|
||||||
|
||
|
Home > Locker software |
Related keywords: file locker, folder locker |
|
|
301. | RainbowGround 1.1 (desktopfay.com) | ||
brightness and contrast sliders. They also affect resulting image. Lock buttons are used to lock groups of sliders so that a) all sliders in the group are linked and moved together and b) locked sliders are not affected by Randomize button. Randomize button changes positions of | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Kozhinov | Size: 511 kb | Freeware Go to category: Graphic Apps > CAD Similar programs | |||
302. | Random Password Generator-PRO 12.1 (hirtlesoftware.com) | ||
Simply the most secure method to create passwords. Rated 5-Stars by ZDNET. This software may create up to 10,000,000 unique passwords with as many as 60 characters each in a single batch. You can run as many batchs as desired. Therefore, this software will NEVER run out of passwords, it will be useful for | |||
Updated: 9, 2005 | Rating: 79 | Author: Tim Hirtle | Size: 7568 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
303. | RebootIT 2.0 (lohja-associates.com) | ||
a server On-Demand. Free servers which have the User Interface locked by rebooting the server gracefully in the back end. There are so many memory leaks caused by applications running, terminiating, opening and closing files causing your system to become unstable through time. With RebootIT, you can refresh your systems memeory and cache on a schedule. Best of yet, it does not | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Lohja | Size: 546 kb | Demo Go to category: System Utilities > Other Similar programs | |||
304. | Recall 4.0 (acastat.com) | ||
you to organize notes and secure confidential information. You can lock files with a password or share files with other Recall | |||
Updated: 9, 2005 | Rating: 42 | Author: Phil Crewson | Size: 2639 kb | Shareware Go to category: Business > Other Similar programs | |||
305. | Registry First Aid 4.3.1 (rosecitysoftware.com) | ||
Conference! Tired of Windows crashing? Sick of having software lock up on you or taking forever to load? The problem could be all of those incorrect registry entries caused by software installations and un-installations that went awry! Not all software un-installations do a complete job leaving behind numerous nagging file references in the Windows registry pointing to files that | |||
Updated: 2, 2006 | Rating: 16 | Author: Konstantin Golovatsky | Size: 1739 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
306. | REMOTE DRiVE 1.1 (matcode.com) | ||
can see the detailed information about all users accounts, unlock locked users and alter their passwords. The HOST and CLIENT machines must be connected with a standard parallel link cable or null-modem serial cable. Easy administrative access any computer (FAT, FAT32 and NTFS) over the parallel or the serial cable connection. Run included User Manager, CHKDSK, CIA Unerase or any | |||
Updated: 9, 2005 | Rating: 16 | Author: Vitaly Evseenko | Size: 474 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
307. | Remote Performance Observer 3.0 (apexoft.com) | ||
Performing remote administration tasks: running programs, locking machines, etc. Distributed system providing detailed information on computers in a network. It performs real-time monitoring of system-critical parameters making it possible to diagnose existing and potential bottlenecks on Windows 2000/XP | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexei Polkovnikov | Size: 2660 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
308. | Remote Performance Observer 3.0 (apexoft.com) | ||
Performing remote administration tasks: running programs, locking machines, etc. Distributed system providing detailed information on computers in a network. It performs real-time monitoring of system-critical parameters making it possible to diagnose existing and potential bottlenecks on Windows 2000/XP | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexei Polkovnikov | Size: 2660 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
309. | Remote Task Manager 3.8.2 (ntutility.com) | ||
ever having to physically go to them. RTM adds the ability to lock/shutdown/reboot and to create processes on remote computers. This program is for Systems Administrators looking to simplify task and process administration across a disparate group of Windows NT/2000 machines. RTM enables a Systems Administrator to control most aspects of a remote environment. The simple-to-use | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 2339 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
310. | Remote Task Manager 3.8.2 (protect-me.com) | ||
ever having to physically go to them. RTM adds the ability to lock/shutdown/reboot and to create processes on remote computers. This program is for Systems Administrators looking to simplify task and process administration across a disparate group of Windows NT/2000 machines. RTM enables a Systems Administrator to control most aspects of a remote environment. The simple-to-use | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 2339 kb | Demo Similar programs | |||
