|
||||||
|
||
|
Home > Locker software |
Related keywords: file locker, folder locker |
|
|
101. | 1st Security Agent 6.14 (softheap.com) | ||
1st Security Agent is an excellent password-protected security utility to secure Windows-based computers. It works under any Windows platform and offers an administrative support for controlling which users are allowed to access your computer and the level of access each user may have. You can choose to | |||
Updated: 2, 2006 | Rating: 42 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
102. | 1st Security Agent Pro 6.14 (softheap.com) | ||
1st Security Agent Pro is a professional password-protected system security utility to secure Windows PC and restrict access to its key features. 1st Security Agent Pro offers an administrative support for controlling access to your PC and changing user access level. Password-protect and restrict access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
103. | 1st Screen Lock 6.14 (softheap.com) | ||
Screen Lock is a password-protected desktop security utility that lets you lock your desktop with a password on boot, or at the time you are leaving your PC. You can use the built-in spy utility that works in background and enables you to spy on your PC users by fixing all user moves in a log | |||
Updated: 2, 2006 | Rating: 479 | Author: Ixis Ltd | Size: 1106 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
104. | 1st Security Administrator 10.14 (softheap.com) | ||
Protect PC, restrict access to Windows applications and password-protect boot with 1st Security Administrator. This is the best password-protected security utility to apply access restrictions to PC, and to protect your privacy stopping others from tampering with your desktop. Deny access to Control Panel and | |||
Updated: 2, 2006 | Rating: 432 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
105. | 1st Evidence Remover 2.14 (getfreefile.com) | ||
When you use Windows, open folders, search for files and see pictures, work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all | |||
Updated: 2, 2006 | Rating: 190 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
106. | 1st Evidence Remover 2.14 (softheap.com) | ||
When you use Windows, open folders, search for files and see pictures, work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
107. | 1st Desktop Guard 1.63 (emailarms.com) | ||
secure your public access computers, save, restore, manage and lock desktop layouts. With personal computers becoming part of our lives and everyone in the household using them, it's hard to keep track of the icons that are located on the desktop. Many times, you might want to arrange them differently for different jobs. Moreover in case the computer is located in a shared | |||
Updated: 2, 2006 | Rating: 903 | Author: emailarms emailarms | Size: 841 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
108. | 1 Click & Lock 2.83 (softstack.com) | ||
& Lock up is a system tray security utility you can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from the system tray, log | |||
Updated: 2, 2006 | Rating: 56 | Author: IM Soft | Size: 1338 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
109. | X2Net WebCompiler 3.0.0.49 (x2net.com) | ||
etc. Built-in installer/uninstaller, powerful encrytion. System locking to restrict created presentations to a single PC. Simple to use, supports scripting, plugins, cookies, Flash etc. Does NOT extract files to disk, so relatively secure. Has command-line compiler for integration into your own e-commerce operation. Autorun file generator. User translatable into languages other than | |||
Updated: 2, 2006 | Rating: 0 | Author: X2Net Staff | Size: 4957 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
110. | Watch Right 2002.0.77 (bpssoft.com) | ||
secret password to unlock Watch Right's monitoring control panel. - Locks log files to prevent deletion without a valid password. - Resists attempts to disable or close without a valid password. Watch Right is a simple and inexpensive parental monitoring system that empowers the concerned parent with | |||
Updated: 2, 2006 | Rating: 0 | Author: Bradley O'Keefe | Size: 2842 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
111. | SourceGuardian PHP Encoder 5.5 (sourceguardian.com) | ||
+ Automatic backup of source files + Deployment options + Lock to domain names, IP addresses or LAN hardware + Timeout your scripts at specific dates or days in the future + Encoded files run under Linux, FreeBSD, Windows, Mac OS X, Solaris, HP-UX + Require no changes to the standard web server installation + Free minor updates + Technical support SourceGuardian | |||
Updated: 2, 2006 | Rating: 174 | Author: Sales Department | Size: 3580 kb | Demo Go to category: Web Development > ASP & PHP Similar programs | |||
112. | Server Nanny Network Monitor 4.0.0 (ServerNanny.com) | ||
Reduce downtime and be the first to know when a server or network device fails by using Server Nanny network and server monitoring software. The last time you had a network or server failure how long was it before the problem was discovered? Minutes? Hours? Maybe even days? Use Server Nanny to recover The last time you had a network or server failure how long was it before the problem was discovered? Don't wait for employees or customers to report the problem | |||
Updated: 2, 2006 | Rating: 0 | Author: Xenos Software LLC | Size: 5575 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
113. | Remote Task Manager 3.8.2 (ntutility.com) | ||
ever having to physically go to them. RTM adds the ability to lock/shutdown/reboot and to create processes on remote computers. This program is for Systems Administrators looking to simplify task and process administration across a disparate group of Windows NT/2000 machines. RTM enables a Systems Administrator to control most aspects of a remote environment. The simple-to-use | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 2339 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
