDefence 1.3 (privacydefence.com) | ||
programs and system tracks without breaking their functionality, it's fully customizable and supports 18 programs. Left as is, unwanted system logs can seriously impair your confidentiality because all your Internet activity can be easily recovered: Web pages you've viewed, pictures you've opened | |||
Updated: 9, 2005 | Rating: 0 | Author: MCMK Corp. | Size: 1594 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
68. | Private Shell SSH Client 2.1 (privateshell.com) | ||
CVS, VNC, e-mal clients and other software). Private Shell's default configuration allows you to connect to any SSH1 or SSH2 server in the most secure way by choosing the strongest encryption algorithms supported by a remote computer. Full support for ssh tunneling and X11 forwarding. Use built-in Secure FTP client (SFTP client) to transfer files between computers | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
69. | SAV-MailChecker Pro 1.1 (sav-soft.com) | ||
following ways: -Show a message -Play a sound -Blink with Scroll Lock led on your keyboard -Run a program -Show the number of messages on TaskTray and change it’s icon If you receive large amounts of e-mail messages and you need to keep track on new messages on a regular basis without launching (or running on background) a massive mail-client software – then | |||
Updated: 3, 2005 | Rating: 0 | Author: Aleksey Shevchenko | Size: 321 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
70. | Shoot The Messenger! 1.03 (zatz.com) | ||
your own business. And bam! Suddenly something weird shows up. It's not an email. You're not even browsing the Web, so you know it's not one of those annoying Web pop-ups. What the heck is it? Someone just stuck an ad in the middle of your screen. Shoot The Messenger's an amazing little program. It's the sheriff that completely bans those bad boys from ever | |||
Updated: 8, 2004 | Rating: 0 | Author: David Gewirtz | Size: 3511 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
71. | IE Lock 1.02 (simpliciti.biz) | ||
Lock works right on your desktops, blocking any attempts at inappropriate browsing before they reach the network. IE Lock reduces or eliminates the need for expensive server side hardware and software solutions. IE Lock's "Allow List" ensures your employees gain access to | |||
Updated: 9, 2005 | Rating: 0 | Author: dave campbell | Size: 500 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
72. | SourceGuardian PHP Encoder 5.5 (sourceguardian.com) | ||
Main feature list: + Full Bytecode Encryption - protect your files by removing the original PHP Source Code + Fully encode and deploy for PHP5 (and PHP4) + Choice of Windows/Linux/Mac OS X encoding clients + Command line encoder available now + Encrypt to domain name + Encrypt to IP + License generator for encoded scripts + Easy to use Wizard interface and | |||
Updated: 2, 2006 | Rating: 174 | Author: Sales Department | Size: 3580 kb | Demo Go to category: Web Development > ASP & PHP Similar programs | |||
73. | Spam Trapper for Outlook 1.3.3 (brigsoft.com) | ||
messages will be lost. Additional option makes Outlook to play Mp3 files and other media files. (*) Spam Trapper does not work with Outlook Express. Spam Trapper is a multilevel spam filter for Microsoft Outlook version 2000 and later. It is a plug-in component with clear convenient | |||
Updated: 9, 2005 | Rating: 0 | Author: Rest Alex | Size: 493 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
74. | TZ Privacy Guard 3.1.0.0 (trackzapper.com) | ||
History, favorite's folders and private information: passwords, credit card numbers, social security number etc. ; can expose a lot of your private information that you would like to protect. Also, Personal interests sites, banking information, stocks you monitor on line bidding, and aucations you are tracking, your surfing habits both on and off the web. this information can be | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 4266 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
75. | VShell 2.2.4 (promaxum.com) | ||
Control Lists allow you to assign the right mix of shell access, file transfer, and application data tunneling to users and groups. Centralized server configuration, options for Kerberos via GSSAPI, end user public-key upload, and triggers for automation of routine tasks reduce hassles for busy system administrators. Integrate this strong security with your existing infrastructure | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 3703 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
76. | Watch Right 2002.0.77 (bpssoft.com) | ||
concerned parent with the ability to "keep an eye" on their child's online activities. Automatically log your child's instant messages, chatroom conversations, email messages, message board postings, and web sites they visit while online. Â Watch Right is designed to work invisibly in the | |||
Updated: 2, 2006 | Rating: 0 | Author: Bradley O'Keefe | Size: 2842 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
77. | Without A Trace Surf Guard 5.91 (tekeffect.com) | ||