311. | Retrieve PDF V1.0001 (software.ebandwagon.co.uk) | ||
designed for the recovery of content from PDF files that have been locked, either where you have forgotten the user password, and so cannot even open the file to read it, or if you have just forgotten the owner password, and so cannot edit, copy, or print the file. This software was designed by our inhouse team due to a requirement from the publishing department. Often we either | |||
Updated: 8, 2004 | Rating: 0 | Author: Neil Plummer | Size: 1418 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
312. | SafeBox Industry 1.0 (aidsoft.com) | ||
Signature inside Package. Windows Integration Menu (SendTo Menu). Locking Distribution Package using Hardware ID. SafeBox Industry is a new and powerfull file encryption solution. This application can also provide a strong protection, quite good compression, self-decrypting archives, good presentation (use skins form, splash | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
313. | SafeLogon 2.0 (gemiscorp.com) | ||
stand by and hibernate the system, start the active screen saver and lock the desktop. SafeLogon is a multi-user and password-based access control utility that enhances and complements the Windows built-in logon and authentication system. It allows you to protect your system at home and office from unauthorized access, and much | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 2291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
314. | SAV-MailChecker Pro 1.1 (sav-soft.com) | ||
following ways: -Show a message -Play a sound -Blink with Scroll Lock led on your keyboard -Run a program -Show the number of messages on TaskTray and change it’s icon If you receive large amounts of e-mail messages and you need to keep track on new messages on a regular basis without launching | |||
Updated: 3, 2005 | Rating: 0 | Author: Aleksey Shevchenko | Size: 321 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
315. | Screen Loupe 2000 5.5 (gregorybraun.com) | ||
main viewing window can be resized, and an option is included to lock the current view. This makes Screen Loupe a great screen capture utility. The current coordinates of the mouse cursor and the RGB color of the pixel underneath the mouse can also be displayed. Screen Loupe also includes options to monitor a specific area of the desktop. Screen Loupe is a small utility that displays | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 426 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
316. | Screen Saver Center 0.9.214 (3SWare.com) | ||
addition, you can start default screen saver with double click and lock-up Win XP or Win 2k. Designed as system tray icon, Screen Saver Center provide start of screen saver with double click, access to Display Properties in Control Panel in two clicks and by three clicks you can select your basic | |||
Updated: 9, 2005 | Rating: 42 | Author: Ivan Mayrakov | Size: 136 kb | Shareware Go to category: Desktop > Similar programs | |||
317. | Search Launcher 1.2 (searchlauncher.com) | ||
single robust product, and more. But unlike those toolbars which are locked into a single search engine and a single web browser, Search Launcher is open and available to all search engines and web browsers. You can use it to launch searches to Google, eBay, Dogpile, Teoma, Yahoo, MSN, CNN, Dictionary | |||
Updated: 3, 2005 | Rating: 0 | Author: Van H. Phan | Size: 440 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
318. | Secret Chamber 1.0 (fullarmorstudios.com) | ||
the King protected his treasures with a complex series of jeweled locks and mechanical scarab servants. Solve the ancient puzzle, unlock the countless rooms hidden below ground, and discover the wonder of the King's genius before the scarabs can stop you. Good luck. Three game modes bless the player: Story Mode, Puzzle Mode and Survival Mode. Story mode tells the whole story, with | |||
Updated: 9, 2005 | Rating: 0 | Author: Full Armor Studios | Size: 5469 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
319. | Secura Backup Professional 2.13 (cmfperception.com) | ||
The Shadow Copy feature will backup files that are in use or locked by other programs including Outlook PST files, Exchange files and database files like MySQL/MSSQL. The incremental backups feature will prevent files that haven't been modified from being backed up every time you perform a backup. This saves time and bandwidth. Secura Backup fully supports unicode | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
320. | SecurDesk! 5.32 (cursorarts.net) | ||
Whether you are responsible for multiple computers in a corporate office, or just need a way to keep novice users from tampering with the system settings, SecurDesk! offers many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
321. | SecurDesk! 5.32 (cursorarts.com) | ||
Whether you are responsible for multiple computers in a corporate office, or just need a way to keep novice users from tampering with the system settings, SecurDesk! offers many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