114. | Program Lock Pro 2.1 (softdd.com) | ||
Lock and unlock any program on your pc, including the control panel, IE, Outlook, AOL, AIM, and more. Other features include the ability to choose your own message to display if anyone attempts to run one of your locked programs, and also includes password protection so only you can unlock the | |||
Updated: 2, 2006 | Rating: 172 | Author: SoftDD Software | Size: 708 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
115. | Private Shell SSH Client 2.1 (privateshell.com) | ||
Private Shell is an easy to configure SSH client for Windows. Autoconfiguration wizard helps you to setup basic and advanced SSH sessions. Even if you are not familiar with SSH, you can easily establish connections that use public key authentication and provide ssh tunneling for third-party applications | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
116. | IE Internet Security 6.14 (getfreefile.com) | ||
IE Internet Security is a password-protected Internet security utility that customizes different features of the Internet Explorer Web browser. It allows you to disable abilities to change your web browser settings, restrict access to certain tabs of Internet Options dialog box, as well as specific settings | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 1106 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
117. | IE Internet Security 6.14 (softheap.com) | ||
IE Internet Security is a password-protected Internet security utility that customizes different features of the Internet Explorer Web browser. It allows you to disable abilities to change your web browser settings, restrict access to certain tabs of Internet Options dialog box, as well as specific settings | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1106 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
118. | Hyper Maker HTML 3000.27 (bersoft.com) | ||
HyperMaker HTML gives you a handy way to create and distribute HTML-based multimedia publications. It lets you package all HTML pages, linked images, and sounds in a single, encrypted, compressed file. Your creations can include .gif, .bmp, .jpg, and .png graphics; .avi movies; TrueType fonts; and .wav and | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Bernardo | Size: 2606 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
119. | Huey PC Remote Control 5.5 (gidsoftware.com) | ||
IP Port; Proxy socks support; Full screen mode; Login, logout or lock your computer remotely; Data compression; Optional Full Encryption; Swap mouse buttons for left handed users; Thin installation (1 x Client file, 3 x server files and no reboot); Huey client (huey.exe) can be installed and executed from a floppy disk; Huey does not replace your graphic driver or install a GINA | |||
Updated: 2, 2006 | Rating: 0 | Author: Glen Dean | Size: 1212 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
120. | G-Lock Email Processor 1.98 (glocksoft.com) | ||
that nobody on the exclusion list will receive your message. G-Lock Email Processor is designed to process/parse bounced/undeliverable and subscribe/unsubscribe emails as well as extract information from your email messages and create user defined text documents, that can be imported by other | |||
Updated: 2, 2006 | Rating: 119 | Author: Alex Markov | Size: 2601 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
121. | G-Lock EasyMail Professional 4.62 (glocksoft.com) | ||
HTML, Lotus 1-2-3, XML, MS Access Files as well as ODBC databases. G-Lock EasyMail is a fast, powerful yet simple to use email software designed primarily for applications in which the sender and recipient have an existing relationship, a retailer's customer base, a physician's list of patients, a | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3324 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
122. | G-Lock EasyMail 4.62 (glocksoft.com) | ||
G-Lock EasyMail was developed to help people run and manage mailing lists, newsletters, announcement lists and customer updates. G-Lock EasyMail is a powerful group mailer which sends your message directly from your outbox to the recipient's mail server (without using any ISP's SMTP server) | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3281 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
123. | Easy File & Folder Protector 4.14 (softstack.com) | ||
Protect files and folders situated on local media of Windows 95/98/ME/NT/2000/XP with Easy File & Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File & Folder Protector has an easy-to-use user interface | |||
Updated: 2, 2006 | Rating: 46 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
124. | Atomic Newsgroup Explorer 1.40 (atompark.com) | ||
feature of ANE is an availability to work with private newsgroups locked by password and servers that do not show all available groups. You may enter the know usenet group manually and process it too. Another unique feature is a multi-threaded operating, it speeds up the entire process in many times! Atomic Newsgroup Explorer has a user-friendly interface. It is very easy to start | |||
Updated: 2, 2006 | Rating: 42 | Author: Evgeny Medvednicov | Size: 1175 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
125. | Advanced Email Verifier 5.15 (glocksoft.com) | ||
Advanced Email Verifier (AEV) is your powerful solution for the "message delivery error". AEV is designed for system administrators, webmasters, programmers as well as for those advanced users who have their own mailing lists and need to keep them up-to-date. When Internet users move from one service | |||
Updated: 2, 2006 | Rating: 42 | Author: Alex Markov | Size: 4148 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
126. | Advanced Administrative Tools 5.92 (glocksoft.com) | ||