today's society it is becoming a daily routine that employee's are being fired for surfing the internet, professors are being arrested after their hard drives are examined and/or husbands and wife's become bitter or divorced after the browser history is revealed. Our Without A Trace Surf | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 4027 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
78. | X2Net WebCompiler 3.0.0.49 (x2net.com) | ||
powerful HTML Compiler produces .exe files for distribution from groups of HTML pages. Built-in ultra fast searching, favorites and history management, page protection, passwords, kiosk mode,form processing etc. Built-in installer/uninstaller, powerful encrytion. System locking to restrict | |||
Updated: 2, 2006 | Rating: 0 | Author: X2Net Staff | Size: 4957 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
79. | Clipboard Express Pro 3.2.7 (cheqsoft.com) | ||
Tray Iconic left and right click functioning Displays the clipboard's contents for easy reference. Counts characters in the clipboard memory automatically - just click the form and it does the rest! Use Clipboard Express Pro as temporary or permanent storage. Includes 150 storage locations. Each | |||
Updated: 9, 2005 | Rating: 137 | Author: David Hingston | Size: 3845 kb Go to category: System Utilities > Clipboard Tools Similar programs | |||
80. | 12Ghosts Shredder 7.10 (12ghosts.com) | ||
files, drag and shred, DoD conform, Wipe Disk. Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover files from your disk! Nobody will even find out the previous name or file size. The file can be overwritten several times with random bits so that even the | |||
Updated: 9, 2005 | Rating: 251 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
81. | 1Lock 1.4 (atma-software.com) | ||
files for burning on a CD, or for download, or add a serial number to your own setup program. Strong encryption. 1Lock operates in 3 modes: Encrypted CD, single self-extracting setup, and as a front-end for your own setup program. Language support for languages other than English. Features: -AES (Rijndael) 256 bit encryption -Customized graphics and text for setup program | |||
Updated: 9, 2005 | Rating: 360 | Author: Mark Snegg | Size: 860 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
82. | 1st Evidence Remover 2.14 (getfreefile.com) | ||
you use Windows, open folders, search for files and see pictures, work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use and the | |||
Updated: 2, 2006 | Rating: 190 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
83. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents anybody to run the program and change settings and uninstall the program. The 'Import/Export' function helps you set up the same settings on | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
84. | 1st Screen Lock 6.14 (softheap.com) | ||
Screen Lock is a password-protected desktop security utility that lets you lock your desktop with a password on boot, or at the time you are leaving your PC. You can use the built-in spy utility that works in background and enables you to spy on your PC users by fixing all user moves in a log | |||
Updated: 2, 2006 | Rating: 479 | Author: Ixis Ltd | Size: 1106 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
85. | 1st Security Agent Pro 6.14 (softheap.com) | ||
from editing your Favorites, disable downloading and installing files from the Internet, disable individual tabs in the Internet Options dialog, as well as specific settings from each tab. 1st Security Agent Pro allows you to import and export PC security settings, and offers a flexible and complete password protection. The program is very easy-to-use, excellent online help is | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
86. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents anybody to run the program and change settings and uninstall the program. The "Import/Export" function helps you set up the same settings on | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
87. | Access Administrator 4.14 (softheap.com) | ||
your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
88. | Access Administrator Pro 4.14 (getfreefile.com) | ||
Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives you a lot of abilities to allocate access to your files and folders | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
89. | Access Administrator Pro 4.14 (softheap.com) | ||
Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives you a lot of abilities to allocate access to your files and folders | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
90. | Active Backup Expert 1.92 (backuptool.com) | ||
easily mastered tool maintains backups of files in zip or cab format on hard and removable disks (CD, Zip drives etc.), in a LAN or WAN. A Wizard guides you through the steps of the backup-set creation: supplying the paths and filters for the included and excluded files, specifying the storage | |||
Updated: 2, 2006 | Rating: 16 | Author: Andrey Panichkin | Size: 1531 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