322. | SecurDesk! LV 5.32 (cursorarts.com) | ||
highly customizable desktop environment for Windows which locks down icons, buttons and hotspots. Your desktop can hold multiple animated icons, sound, buttons, wallpaper, images, text, and other elements. You can spread icons across multiple password-protected pages so you have much more room to arrange your shortcuts. You can even make an irregularly shaped desktop window "skin" | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 3168 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
323. | SecurDesk! LV 5.32 (cursorarts.net) | ||
highly customizable desktop environment for Windows which locks down icons, buttons and hotspots. Your desktop can hold multiple animated icons, sound, buttons, wallpaper, images, text, and other elements. You can spread icons across multiple password-protected pages so you have much more room to | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 3168 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
324. | Secure Browser 1.72 (tropsoft.com) | ||
and specified URLs. Secure Browser has many security features like locking down or controlling other browsers and the ability to make itself the only allowed application. The administrator can also lock Secure Browser so none of the settings can be touched or the application exited. With even | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 570 kb | Demo Go to category: Network & Internet > Browsers Similar programs | |||
325. | Secure HTML Lock 1.3.2 (submitad.com) | ||
Lock html, cryptate and protect your webpages from theift! Make your website secure and prevent theft of your html source code. Secure HTML Lock is easy and fast to use, no html knowledge needed. Several bonus features included like email address protector and popup generator. You know how much | |||
Updated: 9, 2005 | Rating: 0 | Author: Stefan Fahlberg | Size: 3991 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
326. | Secure Image Express 4.0 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 2, 2006 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
327. | Secure Image Express 4.0 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 2, 2006 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
328. | Secure Image Free 2.2 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 4206 kb | Freeware Go to category: Web Development > HTML Tools Similar programs | |||
329. | Secure Image Free 2.2 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 4206 kb | Freeware Go to category: Web Development > HTML Tools Similar programs | |||
330. | Secure Image Pro 4.0 (artistscope.com) | ||
the images on your web site and CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
331. | Secure Image Pro 4.0 (artistscope.com) | ||
the images on your web site and CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
332. | Secure Password Manager 2.2.1.1 (securekit.com) | ||
password generator, backup options, auto complete sequence editor, lock, windows clipboard support, and clipboard clearing. You can organize your information into custom folders and categories, copy usernames and passwords to the clipboard and search for specific entries. Secure Password Manager 2.1 is | |||
Updated: 2, 2006 | Rating: 0 | Author: securekit kit | Size: 1327 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
333. | SecureCode Protection 1.0.2 (aidsoft.com) | ||
SecureCode is a new software protection based on the lastest techniques protection to provide a strong security to protect your software against reverse engineering and illegal copying, confidence that people can only run your application on your terms.SecureCode is not trial protection or registration | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 350 kb | Shareware Go to category: Development > Other Similar programs | |||
334. | Security Administrator 10.14 (softheap.com) | ||
Restrict access to your PC with Security Administrator. This password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your desktop. You can deny access to each individual component of several Control Panel applets | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
335. | Security Administrator 10.14 (getfreefile.com) | ||
Restrict access to your PC with Security Administrator. This password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your desktop. You can deny access to each individual component of several Control Panel applets | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
336. | Security Folder 2.0 (everstrike.com) | ||
These days computers are everywhere. Reliable and tireless machines replace human beings at dull routine tasks in almost every area. Each day we tend to rely more and more on electronics as storage media and information processing and distribution systems. A decade ago, our puny hard drives contained hardly | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
337. | Security Folder 2.0 (security-folder.com) | ||
