|
||||||
|
||
|
Home > Lock file software |
Related keywords: file, lock, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
101. | FlowChart.NET 4.0.3 (mindfusion.org) | ||
include an alignment grid, shadow effects, scrolling and zooming, locking, z-order and pen styles. Several automatic layout algorithms, link routing and graphs analysis functions make FlowChart.NET even more useful. Diagrams can be stored in files, printed on paper, exported to image files, serialized in .NET streams such as memory buffers or network sockets. The | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 4943 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
102. | FlowChartX control 4 (mindfusion.org) | ||
include an alignment grid; shadow effects; scrolling and zooming; locking; z-order; and pen styles. Diagrams can be printed, exported as image files, stored in OLE compound documents or in separate documents. The control's programming model comprises more than 600 methods, properties, and events. Full source code is available for purchase too, giving you unlimited | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 3787 kb | Commercial Go to category: Development > Active X Similar programs | |||
103. | FlowChartX control 4 (nocache.mindfusion.org) | ||
include an alignment grid; shadow effects; scrolling and zooming; locking; z-order; and pen styles. Diagrams can be printed, exported as image files, stored in OLE compound documents or in separate documents. The control's programming model comprises more than 600 methods, properties, and events. Full source code is available for purchase too, giving you unlimited | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 3787 kb | Commercial Go to category: Development > Active X Similar programs | |||
104. | FlowChartX control 4 (mindfusion.org) | ||
include an alignment grid; shadow effects; scrolling and zooming; locking; z-order; and pen styles. Diagrams can be printed, exported as image files, stored in OLE compound documents or in separate documents. The control's programming model comprises more than 600 methods, properties, and events. Full source code is available for purchase too, giving you unlimited | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 3787 kb | Commercial Go to category: Development > Active X Similar programs | |||
105. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
106. | Folder Security Personal 3.5 (y0ys.com) | ||
Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only ,preventing modification or deletion by other users or programs. The program can also lock Floppy, CDrom, USB sticks, and other removable drives or make them read-only. It works with drive of all of FAT/FAT32/NTFS formats | |||
Updated: 2, 2006 | Rating: 666 | Author: Y0YS Software | Size: 803 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
107. | FolderAccess 2.0 (lockfolder.net) | ||
is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
108. | fsMechanic 1.1 (freewebs.com) | ||
fsMechanic recovers deleted files and gains access to the NTFS partitions under Windows 9x. - fsMechanic uses original algorithms to recover deleted files. - fsMechanic is a tool that allows you to work with disk images just as existing disks. fsMechanic features: Well-known "Explorer" | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexey Babenko | Size: 438 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
109. | fsMechanic 1.1 (freewebs.com) | ||
fsMechanic recovers deleted files and gains access to the NTFS partitions under Windows 9x. - fsMechanic uses original algorithms to recover deleted files. - fsMechanic is a tool that allows you to work with disk images just as existing disks. fsMechanic features: Well-known "Explorer" | |||
Updated: 9, 2005 | Rating: 16 | Author: Alexey Babenko | Size: 438 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
110. | G-Lock EasyMail 4.62 (glocksoft.com) | ||
G-Lock EasyMail was developed to help people run and manage mailing lists, newsletters, announcement lists and customer updates. G-Lock EasyMail is a powerful group mailer which sends your message directly from your outbox to the recipient's mail server (without using any ISP's SMTP server). Program supports multi-threaded delivery, and so works several times | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3281 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
111. | G-Lock EasyMail Professional 4.62 (glocksoft.com) | ||
and subject lines via its powerful mail-merge function. EasyMail Pro's distinctive voicemail capability also lets you add audio content to your messages. Supporting a wide range of compression formats, you can even set the recording to start playing when the mail is opened. HTML and Multi part (MIME) | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3324 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
112. | G-Lock Email Processor 1.98 (glocksoft.com) | ||
any data from the message body and message header and save it to a file of user definable format. Using Email Processor you are also able to send a text or HTML message to your recipients as well as forward the message you received to another email address. The program can be easily set up to | |||
Updated: 2, 2006 | Rating: 119 | Author: Alex Markov | Size: 2601 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
113. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
impossible to use email without receiving spam in large amounts. G-Lock SpamCombat is your powerful solution for clearing your Inbox from spam, virus, and junk emails. G-Lock SpamCombat is email filtering software that lets you eliminate all unwanted messages at the server level without | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
114. | G-Lock Temp Cleaner 2.0 (glocksoft.com) | ||