91. | Active Backup Expert Pro 1.92 (backuptool.com) | ||
creates automated zip- or cab-format backups of local and network files on hard disks, CDs and other removable devices, local network or FTP site. A Wizard guides you through the steps of the backup-set creation: selecting the folders and filters for included and excluded files, specifying the | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Panichkin | Size: 2582 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
92. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at your monitor and he has it all! Introducing Active Screen Lock, the unique security application by DMVSoft, allowing you to do whatever you want to do when you are away from the computer without having to worry a second. Active Screen Lock operates as | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
93. | Advanced Desktop Shield 1.63 (softstack.com) | ||
and desktop layouts of your users. Desktop layouts are saved to files, which include all files and folders located on the desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout or desktop layouts of your users, every time you or your users reboot your PC, the program will return everything on the desktop back | |||
Updated: 2, 2006 | Rating: 99 | Author: IM Soft | Size: 833 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
94. | Advanced Hide Folders 4.6 (hide-folders.biz) | ||
Hide Folders enables you to completely hide folders and files on your computer. The hidden files cannot be accessed unless the folders are unlocked with a password from within the program. You can simple drag and drop folders from Windows or add files by mask (e.g hide all .jpg files). In addition, as an added security measure, you can also lock the | |||
Updated: 9, 2005 | Rating: 81 | Author: Otto Schulz | Size: 258 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
95. | Advanced PDF Password Recovery Pro 2.21 (elcomsoft.com) | ||
protected Adobe Acrobat PDF files, which have "user" and/or "owner" passwords set, preventing the file from opening or editing, printing, selecting text and graphics etc. If only "owner" password is set, password recovery is not needed at all, but the file is being decrypted instantly (so all restrictions are being removed). "User" password can be recovered using | |||
Updated: 9, 2005 | Rating: 1485 | Author: Vladimir Katalov | Size: 1551 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
96. | Akala EXE Lock 3.20 (zero2000software.com) | ||
to your computer then I'd bet that there are certain programs and files you don't want others accessing. There are a multitude of options on how to go about doing this. There are encryption programs, programs that restrict access to portions of your computer, programs that make your files invisible. You get the general idea. A novel approach to the problem lies in Akala EXE | |||
Updated: 9, 2005 | Rating: 158 | Author: Zero Lee | Size: 1152 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
97. | Amiasoft Password 3.3.6.22 (amiasoft.com) | ||
registration, Configurable timeout function for unattended program lock-up, Ability to copy username and password to clipboard without entering that particular record, Ability to clear clipboard from within program and upon program exit, Full program help files. Download your trial copy and discover how it can make your life easier today! A tool to help ease your web-based | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Kidd | Size: 713 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
98. | AppsProtector XP 2.1 (ax-soft.com) | ||
XP allows you to put a lock on a program file, such as a game, or your office software. The program icon is replaced with that of a padlock, and, when the program is run, it will first ask for the password. The password must then be typed in correctly before the program will run. Easy to use and quick to work, this program has limitless possibilities. Stop your kids | |||
Updated: 8, 2004 | Rating: 243 | Author: Moser Damien | Size: 1601 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
99. | Asmw PC-Optimizer pro 7.6 (asmwsoft.com) | ||
and optimization utility to tune up windows performance. Remove junk files and zero size files to save valuable disk space; Registry Cleaner, to prevent application crashes;backup and restore backup; popup killer; Startup Manager, to prevent spy applications from running behind your back; erase | |||
Updated: 2, 2006 | Rating: 264 | Author: Asmw Soft Systems | Size: 6400 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
100. | Backup4all 3.0 (backup4all.com) | ||
removable media (such as USB drives). Backup4all can backup open/locked files and it can perform full, differential, incremental and mirror backups. When defining a backup you can also set file filters and schedule the backup for automatic execution. Once a backup is performed, you can see what files have been changed since the last backup or you can read the | |||
Updated: 2, 2006 | Rating: 24 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Lock file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|