These days computers are everywhere. Reliable and tireless machines replace human beings at dull routine tasks in almost every area. Each day we tend to rely more and more on electronics as storage media and information processing and distribution systems. A decade ago, our puny hard drives contained hardly a | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 515 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
338. | Security Forms 1.0 (securitylanding.com) | ||
Group payroll, Immediate action required, Job description, Key log, Locker agreement, Loss prevention committee, Loss prevention employee of the month, Loss prevention safety committee, Loss prevention safety committee minutes, Loss prevention safety training notice, Loss prevention training notice, Medication log, Meeting notice, Memo, Osha form 101, Osha form 174, Osha form 200 | |||
Updated: 3, 2005 | Rating: 110 | Author: Paul Pleasant | Size: 173 kb | Freeware Go to category: Business > Other Similar programs | |||
339. | Server Nanny Network Monitor 4.0.0 (ServerNanny.com) | ||
Reduce downtime and be the first to know when a server or network device fails by using Server Nanny network and server monitoring software. The last time you had a network or server failure how long was it before the problem was discovered? Minutes? Hours? Maybe even days? Use Server Nanny to recover The last time you had a network or server failure how long was it before the problem was discovered? Don't wait for employees or customers to report the problem | |||
Updated: 2, 2006 | Rating: 0 | Author: Xenos Software LLC | Size: 5575 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
340. | Settings Sentry 1.0 (spyblocker-software.com) | ||
firewall for vulnerable Internet Explorer settings. Settings Sentry Locks your settings preventing them from being tampered with. You can selectively allow or deny any setting instantaneously. Protects your start page and other selected settings. features full logging and offers visual and audio alerts. Protect your Internet Explorer | |||
Updated: 9, 2005 | Rating: 0 | Author: Paul Kurland | Size: 1216 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
341. | Sexy Party 6.0.0 (adultsexygames.com) | ||
activity maintenance screen. The game includes a child lock that prevents any minors in the household from accidentally accessing the game (with child lock enabled the game's purpose is entirely unknown!). The game can be saved and resumed at a later date. Player preferences can be saved and re-loaded. There are many other design features. However, there is | |||
Updated: 9, 2005 | Rating: 142 | Author: Richard Fairbairn | Size: 3144 kb | Demo Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
342. | ShareGuard Copy Protection 3.6 (zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 11474 kb | Shareware Go to category: Development > Other Similar programs | |||
343. | ShareGuard V1 1 (zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
344. | ShareGuard V1 1 (padfile.zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
345. | Shoot The Messenger! 1.03 (zatz.com) | ||
doesn't do: it checks every second to be sure the service is off and locked down, and it uses almost no cycles to do so. It's a feature that even a geek could love. Shoot those ads today! Shoot The Messenger! completely bans those ad windows that show up in the middle of your computer screen, even | |||
Updated: 8, 2004 | Rating: 0 | Author: David Gewirtz | Size: 3511 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
346. | ShutDownOne 3.02 (dimaware.com) | ||
can choose from a full shutdown, reboot, log off, power off and also lock the work station, activate hibernate. Any operation can be executed as an emergency (force) shut down. In addition, you can perform scheduled shutdowns, no-activity action and more. ShutDownOne also allows you to perform remote shutdowns for machines on the network and supports commandline operation, as well as | |||
Updated: 9, 2005 | Rating: 2097 | Author: D i m a W a r e | Size: 263 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
347. | SimLD Lite 1.01 (simpliciti.biz) | ||
locked browser is ideal for use for common access PC's where limited or restricted internet usage is provided for users in places such as retail, libraries, banks, hospitals and clinics as well as universities and schools. Includes PC and Browser lockdown. Limits users access to browser only on the PC. Configurable browser , home page,fiull screen or Navigation bar etc | |||
Updated: 9, 2005 | Rating: 0 | Author: dave campbell | Size: 5200 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
348. | Simpliciti Family Browser 1.02 (simpliciti.biz) | ||
Simpliciti browser provides security and safety for your children using the internet. It includes popup control, child lockdown to only the sites you allow as well as being able to set usage time limits. Simpliciti allows adult family members to quickly create their own unique, private and password protected | |||
Updated: 9, 2005 | Rating: 0 | Author: dave campbell | Size: 5800 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
349. | Sleep Timer Pro 4.8.2 (what-the.net) | ||