unknown trojan horses. To secure your network, you may need to lock down applications that aren't required by any function you currently use. To do this effectively, you have to know what ports are available and what application is utilizing them. AATools Network Monitor displays the services that are active on all ports. Further, AATools Network Monitor maps the ports in use to | |||
Updated: 2, 2006 | Rating: 173 | Author: Alex Markov | Size: 3087 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
127. | APSW Watt-U-Use 1.0.0.20 (allpurposesoftware.com) | ||
Have you ever wondered how much money that light left on all night is costing you in bills? Or that stereo that just seems to never stop playing from the kids room? How about which of your household appliances contribute the most to your monthly energy bills? 'Watt-U-Use' home energy calculator shows you the | |||
Updated: 2, 2006 | Rating: 61 | Author: Pauline Appleby | Size: 4059 kb | Freeware Go to category: Business > Calculators & Converters Similar programs | |||
128. | Astrobatics 1.1.2 (kraisoft.com) | ||
Burst through all the missions of the fierce space war in this excitingly intense action game. Turn your ultramodern space-fighter into deadly fighting machine with weapon upgrades, rocket turrets, bots and additional weapons. Encounter various modifications of enemy fighters, cruisers, mine-layers and ground | |||
Updated: 2, 2006 | Rating: 0 | Author: KraiSoft Entertainment | Size: 5746 kb | Demo Go to category: Games & Entertainment > Action Similar programs | |||
129. | QVCS-Enterprise 1.2.10 (qumasoft.com) | ||
history by a number of criteria, including checkin date, filename, locker, etc. Can filter the revision history to show only those revisions that pass the filter criteria. Allows the user to sort and filter the list of files that it displays. File filtering allows the user to limit the set of files | |||
Updated: 2, 2006 | Rating: 0 | Author: Jim Voris | Size: 2652 kb | Shareware Go to category: Development > Other Similar programs | |||
130. | FlowChartX control 4 (mindfusion.org) | ||
include an alignment grid; shadow effects; scrolling and zooming; locking; z-order; and pen styles. Diagrams can be printed, exported as image files, stored in OLE compound documents or in separate documents. The control's programming model comprises more than 600 methods, properties, and events. Full source code is available for purchase too, giving you unlimited ability to | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 3787 kb | Commercial Go to category: Development > Active X Similar programs | |||
131. | FlowChartX control 4 (nocache.mindfusion.org) | ||
include an alignment grid; shadow effects; scrolling and zooming; locking; z-order; and pen styles. Diagrams can be printed, exported as image files, stored in OLE compound documents or in separate documents. The control's programming model comprises more than 600 methods, properties, and events. Full source code is available for purchase too, giving you unlimited ability to | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 3787 kb | Commercial Go to category: Development > Active X Similar programs | |||
132. | FlowChartX control 4 (mindfusion.org) | ||
include an alignment grid; shadow effects; scrolling and zooming; locking; z-order; and pen styles. Diagrams can be printed, exported as image files, stored in OLE compound documents or in separate documents. The control's programming model comprises more than 600 methods, properties, and events. Full source code is available for purchase too, giving you unlimited ability to | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 3787 kb | Commercial Go to category: Development > Active X Similar programs | |||
133. | TurboNote+ desktop sticky notes v6.0 (turbonote.com) | ||
Web and email addresses. Change note colors and sizes, set alarms, lock them and keep your screen uncluttered by hiding them. Use handy templates for common messages or make up your own style with optional rich text editing, transparency control and images. TurboNotes stay around when you turn your computer off, and are automatically backed up. TurboNote+'s Quick Launch feature also | |||
Updated: 2, 2006 | Rating: 173 | Author: Vicki Hyde | Size: 1616 kb | Shareware Go to category: Business > Other Similar programs | |||
134. | Time & Chaos 6.0.4.5 (chaossoftware.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 2, 2006 | Rating: 0 | Author: Bill Tiede | Size: 4171 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
135. | eBooksWriter PRO 2005.15.195 (visualvision.com) | ||
- you can assign different passwords for different users; - "lock to PC" personal key protection with the CBProtect Virtual Vault service; - music and video: AVI MPEG WMV......; - frames, text styles, popup windows, rollover / mouse over sensitive images, visual linking: feature rich, easy to use, fast; - forms and shopping cart (Gold edition) - plugin capabilities (e.g. the | |||
Updated: 2, 2006 | Rating: 89 | Author: Aldo Ghigliano | Size: 2460 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
136. | AudioLabel CD/DVD Labeler 3.20 (audiolabel.com) | ||
and filename. Unlike other cd labeling software, you'll never be locked into a particular brand of label paper. All popular brands are supported and even non-standard labels can be adjusted using the "Label Alignment Wizard". Includes support for Epson and Canon direct to CD printing. No matter what kind of paper, our cd cover maker can print your labels with ease. Smart cd label | |||
Updated: 2, 2006 | Rating: 228 | Author: Cripple Creek Software | Size: 3870 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
137. | Desktop Sticky Notes Free 4.0 (sticky-notes.net) | ||
can accelerate your work with electronic sticky notes using hotkeys, lock sticky notes. All desktop sticky notes contain information about user and time of creation. Ability to create computer sticky notes with different priorities, hide sticky notes or place them on the desktop, hide note's body and | |||