Temp Cleaner finds and cleans space-wasting garbage files on your hard drive. The program searches your drives potentially unwanted files and allows you to deal with them all with just one click. It comes pre-configured with the most common junk file types and allows you to add your custom extensions. G-Lock Temp Cleaner is easy to use and allows you to | |||
Updated: 9, 2005 | Rating: 248 | Author: Alex Markov | Size: 874 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
115. | GiPo@FileUtilities 2.7 (gibinsoft.net) | ||
services: GiPo@MoveOnBoot - copying/moving/renaming/deleting files and folders on the next system boot. GiPo@DirMonitor - monitoring changes in the file system. GiPo@Mount - local folders substitution and local/remote drives mounting. GiPo@ReadTest - checking files and folders for read errors. Utilities can be integrated into shell. GiPo@MoveOnBoot | |||
Updated: 9, 2005 | Rating: 16 | Author: Igor Artemov | Size: 867 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
116. | GiPo@FileUtilities 2.9 (gibinsoft.net) | ||
services: GiPo@MoveOnBoot - copying/moving/renaming/deleting files and folders on the next system boot. GiPo@DirMonitor - monitoring changes in the file system. GiPo@Mount - local folders substitution and local/remote drives mounting. GiPo@ReadTest - checking files and folders for read errors. Utilities can be integrated into shell. GiPo@MoveOnBoot | |||
Updated: 9, 2005 | Rating: 0 | Author: Igor Artemov | Size: 908 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
117. | GiPo@FileUtilities 2.9 (gibinsoft.net) | ||
services: GiPo@MoveOnBoot - copying/moving/renaming/deleting files and folders on the next system boot. GiPo@DirMonitor - monitoring changes in the file system. GiPo@Mount - local folders substitution and local/remote drives mounting. GiPo@ReadTest - checking files and folders for read errors. Utilities can be integrated into shell. GiPo@MoveOnBoot | |||
Updated: 9, 2005 | Rating: 0 | Author: Igor Artemov | Size: 867 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
118. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth mode option, hot key access, Email logs, Monitoring and logging across | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
119. | Hide Files 3.4 (hide-files.biz) | ||
have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
120. | Hide Files 3.4 (spydex.com) | ||
have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
121. | Hide Files & Folders 2.4 (softstack.com) | ||
Files & Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
122. | Hide Folders XP 2.2 (fspro.net) | ||
day we trust our personal files to a computer. Most of us store various bits of personal or business-critical information on our hard drives. If you share your computer with co-workers, children, or a spouse, or your computer is always connected to the Internet, your private files are under threat of being disclosed. Hide Folders XP in innovative file and folder hiding | |||
Updated: 9, 2005 | Rating: 173 | Author: FSPro Labs | Size: 1025 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
123. | Huey PC Remote Control 5.5 (gidsoftware.com) | ||
loss of screen resolution; Reasonable usability at 56k modem speeds; File transfer; Clipboard transfer; User definable hotkeys; User definable IP Port; Proxy socks support; Full screen mode; Login, logout or lock your computer remotely; Data compression; Optional Full Encryption; Swap mouse buttons for left handed users; Thin installation (1 x Client file, 3 x server | |||
Updated: 2, 2006 | Rating: 0 | Author: Glen Dean | Size: 1212 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
124. | Hyper Maker HTML 3000.27 (bersoft.com) | ||
pages, linked images, and sounds in a single, encrypted, compressed file. Your creations can include .gif, .bmp, .jpg, and .png graphics; .avi movies; TrueType fonts; and .wav and .mid sound files. A royalty-free setup/viewer program (with a Web browser look-and-feel and multilanguage support) | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Bernardo | Size: 2606 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
125. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
Lock-iT XP provides strong file encryption and security for Windows XP, 2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
126. | IE Lock 1.02 (simpliciti.biz) | ||
Lock works right on your desktops, blocking any attempts at inappropriate browsing before they reach the network. IE Lock reduces or eliminates the need for expensive server side hardware and software solutions. IE Lock's "Allow List" ensures your employees gain access to | |||
Updated: 9, 2005 | Rating: 0 | Author: dave campbell | Size: 500 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
127. | IE Pets 1.0.0.1 (enjoysoft.com) | ||
needs together and give you single click ease of use. The Break Pet locks your browser from prying eyes. The Clean Pet consolidates the most common cleanup functions for Internet browsing and keeps your cookies and temporary Internet files where they should be, gone. The Library Pet gives you | |||
Updated: 9, 2005 | Rating: 0 | Author: Kurt Diesch | Size: 378 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
128. | InfoLock 1.51 (whimsysoft.com) | ||
can help you to encrypt your information. InfoLock can encrypt file or text(which entered by yourself or copy from clipboard). InfoLock use some very safe arithmetic to encrypt your information.Such as DES, which was put out by IBM and NSA. And InfoLock use special arithmetic to encrypt your text to make sure you can copy or send it by email with out any difficulty | |||
Updated: 8, 2004 | Rating: 101 | Author: Wei Zhang | Size: 692 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
129. | Instant Remote Control 2.2.9 (omniquad.com) | ||
multiple licenses-requires to be installed only on the administrator's computers used to control other PCs-a single license can support large networks-no warning displayed at remote end-creates a tree of all computers on your network automatically-manually enter IP details and access PCs not listed as well-works by sending a preconfigured host to a would-be host machine-the host | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Sobstel | Size: 2341 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
130. | Instant ThumbView Free Edition 1.0 (contextmagic.com) | ||
But you have to start the program to browse and view any individual file. In the latest Windows versions Explorer can be switched into the Thumbnail view too. That is fine. But it can be a pain, if you are looking for one small image or just have to look at couple of files. Instant ThumbView | |||
Updated: 3, 2005 | Rating: 207 | Author: ContextMagic.com | Size: 198 kb | Freeware Go to category: Graphic Apps > Viewers Similar programs | |||
131. | Intelligent Mailbook 3.1.5 (i-mailbook.info) | ||
databases: never loose mail messages because of one damaged system file! Intelligent Mailbook can rebuild its internal e-mail databases from scratch, might they get damaged. In other e-mail programs this usually results in total-loss of all messages! If new mail is received, the Scroll-Lock | |||
Updated: 3, 2005 | Rating: 0 | Author: Barry Matinus | Size: 4626 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
132. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
133. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
to generate an installation-specific Serial Number on the end-user's computer which can be unlocked with a corresponding Unlock Code. Using KeyedAccess means you can create shareware-type versions of your MS Access application where some functionality is locked and is only unlocked when the user enters a valid key. When using the Installation Serial Number and Unlock Code | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
134. | Kickstart 1.02 (westfaro.com) | ||
a particular database as well as handling security, audit trails and locking. If you want to use that stored procedure as a standard template then you can do it manually, cutting, pasting, editing and testing or you can use Kickstart to do the tedious work for you in a few simple steps. Start Kickstart and point it the database you want to work with. Load your source code into the | |||
Updated: 9, 2005 | Rating: 298 | Size: 7069 kb | Commercial Go to category: Development > Other Similar programs | |||
135. | LJConfig 1.2 (victechsoftware.com) | ||
of printer connection. It allows you to change the Density, Tray Locking, Fuser Temperature, EconoMode, REt, and Resolution settings. Version 1.2 adds support for setting the lines per page and control panel text, fixes an issue with the setup program when installing to drives other than C:, and | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Boyer | Size: 226 kb | Freeware Go to category: System Utilities > Printer Similar programs | |||
136. | LLLib Licensing Library 2.04 (gppsoftware.com) | ||
is a Software Licensing Library, supplied as .DLLs and .LIB files for 32-bit development. Comprehensive help file including detailed API documentation. Examples in C/C++ and VB. Supports unregistered licenses, time limited licenses, run limited licenses and full registrations, product numbers, registration numbers, number of concurrent users, locking to a machine and | |||
Updated: 9, 2005 | Rating: 0 | Author: Graham Plowman | Size: 1856 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
137. | LoanAmortizer Standard Edition 3.1 (loanamortizer.com) | ||
Once any amortization schedule is prepared it can be saved in a file for future reference, comparison or archive. Everything is completed automatically, accurately and is easy and simple to be used and handled. Canadian Mortgage calculations are also implemented in LoanAmortizer Standard Edition, both for mortgage and regular loans. LoanAmortizer Standard Edition is one of the few | |||
Updated: 9, 2005 | Rating: 0 | Author: George Athannassov | Size: 1407 kb | Shareware Go to category: Business > Other Similar programs | |||
138. | Lock Files and Folders 1.4 (winguardpro.com) | ||
Lock Files & Folders can lock your files and folders without encrypting them. It simply disables users from reading or writing to files, which includes operations such as moving, renaming, deleting and opening. Lock Files & Folders can lock your | |||
Updated: 3, 2005 | Rating: 0 | Author: WG Soft | Size: 446 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
139. | Lock Folder 5.0 (realclicks.com) | ||
Lock Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
140. | Lock Folder XP 3.4 (everstrike.com) | ||
Lock Folder XP is a new security tool that lets you lock your files, folders and drives with your personal password. Now nobody but you can access your most sensitive information. Locking folders, files and drives also effectively protects you from malicious programs, such | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
141. | Lock Webpages 2003 1.0.2 (winguardpro.com) | ||
Lock Web Pages can lock out internet sites that you do not want users accessing. It comes with some websites build-in that block sexually explicit content, and you can add more of your own. It can also stop people installing new programs on your computer, and has the option to block popup | |||
Updated: 3, 2005 | Rating: 0 | Author: paul hull | Size: 560 kb | Commercial Go to category: Network & Internet > Other Similar programs | |||
142. | LockBox 2.11 (locksoft.net) | ||