Updated: 9, 2005 | Rating: 42 | Author: Sticky-Notes. net | Size: 1400 kb | Freeware Similar programs | |||
138. | Netjini 1.0 (168.144.45.89) | ||
monitor) d. most used protocol e. which device lock network f. which device generate erronious trafic g. The most used 5/10/15/N application and used ones h. 5/10/15/N MAC addresses and IPs which generate the most packet on network. i. 5/10/15/N MAC addresses and IPs which used bandwith and erroreous ones The Application enables you to see the | |||
Updated: 9, 2005 | Rating: 0 | Author: Ertugrul Akbas | Size: 35156 kb | Commercial Similar programs | |||
139. | NotesPlusPlus 5.5 (notesplusplus.com) | ||
settings for newly created notes; accelerate work using hotkeys; lock sticky notes to prevent unauthorized use; import *.txt and *.rtf files to sticky notes; save sticky notes in *.txt, *.rtf formats; save sticky notes as pictures (*.jpg, *.bmp formats). Notes ++ is organized to maintain three security levels that ensures safe operation in a multiuser environment and allows you to | |||
Updated: 9, 2005 | Rating: 0 | Author: NotesPlusPlus. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
140. | Sticky Notes Free 4.0 (sticky-notes.net) | ||
can accelerate your work with electronic sticky notes using hotkeys, lock sticky notes. All desktop sticky notes contain information about user and time of creation. Ability to create computer sticky notes with different priorities, hide sticky notes or place them on the desktop, hide note's body and | |||
Updated: 9, 2005 | Rating: 0 | Author: Sticky-Notes. net | Size: 1400 kb | Freeware Go to category: Business > PIMS & Calendars Similar programs | |||
141. | Free Sticky Notes 4.0 (freestickynotes.com) | ||
protect computer sticky notes from casual editing/deleting using lock command. Sticky notes settings including default settings can be modified to your preference. You can choose appearance for each sticky note: title customization (background color, font), body customization (background color, font), size customization (manually, zoom feature). Free Sticky Notes resides in the | |||
Updated: 9, 2005 | Rating: 0 | Author: FreeStickyNotes. com | Size: 1200 kb | Freeware Go to category: Business > PIMS & Calendars Similar programs | |||
142. | Sticky Notes Std 5.0 (morun.net) | ||
over LAN/Internet or via e-mail, attach files/urls to sticky notes, lock sticky notes to prevent unauthorized use, import .txt and .rtf files to sticky notes, save sticky note in *.txt, *.rtf formats; save sticky note as pictures (*.jpg, *.bmp formats). MoRUN.net Sticker provides an easy way to write down important ideas and thoughts. That way important information will never be lost | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. net | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
143. | MoRUN.net Sticker 5.0 (morun.com) | ||
over LAN/Internet or via e-mail, attach files/urls to sticky notes, lock sticky notes to prevent unauthorized use, import .txt and .rtf files to sticky notes, save sticky note in *.txt, *.rtf formats; save sticky note as pictures (*.jpg, *.bmp formats). MoRUN.net Sticker provides an easy way to write down important ideas and thoughts. That way important information will never be lost | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
144. | CryptArchiver 1.2.1.0 (winencrypt.com) | ||
It's really easy to hide, encrypt and password protect data with CryptArchiver. All you do is drag-and-drop your important files and folders into an encrypted drive - just like an ordinary drive! CryptArchiver has an intuitive and easy-to-use interface. CryptArchiver Lite is encryption software for the | |||
Updated: 9, 2005 | Rating: 27 | Author: WinEncrypt | Size: 1524 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
145. | CleanMantra 3.0 (pcmantra.com) | ||
Files, Windows Run and Search History, recently viewed documents, Locked Index.Dat files, Registry Streams, various System Logs, Windows Temp folders and files, Clipboard Data and lots more. Heavily loaded with features like user friendly, active protection shield, personalized cleaning, Plugin | |||
Updated: 9, 2005 | Rating: 0 | Author: PC Mantra | Size: 656 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
146. | LoanAmortizer Standard Edition 3.1 (loanamortizer.com) | ||
Standard Edition has a network supporting functions with file locking module that makes it ideal to work in a Network Loan amortization and payment schedule preparation and printing application suitable for personal and business use. This is an award winning financial application helping you create superb loan schedules and loan output data. Install | |||
Updated: 9, 2005 | Rating: 0 | Author: George Athannassov | Size: 1407 kb | Shareware Go to category: Business > Other Similar programs | |||
147. | TurboNote 3.4 (turbonote.com) | ||
change note colours and sizes, have them ring alarms, print them, lock them and keep your screen uncluttered by hiding them. Notes even stay around when you turn your computer off. TurboNote's Quick Launch feature also lets you open Web addresses, programs and files which appear in notes, simply by | |||
Updated: 9, 2005 | Rating: 1234 | Author: Peter Hyde | Size: 542 kb | Freeware Go to category: Business > Other Similar programs | |||
148. | 12Ghosts Wash 7.10 (12ghosts.com) | ||
as well as most-recently-used menus are wiped. It even deletes locked files (files that are in use, for example those ominous "index.dat" files). 12-Wash queues deletion for the next Windows restart when the files are no longer locked! You may extend the washing with any user defined item. Personal files, complete folders, certain file types, for example all *.chk and *.tmp | |||
Updated: 9, 2005 | Rating: 232 | Author: Philip Ahrens | Size: 1500 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
149. | SimLD Lite 1.01 (simpliciti.biz) | ||