a regular windows folder, except it is opened with a password. Any files dragged into the LockBox are protected with a strong encryption algorithm. Files can be run or modified from directly within the LockBox, without compromising security. Large files can optionally be partially encrypted so they can be stored / used faster. LockBox acts similar to a windows folder | |||
Updated: 3, 2005 | Rating: 474 | Author: David Dosanjh | Size: 600 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
143. | LockEXE 2.0 (mazepath.com) | ||
permission! You can either browse for the program you want to lock, or simply drag it to the select box! Nothing could be easier! Set the password and click Lock. The program will no longer run without the password, there is no way around it! So Easy to LockEXE can password protect your programs. Your email, word processor, browser or ANY other programs you choose | |||
Updated: 9, 2005 | Rating: 16 | Author: John Hooper | Size: 145 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
144. | LockEXE 2.0 (mazepath.com) | ||
permission! You can either browse for the program you want to lock, or simply drag it to the select box! Nothing could be easier! Set the password and click Lock. The program will no longer run without the password, there is no way around it! So Easy to LockEXE can password protect your programs. Your email, word processor, browser or ANY other programs you choose | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 145 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
145. | LockIt XP 3.3 (killersoftware.com) | ||
Windows 95/98/ME/XP/NT/2K utility to password protect any files and folders in seconds.LockIt XP will sit in your tray, and to password protect a file, just copy your file(s) or folders to a defined 'Locked Files' folder and it will be encrypted and password protected! LockIt XP is an easy-to-use Windows 95/98/ME/XP/NT/2K utility to | |||
Updated: 9, 2005 | Rating: 113 | Author: Rob Zino | Size: 960 kb | Demo Go to category: System Utilities > Other Similar programs | |||
146. | Lockout Desktop Security 1.1.652 (dynamicdesigns.co.uk) | ||
Desktop Security software brings you many ways to secure and lock your desktop. You can define different sets of permissions and restrictions for specific users and groups, control access to certain applications, restrict when your PC can be used, restrict CD usage, log Internet usage, and log attempts at restricted activities. Note: This is a 30-day trial. After 30 | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Wilkinson | Size: 2857 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
147. | LockTheFile 1.8 (okosoft.com) | ||
is a tool that encrypts files with strong encryption alghorytm. You may protect any information - text files, pictures, video and audio files from other eyes and ears, as many files as you need, without any limites. The core functions of this program are: Strong encryption alghorytm; Handy user interface; Ability to send locked files | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Maltsev | Size: 1808 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
148. | MoRUN.net Sticker 5.0 (morun.com) | ||
in groups, send sticky notes over LAN/Internet or via e-mail, attach files/urls to sticky notes, lock sticky notes to prevent unauthorized use, import .txt and .rtf files to sticky notes, save sticky note in *.txt, *.rtf formats; save sticky note as pictures (*.jpg, *.bmp formats) | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
149. | Mp3 Filter 4.2.4 (hardcoded.net) | ||
your collection is: Hard drives, Multiple Mp3 CDs, anything. The file comparison process, which basically compare filename's words between them, is completely customizable. Mp3 Filter also have tons of other features: * Profile driven scans. * Incredibly fast comparing engine. * Supports MP3, WMA, OGG, M4A/M4P (iTunes format). * Easy to use profile | |||
Updated: 2, 2006 | Rating: 1578 | Author: Virgil Dupras | Size: 1083 kb | Shareware Go to category: Audio & Multimedia > Audio File Players Similar programs | |||
150. | MP3Guard MP3 Protection 2.0 (zappersoftware.com) | ||
This program is for musicians who want to sell or distribute mp3 files online. This program will encrypt your mp3 files. This includes an MP3 player for playing the MP3 files. Users cannot copy your files. This program is ideal for musicians who wish to sell mp3 files online. This program works, optionally, with ShareGuard to provide a lock and key | |||
Updated: 9, 2005 | Rating: 48 | Author: William Bradshaw | Size: 4621 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
151. | MyCafeCup Platinum 2.214 (mycafecup.com) | ||
real-time way to manage your client machines via monitoring and locking in order to process PC rentals. It offers secure access to client computers and grants access to individuals by creating user code/password accounts that can be charged per use or on a time schedule. New! XP (Home/Pro) SP1-2+ / Server 2003 (all Edition) with DHCP / ICS / Windows Firewall / WOL / nProtect | |||
Updated: 2, 2006 | Rating: 158 | Author: Natalee Jantzent | Size: 8880 kb | Shareware Go to category: Business > Vertical Market Apps Similar programs | |||
152. | MyPadlock 1.4 (pages.prodigy.net) | ||
you can see, security 'you' control. For text communication and file encryption get MyPadLock. Encryption keys are not random - you choose the keys to lock your information and you can change the keys as often as necessary. Keys are not saved in the secured information. If fact, your keys are not on your computer at all. They're in your head or wherever you wrote them | |||
Updated: 9, 2005 | Rating: 0 | Author: Don Kreuzberg | Size: 3264 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
153. | MySecretFolder 3.0 (winability.com) | ||