locked browser is ideal for use for common access PC's where limited or restricted internet usage is provided for users in places such as retail, libraries, banks, hospitals and clinics as well as universities and schools. Includes PC and Browser lockdown. Limits users access to browser only on the PC. Configurable browser , home page,fiull screen or Navigation bar etc | |||
Updated: 9, 2005 | Rating: 0 | Author: dave campbell | Size: 5200 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
150. | 12Ghosts Shredder 7.10 (12ghosts.com) | ||
drag and shred, DoD conform, Wipe Disk. Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover files from your disk! Nobody will even find out the previous name or file size. The file can be overwritten several times | |||
Updated: 9, 2005 | Rating: 251 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
151. | Snare Micro Server 1.2 (intersectalliance.com) | ||
The Snare Micro Server is a program that provides a central collection facility for a variety of log sources, including Snare Agents for Windows, Solaris, AIX, Irix, ISA Server, IIS Server, Lotus Notes (and others), plus any device capable of sending data to a syslog server. Snare is currently used by | |||
Updated: 9, 2005 | Rating: 0 | Author: InterSect Alliance | Size: 439 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
152. | Aesthetic Memory Journal 1.03 (blackobelisksoftware.com) | ||
encryption, quick backup, font styles, templates, inactivity lock, quick entry links, unique entry titles, program shortcuts, quick inserts, auto-word complete, phases of the moon, entry search, title search, list and calendar views. Give The Aesthetic Memory Journal a try for 30 days! Aesthetic Memory Journal, software to record the daily events of your life both in words and | |||
Updated: 9, 2005 | Rating: 0 | Author: Black Obelisk Software | Size: 2567 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
153. | Picture and Video Encrypt 2.03b (softdd.com) | ||
Make any of your videos or pictures encrypted so they cannot be viewed by anyone except you. This software will allow you to prevent access by encrypting any media files, and will even disguise the names of the videos or pictures so they cannot be recognized by anyone else. You can easily decrypt and return | |||
Updated: 9, 2005 | Rating: 42 | Author: SoftDD Software | Size: 576 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
154. | web based msde dba tool - Shusheng SQL Tool 1.0 (websqltool.com) | ||
Jobs, Job Steps and Schedules. o Monitor connections, locks and performance of SQL server. Kill bad process. o Administrate security for server logins (Windows and SQL accounts), database users and roles. o Assign permission to user(s), role(s), object(s). Support column level permission. o Backup, Restore and Repair database. Compress Transaction Log. For | |||
Updated: 9, 2005 | Rating: 0 | Author: Shusheng Zhou | Size: 819 kb | Freeware Go to category: Business > Databases & Tools Similar programs | |||
155. | Arum Switcher 1.42 (sprigsoft.com) | ||
capitalize the first letter in a name or if you forget to turn Caps Lock off. Also allows you correct a text mistakenly entered with improper layout The program supports ALL | |||
Updated: 9, 2005 | Rating: 0 | Author: SprigSoft | Size: 454 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
156. | fsMechanic 1.1 (freewebs.com) | ||
network) disks visible by the host operating system. Allows save locked files (such as swap-file, Registry, $MFT, etc. ). Quick links to "My documents", "Shared documents", "My pictures", "My music". Recoverable files: That have been deleted bypassing Recycle Bin, or when Recycle Bin has | |||
Updated: 9, 2005 | Rating: 16 | Author: Alexey Babenko | Size: 438 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
157. | GiPo@FileUtilities 2.9 (gibinsoft.net) | ||
very useful when the user needs to replace or delete files which are locked by other applications, loaded into the memory or just cannot be changed until next system boot. GiPo@DirMonitor. File system changes monitoring utility for Windows NT/2000/XP. It allows to select the folder and to customize | |||
Updated: 9, 2005 | Rating: 0 | Author: Igor Artemov | Size: 867 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
158. | Zip Backup to CD 3.18 (zip-backup.com) | ||
as long as the application that is using the file does not have it locked for read access. Therefore you can backup the complete system if you are running Windows 95, 98, ME. If you are running Windows NT, 2000 or XP you have the option to include the registry and system state, which enables you to | |||
Updated: 9, 2005 | Rating: 16 | Author: Rene Mogensen | Size: 946 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
159. | PowerControl 1.0 (onlimemedia.com) | ||
will allow you to make Shutdown, Reboot, Hibrnete, Logoff, Standby, Lock the local or removed computer (or several computers). As you may may awake the removed computer with the help of function Wake-On-LAN. You can specify a delay, which can either be an absolute time (eg. 8pm) or a relative time (eg. "20 minutes from now"), during which a message you specify can be displayed | |||
Updated: 9, 2005 | Rating: 20 | Author: Pavel Abraksas | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
160. | Quick ShutDown 2.6 (winutility.com) | ||
that allows to shutdown, reboot, logoff, hibernate, standby or lock your Windows session with a mouse click. When Quick ShutDown is running, an accurate miniature icon appears on the taskbar on the end opposite the Start button (next to the clock). Right-click on the icon and you have a choice to shutdown, reboot, standby, hibernate, lock, logoff and eject removable media | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 508 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
161. | SecurDesk! 5.32 (cursorarts.com) | ||
Whether you are responsible for multiple computers in a corporate office, or just need a way to keep novice users from tampering with the system settings, SecurDesk! offers many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