for Windows Me/98 and Windows XP/2000. You can hide or lock with password your personal folder on your computer, on both NTFS and FAT/FAT32 volumes. Stealth mode of operation, hot key activation, protection from Windows and Office applications, as well as from MS-DOS programs. Highly customizable and user-friendly. http://www.my-secret-folder.com/ MySecretFolder - You can | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrei Belogortseff | Size: 402 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
154. | MySecretFolder 3.0 (winability.com) | ||
for Windows Me/98 and Windows XP/2000. You can hide or lock with password your personal folder on your computer, on both NTFS and FAT/FAT32 volumes. Stealth mode of operation, hot key activation, protection from Windows and Office applications, as well as from MS-DOS programs. Highly customizable and user-friendly. http://www.my-secret-folder.com/ MySecretFolder - You can | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrei Belogortseff | Size: 402 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
155. | Netjini 1.0 (168.144.45.89) | ||
rate • Telnet octet rate • SMTP/POP/IMAP octet rate • HTTP(S) octet rate • NNTP octet rate • NetBIOS octet rate • SNMP octet rate • Captures packets from local and remote segments PROTOCOLS See which protocols are in use on you network. APPLICATIONS | |||
Updated: 9, 2005 | Rating: 0 | Author: Ertugrul Akbas | Size: 35156 kb | Commercial Similar programs | |||
156. | Netvester 2002 1.2 (netvester.com) | ||
the World Wide Web is filled with a huge amount of pictures. What's worse is knewing web addresses that contain countless pictures you have to click on if you want them (apart from all annoying popups, long loading time of websites). Netvester 2002 takes over the downloading of all pictures! You know web sites that are filled with countless pictures or galleries? Try out Netvester | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Schaefer | Size: 4342 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
157. | NotesPlusPlus 5.5 (notesplusplus.com) | ||
any computer sticky note; organize sticky notes in groups, attach files/urls to sticky notes; associate virtual sticky notes with files; modify all sticky note settings; set up default settings for newly created notes; accelerate work using hotkeys; lock sticky notes to prevent unauthorized use; import *.txt and *.rtf files to sticky notes; save sticky notes in | |||
Updated: 9, 2005 | Rating: 0 | Author: NotesPlusPlus. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
158. | PalmTree 3.3 (clickok.co.uk) | ||
protect, lock and hide folders or directories and their subdirectories and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No | |||
Updated: 9, 2005 | Rating: 0 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
159. | PalmTree 3.5 (clickok.co.uk) | ||
protect, lock and hide folders or directories and their subdirectories and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No | |||
Updated: 9, 2005 | Rating: 42 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
160. | Panda Security Demo 3.0.2.0 (pandasecurity.com) | ||
keep hackers or unauthorized or inexperienced users away from your files, and helps you keep them from configuring your systems. It helps you prevent data from being removed from your company or personal computer. You can limit, depending on who accesses a computer, the use of certain files or directories. You can keep users from accessing the Control Panels or any other | |||
Updated: 9, 2005 | Rating: 0 | Author: Armando Bernal | Size: 6010 kb | Demo Go to category: System Utilities > Other Similar programs | |||
161. | Password Agent Lite 2.3.1 (moonsoftware.com) | ||
password generator, sorting, printing, import/export, 256-bit U.S. government approved encryption, auto-lock & auto-close features for enhanced security, drag'n'drop, automatic backup, file history etc. Password Agent is resource friendly and efficient, its database files are very compact. Fully functional Lite version is completely free but limited to 25 | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahto Tanner | Size: 1305 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
162. | Password Depot 2.0.8 (hello-engines.com) | ||
help of the wizards. - Perfect local security: You can use the lock function to restrict other user’s access to your personal passwords. - Passwords analyzer: Check and improve the quality of your passwords. - Decrypt and encrypt external files. - Use variables in URLs to meet all the requirements. - Support of TANs for online banking | |||
Updated: 9, 2005 | Rating: 0 | Author: AceBIT GmbH | Size: 5265 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
163. | Password Depot 2.0.8 (hello-engines.com) | ||
help of the wizards. - Perfect local security: You can use the lock function to restrict other user’s access to your personal passwords. - Passwords analyzer: Check and improve the quality of your passwords. - Decrypt and encrypt external files. - Use variables in URLs to meet all the requirements. - Support of TANs for online banking | |||
Updated: 9, 2005 | Rating: 42 | Author: AceBIT GmbH | Size: 5265 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
164. | Password Maintenance 2.07 (softdd.com) | ||
external device to better secure your passwords, as your password files will not even exist on your pc if you choose this option. You can also print a list of all your passwords and websites on paper for safe backup storage, and you can add, update, and delete websites and passwords in your list. You | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftDD Software | Size: 535 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
165. | Password Protected Lock 2.91 (softfolder.com) | ||
Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time and provides an informative message that you can edit as you like | |||
Updated: 9, 2005 | Rating: 0 | Author: SoftFolder Inc | Size: 724 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
166. | Password Protected Lock 2.92 (softfolder.com) | ||
Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time and provides an informative message that you can edit as you like | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftFolder Inc | Size: 724 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
167. | Password Safe and Sound 1.2.0 (northcardinal.com) | ||
all your passwords and related information securely, in an encrypted file that only you can view using your defined password. It also allows you to launch websites, programs, or files associated with your passwords with a simple click of the mouse. Features: • Easy to use • Eliminates the | |||
Updated: 9, 2005 | Rating: 0 | Author: North Cardinal Software | Size: 4819 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
168. | PC Guard for Win32 5.00 (sofpro.com) | ||
access to your application (EXE/DLL) with password. - Hardware locking! Lock your software to target computer. - Evaluation (trial) version feature! Easily create demo version of your software with execution and date limitations. - Secure distribution! Securely distribute your | |||
Updated: 9, 2005 | Rating: 48 | Author: Blagoje Ceklic | Size: 841 kb | Commercial Go to category: Development > Management & Distribution Similar programs | |||
169. | PC Security 6.4 (tropsoft.com) | ||
Lock down your system like never before. Exercize total control over your computer with the following security options: Explorer Control, File Lock, Folder Lock, System Lock, Internet Lock, Shortcut/Program Lock, Restricted System, Window Lock, intruder | |||
Updated: 9, 2005 | Rating: 18 | Author: Silvio Kuczynski | Size: 1100 kb | Demo Go to category: System Utilities > Other Similar programs | |||
170. | PE Corrector 1.84 (gigamindsystems.com) | ||
Corrector is very useful when you need to correct PE files. Such correction may be very necessary in this cases: - Some compilers do not clear memory before compilation. Because of this the new exe file may contain binary trash in the header. But also it may contain even your personal security data from your disks (passwords, for example). PE Corrector can correct this | |||
Updated: 9, 2005 | Rating: 0 | Author: GigaMind Systems | Size: 630 kb | Shareware Go to category: Development > Source Editors Similar programs | |||
171. | Picture and Video Encrypt 2.03b (softdd.com) | ||
software will allow you to prevent access by encrypting any media files, and will even disguise the names of the videos or pictures so they cannot be recognized by anyone else. You can easily decrypt and return the files back to normal with the click of a button, and even the file names will return to your original file name. This software is also password | |||
Updated: 9, 2005 | Rating: 42 | Author: SoftDD Software | Size: 576 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
172. | PowerControl 1.0 (onlimemedia.com) | ||
will allow you to make Shutdown, Reboot, Hibrnete, Logoff, Standby, Lock the local or removed computer (or several computers). As you may may awake the removed computer with the help of function Wake-On-LAN. You can specify a delay, which can either be an absolute time (eg. 8pm) or a relative time (eg. "20 minutes from now"), during which a message you specify can be displayed | |||
Updated: 9, 2005 | Rating: 16 | Author: Pavel Abraksas | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
173. | PowerControl 1.0 (onlimemedia.com) | ||
will allow you to make Shutdown, Reboot, Hibrnete, Logoff, Standby, Lock the local or removed computer (or several computers). As you may may awake the removed computer with the help of function Wake-On-LAN. You can specify a delay, which can either be an absolute time (eg. 8pm) or a relative time (eg. "20 minutes from now"), during which a message you specify can be displayed | |||
Updated: 9, 2005 | Rating: 20 | Author: Pavel Abraksas | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
174. | PowrClik 1.1-19f (genntt.boom.ru) | ||
power off computer. Additional functions: run screen saver, lock computer, hang up modem connection, disable screen saver, prevent suspend mode activation, prevent Windows shut down. Options: forced execution, play sound on alarm, play sound repeatedly, command line, color palette (skin) adjusting. Standby / Hibernate / Lock / Logoff / Restart / Poweroff / Disconnect | |||
Updated: 9, 2005 | Rating: 42 | Size: 106 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
175. | PowrClik Suite 2.7.4.104 (genntt.webs.com.ua) | ||
computer. Additional functions: run screen saver, turn off monitor, lock computer, hang up modem connection, run Task Scheduler, run file, play sound on alarm, measure performance. Preventive functions: disable screen saver, prevent suspend mode activation, prevent Windows shut down. And much | |||
Updated: 3, 2006 | Rating: 1651 | Author: Genntt Productions | Size: 315 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
176. | Privacy Master 3.9 (webroot.com) | ||
during your session is secured in encrypted and password protected files that are hidden from view. Close your session and your personal information vanishes and is instantly inaccessible to anyone but you. Because Privacy Master secures files where you normally keep them, there is no need to | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
177. | PrivacyDefence 1.3 (privacydefence.com) | ||
programs and system tracks without breaking their functionality, it's fully customizable and supports 18 programs. Left as is, unwanted system logs can seriously impair your confidentiality because all your Internet activity can be easily recovered: Web pages you've viewed, pictures you've opened | |||
Updated: 9, 2005 | Rating: 0 | Author: MCMK Corp. | Size: 1594 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