162. | SecurDesk! LV 5.32 (cursorarts.net) | ||
highly customizable desktop environment for Windows which locks down icons, buttons and hotspots. Your desktop can hold multiple animated icons, sound, buttons, wallpaper, images, text, and other elements. You can spread icons across multiple password-protected pages so you have much more room to | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 3168 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
163. | Security Folder 2.0 (security-folder.com) | ||
These days computers are everywhere. Reliable and tireless machines replace human beings at dull routine tasks in almost every area. Each day we tend to rely more and more on electronics as storage media and information processing and distribution systems. A decade ago, our puny hard drives contained hardly a | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 515 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
164. | xReminder Pro 4.2 (xreminder.com) | ||
xReminder Pro is an elegant-looking event-based personal information manager that can help you remember birthdays, holidays and other special events. It starts automatically with Windows and minimizes to the system tray from which you can create new reminders in a few mouse clicks. You can create your own | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Kulemin | Size: 1780 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
165. | Clipboard Express 3.2.7 (cheqsoft.com) | ||
later reference. Find your IP address. Change text case and fix Caps Lock Typing errors. Marvellous hotkey support. Rapid navigation with keys or mouse. Auto Run and Start-in-Tray options. Find your key information readily and quickly. Users Rave! Try it, then try and do without it. Performance | |||
Updated: 9, 2005 | Rating: 0 | Author: David Hingston | Size: 3845 kb Go to category: System Utilities > Clipboard Tools Similar programs | |||
166. | MySecretFolder 3.0 (winability.com) | ||
for Windows Me/98 and Windows XP/2000. You can hide or lock with password your personal folder on your computer, on both NTFS and FAT/FAT32 volumes. Stealth mode of operation, hot key activation, protection from Windows and Office applications, as well as from MS-DOS programs. Highly customizable and user-friendly. http://www.my-secret-folder.com/ MySecretFolder - You can | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrei Belogortseff | Size: 402 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
167. | GiPo@FileUtilities 2.9 (gibinsoft.net) | ||
very useful when the user needs to replace or delete files which are locked by other applications, loaded into the memory or just cannot be changed until next system boot. GiPo@DirMonitor. File system changes monitoring utility for Windows NT/2000/XP. It allows to select the folder and to customize | |||
Updated: 9, 2005 | Rating: 0 | Author: Igor Artemov | Size: 908 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
168. | Iconic Tray 1.21 (dnsoft.swrus.com) | ||
Iconic Tray is a tiny utility which lets you minimize any window either to the system tray (notification area in Windows XP), or to a special new tray provided by Iconic Tray itself (see image). Whichever method you choose - bye bye those clogged up taskbars! Iconic Tray is very useful to hide seldom used | |||
Updated: 9, 2005 | Rating: 48 | Author: Dmitry Nikitin | Size: 47 kb | Shareware Go to category: Desktop > Other Similar programs | |||
169. | KidsWatch Time Control 2.1 (kidswatch.com) | ||
out. Block younger siblings from gaining access to the Internet. Lock down the computer to prevent your child from pirating music or installing inappropriate software. Easily share computer time among siblings. The combinations are endless! Mix and match the time, duration and program options for each child and create the schedules that suite your family's needs. KidsWatch Time | |||
Updated: 9, 2005 | Rating: 39 | Author: Larry Zarou | Size: 3155 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
170. | LockEXE 2.0 (mazepath.com) | ||
permission! You can either browse for the program you want to lock, or simply drag it to the select box! Nothing could be easier! Set the password and click Lock. The program will no longer run without the password, there is no way around it! So Easy to LockEXE can password protect your programs. Your email, word processor, browser or ANY other programs you choose | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 145 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
171. | LockIt XP 3.3 (killersoftware.com) | ||
a file, just copy your file(s) or folders to a defined 'Locked Files' folder and it will be encrypted and password protected! LockIt XP is an easy-to-use Windows 95/98/ME/XP/NT/2K utility to password protect any files and folders in seconds.LockIt XP will sit in your tray, and to password protect a file, just copy your file(s) or folders to a defined 'Locked | |||
Updated: 9, 2005 | Rating: 113 | Author: Rob Zino | Size: 960 kb | Demo Go to category: System Utilities > Other Similar programs | |||
172. | PalmTree 3.5 (clickok.co.uk) | ||
protect, lock and hide folders or directories and their subdirectories and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full | |||
Updated: 9, 2005 | Rating: 42 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
173. | Password Depot 2.0.8 (hello-engines.com) | ||
help of the wizards. - Perfect local security: You can use the lock function to restrict other user’s access to your personal passwords. - Passwords analyzer: Check and improve the quality of your passwords. - Decrypt and encrypt external files. - Use variables in URLs to meet all the | |||
Updated: 9, 2005 | Rating: 42 | Author: AceBIT GmbH | Size: 5265 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
174. | Clipboard Express Pro 3.2.7 (cheqsoft.com) | ||