178. | Private Desktop 1.91 (tropsoft.com) | ||
from the second desktop in a split second, and special key. List of files and programs to lock. Say you're at your computer doing something private and someone comes in... Private Desktop will allow you to escape to your "public" desktop with the push of a button. Private Desktop allows you to keep a second password protected | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 237 kb | Demo Go to category: System Utilities > Other Similar programs | |||
179. | Private Shell SSH Client 2.1 (privateshell.com) | ||
CVS, VNC, e-mal clients and other software). Private Shell's default configuration allows you to connect to any SSH1 or SSH2 server in the most secure way by choosing the strongest encryption algorithms supported by a remote computer. Full support for ssh tunneling and X11 forwarding. Use built-in Secure FTP client (SFTP client) to transfer files between computers | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
180. | Protect Folder 98 3.0 (everstrike.com) | ||
Folder 98 is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms, and trojans. Here is how Protect Folder 98 works - all you have to do is to drag the | |||
Updated: 9, 2005 | Rating: 48 | Author: Richard Davids | Size: 772 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
181. | QVCS 3.10.6 (qumasoft.com) | ||
teams, and is easy to use and administer. See at a glance which files are checked out, which files have changed since check out, who most recently changed a file, etc. Directory recursion allows you to see this for a single directory, or for an entire project. Perform common operations | |||
Updated: 2, 2006 | Rating: 52 | Author: Jim Voris | Size: 1820 kb | Shareware Go to category: Development > Other Similar programs | |||
182. | QVCS-Enterprise 1.2.10 (qumasoft.com) | ||
and a custom Ant task to support scripting. See at a glance which files are checked out, which files have changed since check out, who most recently changed a file, etc. Perform common operations like check in or check out with the click of a button. Supports both text and binary | |||
Updated: 2, 2006 | Rating: 0 | Author: Jim Voris | Size: 2652 kb | Shareware Go to category: Development > Other Similar programs | |||
183. | QVCS-Pro 3.10.6 (qumasoft.com) | ||
with MS VS.Net 2003, MS VC++ and other IDEs. See at a glance which files are checked out, which files have changed since check out, who most recently changed a file, etc. Directory recursion allows you to see this for a single directory, or for an entire project. Perform common | |||
Updated: 2, 2006 | Rating: 0 | Author: Jim Voris | Size: 1820 kb | Shareware Go to category: Development > Other Similar programs | |||
184. | R-Drive Image 3.0 (drive-image.com) | ||
Image 3.0 is a potent utility providing disk image files creation for backup or duplication purposes. A disk image file contains the exact, byte-by-byte copy of a hard drive, partition or logical disk and can be created with various compression levels on the fly without stopping Windows OS and therefore without interrupting your business. These drive image files can | |||
Updated: 9, 2005 | Rating: 1207 | Size: 11366 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
185. | RageWork 2.4 (softrage.com) | ||
is a cross-platform file manager. It includes a *Powerful, dual-windowed File Manager. Basic operations on files e.g. copying, moving, deleting, changing the name, create new files and directories, execute programmes, compression and extracting. Multi-rename, Attribute change, Calculate space (even in FTP), "Open with" support, Tabs with hide effect, Keys | |||
Updated: 2, 2006 | Rating: 1068 | Author: The Rage | Size: 16739 kb | Shareware Similar programs | |||
186. | RainbowGround 1.1 (desktopfay.com) | ||
brightness and contrast sliders. They also affect resulting image. Lock buttons are used to lock groups of sliders so that a) all sliders in the group are linked and moved together and b) locked sliders are not affected by Randomize button. Randomize button changes positions of | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Kozhinov | Size: 511 kb | Freeware Go to category: Graphic Apps > CAD Similar programs | |||
187. | Random Password Generator-PRO 12.1 (hirtlesoftware.com) | ||
created you may then save them to a text, MS-Access, HTML and/or CSV file. CSV may be used with spreadsheet applications such as MS-Excel. A built-in MS-Access editor is provided. Therefore, MS-Access itself is not needed to create, view or edit these files. A dictionary check option will check | |||
Updated: 9, 2005 | Rating: 79 | Author: Tim Hirtle | Size: 7568 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
188. | RebootIT 2.0 (lohja-associates.com) | ||
a server On-Demand. Free servers which have the User Interface locked by rebooting the server gracefully in the back end. There are so many memory leaks caused by applications running, terminiating, opening and closing files causing your system to become unstable through time. With RebootIT, you can refresh your systems memeory and cache on a schedule. Best of yet, it does | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Lohja | Size: 546 kb | Demo Go to category: System Utilities > Other Similar programs | |||
189. | Recall 4.0 (acastat.com) | ||
and keep a personal log of special events. Create multiple files for family members or establish a file for each type of application, such as home, work, hobbies, and school. Recall can also be used to keep a personal log of daily or weekly activities. Record observations of employee performance which are date stamped, collect incidence reports, or create your own | |||
Updated: 9, 2005 | Rating: 42 | Author: Phil Crewson | Size: 2639 kb | Shareware Go to category: Business > Other Similar programs | |||
190. | RegDesk 4.0 4.0 (easytools.com) | ||
answer to a lock and key? RegDesk 4.0 provides computer security of the highest order, securing opted devices and areas of Desktop and Windows programs. Put together a foolproof desktop security system, which controls access to vital areas of Windows. It provides a facility for hiding of selected drive letters, setting virtual memory, display, network, printer | |||
Updated: 9, 2005 | Rating: 0 | Author: VenkataRangan TNC | Size: 530432 kb | Shareware Go to category: Development > Other Similar programs | |||
191. | Registry First Aid 4.3.1 (rosecitysoftware.com) | ||
4.3 - It's faster, finds more problems than others and is even easier to use! People's Choice Winner 2003 Shareware Industry Conference! Tired of Windows crashing? Sick of having software lock up on you or taking forever to load? The problem could be all of those incorrect registry entries caused by software installations and un-installations that went awry! Not all | |||
Updated: 2, 2006 | Rating: 16 | Author: Konstantin Golovatsky | Size: 1739 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
192. | RegRepair 2000 4.0.04 (easydesksoftware.com) | ||
that repair IOS errors conflicts and more. Now fixes VXDs. This file contains updates for Windows 98 SE. For all versions of Windows 95/98, English or foreign language machines. IOS means Initiating Operating Sytem and ERRORS means the stuff that messes up your Operating System, you know the stuff that makes you crash and get locked out of Windows. If you never had one I'll | |||
Updated: 9, 2005 | Rating: 0 | Author: Easy Desk Software | Size: 2649 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
193. | REMOTE DRiVE 1.1 (matcode.com) | ||
can see the detailed information about all users accounts, unlock locked users and alter their passwords. The HOST and CLIENT machines must be connected with a standard parallel link cable or null-modem serial cable. Easy administrative access any computer (FAT, FAT32 and NTFS) over the parallel or the serial cable connection. Run included User Manager, CHKDSK, CIA Unerase or any | |||
Updated: 9, 2005 | Rating: 16 | Author: Vitaly Evseenko | Size: 474 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
194. | Remote Performance Observer 3.0 (apexoft.com) | ||
IP, TCP, UDP, ICMP, SMTP, etc.), OS critical parameters (Paging File, Running Processes, etc.), running processes information (Processor Usage, Memory Consumption, Threads, Priority, etc.). Setting remote expert diagnosis on processor, memory, hard drive, network components. Maintaining alarms with logging to a file, playing sounds, sending e-mails, sending messages to | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexei Polkovnikov | Size: 2660 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
195. | Remote Performance Observer 3.0 (apexoft.com) | ||
IP, TCP, UDP, ICMP, SMTP, etc.), OS critical parameters (Paging File, Running Processes, etc.), running processes information (Processor Usage, Memory Consumption, Threads, Priority, etc.). Setting remote expert diagnosis on processor, memory, hard drive, network components. Maintaining alarms with logging to a file, playing sounds, sending e-mails, sending messages to | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexei Polkovnikov | Size: 2660 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
196. | Retrieve PDF V1.0001 (software.ebandwagon.co.uk) | ||
designed for the recovery of content from PDF files that have been locked, either where you have forgotten the user password, and so cannot even open the file to read it, or if you have just forgotten the owner password, and so cannot edit, copy, or print the file. This software was designed by our inhouse team due to a requirement from the publishing | |||
Updated: 8, 2004 | Rating: 0 | Author: Neil Plummer | Size: 1418 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
197. | SafeBox Industry 1.0 (aidsoft.com) | ||
Industry is a new and powerfull file encryption solution. This application can also provide a strong protection, quite good compression, self-decrypting archives, good presentation (use skins form, splash screen), which may be used for secure distribution package.Features : Create Self-Decrypting (Auto Executable), Interface Customizable for Self Extraction, Add Signature inside | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
198. | SAV-MailChecker Pro 1.1 (sav-soft.com) | ||
following ways: -Show a message -Play a sound -Blink with Scroll Lock led on your keyboard -Run a program -Show the number of messages on TaskTray and change it’s icon If you receive large amounts of e-mail messages and you need to keep track on new messages on a regular basis without launching (or running on background) a massive mail-client software – then | |||
Updated: 3, 2005 | Rating: 0 | Author: Aleksey Shevchenko | Size: 321 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
199. | Secura Backup Professional 2.13 (cmfperception.com) | ||
Secura Backup isn't running. The Shadow Copy feature will backup files that are in use or locked by other programs including Outlook PST files, Exchange files and database files like MySQL/MSSQL. The incremental backups feature will prevent files that haven't | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
200. | SecurDesk! 5.32 (cursorarts.net) | ||
a complete replacement for the Windows default Explorer.exe desktop/file manager shell. SecurDesk! Features Include: a desktop interface which can be custom designed; Logging of system usage; Enhanced file management with optional restrictions; Virtual desktops; Data protection with | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Lock file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|