later reference. Find your IP address. Change text case and fix Caps Lock Typing errors. Marvellous hotkey support. Rapid navigation with keys or mouse. Auto Run and Start-in-Tray options. Find your key information readily and quickly. Users Rave! Try it, then try and do without it. Performance | |||
Updated: 9, 2005 | Rating: 0 | Author: David Hingston | Size: 3845 kb Go to category: System Utilities > Clipboard Tools Similar programs | |||
175. | AlertMobile Pro 4.0.1 (softsecurity.com) | ||
of all active processes from monitored processes list - Locking of active process - Locking of all active processes from monitored processes list - Dismounting of all protected drives - Tracing the route of stolen or lost notebook or desktop PC - Sending to mobile phone the confirmation of command execution status AlertMobile can be used by security | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 593 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
176. | AllnSync 3.5.2 (rlegsoftware.com) | ||
the source. This version has support for backing up files that are locked by their applications, so Silent Scan will get all opened files. Select to sync sub folders. Only $16.50 US Fast and easy to use Directory-File synchronizer backs-up critical files in a directory and it's subdirectories on two different drives on the same computer or over a network. Silent-Scan watches for | |||
Updated: 9, 2005 | Rating: 0 | Author: Ray Giovagnoli | Size: 1554 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
177. | The Easy Bee 3.1.4 (theeasybee.com) | ||
design the layout of dashboard pages. The product automatically locks all agents that operate on password-protected pages, hiding the gathered content and preventing agent edition. A global password chosen by the user is used to unlock such private content. Files related to private agents are | |||
Updated: 9, 2005 | Rating: 0 | Author: Altercept | Size: 3463 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
178. | Virtual Flower 1.2 (homepage.ntlworld.com) | ||
Create flowers and geometrical patterns in 3D. Watch them grow or unfold. A swirling pattern of stars suddenly coalesces into a geodesic sphere with all the points gracefully touching. Navigate a forest of rustling leaves, or visit an island with exotic flowers. The files are extremely tiny, most are four or A swirling pattern of stars suddenly coalesces into a geodesic sphere with the points gracefully touching. Save as VRML, animated jpegs, flash movies, or animation frames | |||
Updated: 9, 2005 | Rating: 0 | Author: Robert Walker | Size: 2618 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
179. | AlertMobile Pro 4.0.1 (softsecurity.com) | ||
of all active processes from monitored processes list - Locking of active process - Locking of all active processes from monitored processes list - Dismounting of all protected drives - Tracing the route of stolen or lost notebook or desktop PC - Sending to mobile phone the confirmation of command execution status AlertMobile can be used by security | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 593 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
180. | ASP/PHP Web Application Builder 6.08 (getafile.com) | ||
/ multi option search forms, Multi-User capability with record locking, Fully definable field and table level security permissions. Generates pure, editable ASP or PHP code from fully customisable Code templates. Options are set using an intuitive VB/Delphi like Object Inspector. ASP/PHP Web Script Generation Wizard that builds secure, multi-user, relational web database | |||
Updated: 9, 2005 | Rating: 120 | Author: Development Manager | Size: 4455 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
181. | Copysafe Pro 2.0 (artistscope.com) | ||
not able to copy the images in any way. Options include Domain Lock, targeted hyperlink on the image, several display options, status messages, picture frames, batch file import and processing, multi-registry for use on several domains, import images by the folder and batch process more than 3,000 | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 3722 kb | Demo Go to category: Web Development > HTML Tools Similar programs | |||
182. | Secure Image Free 2.2 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 4206 kb | Freeware Go to category: Web Development > HTML Tools Similar programs | |||
183. | Secure Image Pro 4.0 (artistscope.com) | ||
the images on your web site and CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
184. | ShareGuard V1 1 (padfile.zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
185. | Time & Chaos 5.6.5 (isbister.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 9, 2005 | Rating: 0 | Author: Bill Tiede | Size: 3756 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
186. | ASP/VBA/COM ActiveX Dictionary object 1.0 (pstruh.cz) | ||
to another dictionary object in the same process (Connect method). Lock and Unlock methods to synchronize multithreaded tasks. Items and Keys enumerators. Other functionality Share Application/Session variables in ASP (see ASP - Share application variables sample) Free-threaded hi-speed | |||
Updated: 9, 2005 | Rating: 0 | Author: Antonin Foller | Size: 140 kb | Demo Go to category: Web Development > ASP & PHP Similar programs | |||
187. | Tile Panic 1.1 (glipsentertainmentinc.com) | ||
of the same color are touching, the player gets points, and they lock down to the playfield, becoming a obstacle. 7 different game styles (including the Progressive game with 65 levels that slowly mutates as the player finishes levels.) 10 different 'themes' for the tiles, and the ability | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory L. Lipscomb | Size: 1300 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
188. | web based msde dba tool - Shusheng SQL Tool 1.0 (websqltool.com) | ||
Jobs, Job Steps and Schedules. o Monitor connections, locks and performance of SQL server. Kill bad process. o Administrate security for server logins (Windows and SQL accounts), database users and roles. o Assign permission to user(s), role(s), object(s). Support column level permission. o Backup, Restore and Repair database. Compress Transaction Log. For | |||
Updated: 9, 2005 | Rating: 72 | Author: Shusheng Zhou | Size: 819 kb | Freeware Go to category: Business > Databases & Tools Similar programs | |||
189. | WindowWatch 1.4.10 (dev4dev.com) | ||
can use to quickly preview the results of their efforts. It locks onto whatever window is currently active on your desktop and lets you manipulate it in a variety of ways, displaying it in various screen resolutions. You can instantly resize a window to any standard desktop size and modify the tool's built-in desktop settings or add several of your own, without altering your | |||
Updated: 9, 2005 | Rating: 0 | Author: Kirk Quinbar | Size: 231 kb | Freeware Go to category: Development > Other Similar programs | |||
190. | Easy Ejector 1.1 (softcab.com) | ||
Very small and fast CD Ejector Very small and fast CD Ejector | |||
Updated: 9, 2005 | Rating: 101 | Author: SoftCab Inc | Size: 45 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
191. | virtualCrypt 3.02 (netindiasolutions.com) | ||
virtualCrypt is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define virtual drives. These drives are like any other normal drives on | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
192. | Win Control 2004 (salfeld.com) | ||
With Win Control you can not only define the access rights each of your users should have, you can also protect the Windows Desktop from unauthorized manipulation. You can even define access privileges to system functionality for each user. Finally make an end to deleted or moved links, unlicensed copies of | |||
Updated: 9, 2005 | Rating: 0 | Author: Dierk Salfeld | Size: 2280 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
193. | Wincph encryption software 4.7 (keepsecret.net) | ||
file and folder encryption software.It protect the privacy of your sensitive files and e-mail messages by encrypting them with the highest level of security.Includes ability to store several files and folders in one encrypted archive. Ability to make self-decrypted Archive. Drag and Drop support.hides them | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuxue Tu | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
194. | Window Security Toolkit 5.0 (dmisoftware.com) | ||
Includes SHA1 160 bit and MD5 File Encryption plus Ultra Desktop Lock. An excellent program if you don't want others to be messing up with your system. Get over 51 Advanced Security Settings for Windows with this power tool ! Window Security Toolkit helps you make windows totally secured by Providing | |||
Updated: 9, 2005 | Rating: 0 | Author: Dr.Salman Zafar | Size: 1710 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
195. | WinForcer 3 (winforcer.com) | ||
Prevent unauthorised users from running any Windows application you specify. Block the desktop, Start button, Control Panel, Hide Drives or block individual folders. WinForcer is fully user configurable and supports different settings for each user or global blocking. All the items are configurable through | |||
Updated: 9, 2005 | Rating: 431 | Author: Richard Smee | Size: 2195 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
196. | WinGuardian 3.0 (webroot.com) | ||
viewing inappropriate web pages. WinGuardian also has the option to "lock down" the Windows 98/Me environment so that users can only run authorized programs. Users will not be able to modify system settings (like the Windows background wallpaper) or run unauthorized software. This is useful in helping to prevent viruses and intentional or unintentional operating system changes. An | |||
Updated: 9, 2005 | Rating: 71 | Author: Steve Thomas | Size: 1561 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
197. | WorkStation Lock 3.3 (posum.com) | ||
Lock provides simple and effective security to password protect your system at startup or on demand without involving a screen saver. It is easy to configure and requires no modifications to your current Windows system configuration and is very secure. Administrator functions are enabled for site licenses. WorkStation Lock provides simple and effective security to | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1037 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
198. | WorkStation Lock Pro 4.0 (posum.com) | ||
Lock Pro provides a simple, effective, multi-user approach to password protect your Windows NT/2000/XP Pro system quickly from the system tray, a desktop shortcut or after a period of inactivity without involving a screen saver. It provides a variety of features that make it more flexible than the native Windows locking mechanism. WorkStation Lock Pro uses Windows | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 990 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
199. | xReminder Pro 4.2 (dualitysoft.com) | ||
xReminder Pro is an elegant-looking event-based personal information manager that can help you remember birthdays, holidays and other special events. It starts automatically with Windows and minimizes to the system tray from which you can create new reminders in a few mouse clicks. You can create your own | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Kulemin | Size: 1780 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
200. | SpyPC 7.0 (xelerate.biz) | ||
pages have been searched. SpyPC allows you to log all key strokes, lock your PC, lock setup modifications, disable all system functions such as editing the registry, accessing the control panel or command line and much more. WATCH YOUR EMPLOYEES, because you never know what gets done once you are out of the office. Protect yourself from false claims with evidence such as | |||
Updated: 9, 2005 | Rating: 0 | Author: Hans Fremuth | Size: 3678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Locker software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|