Sleep Timer Pro is an all-in-one System Utility to automate the use of your system. With Sleep Timer you may shutdown, reboot, or set an alarm all with a few clicks of the mouse. Set your time in intervals like 15,30,45,60,90 minutes. Version 3.x+ now includes Clock Syncronization to GMT/Navy Clock in minute | |||
Updated: 2, 2006 | Rating: 61 | Size: 4813 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
350. | Snake Snap 2 1.0 (andreasklimke.de) | ||
creatures, only to optain some tiny diamond. Some treasures are even locked up behind doors and other hard-to-overcome mechanisms. But not all hope is lost: there are some nice goodies like dynamite or laser devices to be found to get rid of those annoying monsters, or to send this mean snake catcher | |||
Updated: 9, 2005 | Rating: 0 | Author: Andreas Klimke | Size: 157 kb | Shareware Go to category: Games & Entertainment > Arcade Similar programs | |||
351. | Snare Agent for Windows 2.5.1 (intersectalliance.com) | ||
Snare for Windows is a Windows NT, Windows 2000, Windows XP, and Windows 2003 compatible service that interacts with the underlying Windows Eventlog subsystem to facilitate remote, real-time transfer of event log information. Event logs from the Security, Application and System logs, as well as the new | |||
Updated: 3, 2006 | Rating: 259 | Author: InterSect Alliance | Size: 600 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
352. | Snare Micro Server 1.2 (intersectalliance.com) | ||
The Snare Micro Server is a program that provides a central collection facility for a variety of log sources, including Snare Agents for Windows, Solaris, AIX, Irix, ISA Server, IIS Server, Lotus Notes (and others), plus any device capable of sending data to a syslog server. Snare is currently used by | |||
Updated: 9, 2005 | Rating: 0 | Author: InterSect Alliance | Size: 439 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
353. | Softany Monitor Control 2.04 (softany.com) | ||
2. Manually turn off your computer's monitor and synchronously lock your computer. 3. Manually start default screensaver. 4. Manually start any screensaver installed in your computer. 5. Automatically disable screensaver when special programs start. 6. Quick change screensaver settings. 7. Hotkey suppots 8. Allow disabling Power Schemes after disabling screensaver. 9 | |||
Updated: 2, 2006 | Rating: 1471 | Author: Softany start screensaver team | Size: 747 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
354. | SoftwareShield System 2.4.10.17 (softwareshield.com) | ||
such as the number of times feature X has been executed. Node-locked (named-host) - Software is licensed for unlimited concurrent use on a single computer system. Countless combinations are possible, allowing you to create the exact license you need. The SoftwareShield System is a full featured licensing and copy-protection system for software developers who create Windows | |||
Updated: 9, 2005 | Rating: 0 | Author: Zack Wickes | Size: 9037 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
355. | SourceGuardian PHP Encoder 5.5 (sourceguardian.com) | ||
+ Automatic backup of source files + Deployment options + Lock to domain names, IP addresses or LAN hardware + Timeout your scripts at specific dates or days in the future + Encoded files run under Linux, FreeBSD, Windows, Mac OS X, Solaris, HP-UX + Require no changes to the standard web server installation + Free minor updates + Technical support SourceGuardian | |||
Updated: 2, 2006 | Rating: 174 | Author: Sales Department | Size: 3580 kb | Demo Go to category: Web Development > ASP & PHP Similar programs | |||
356. | Spam Trapper for Outlook 1.3.3 (brigsoft.com) | ||
(*) Spam Trapper is a multilevel spam filter for Microsoft Outlook version 2000 and later. It is a plug-in component with clear convenient interface. (*) The first level checks your address book and validates all letters from your clients. So letters from your friends and colleagues are never processed as | |||
Updated: 9, 2005 | Rating: 0 | Author: Rest Alex | Size: 493 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
357. | SpyPC 7.0 (xelerate.biz) | ||
pages have been searched. SpyPC allows you to log all key strokes, lock your PC, lock setup modifications, disable all system functions such as editing the registry, accessing the control panel or command line and much more. WATCH YOUR EMPLOYEES, because you never know what gets done once you are out of the office. Protect yourself from false claims with evidence such as | |||
Updated: 9, 2005 | Rating: 0 | Author: Hans Fremuth | Size: 3678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
358. | SQLExecMS 2.6 (laplas-soft.com) | ||
server performance counters;Check utilization of proc cache;Watch locks; Review space used by DB files, tables and indexes; Manage DB file and filegroups;Turn on and off trace flags;Manage scheduled jobs; Change SQL server and database options;Backup and restore databases; Analyze fragmentation of | |||
Updated: 2, 2006 | Rating: 433 | Author: Oleg Dantchenko | Size: 4928 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
359. | Starscape 1.5c (moonpod.com) | ||
Moonpod’s Starscape mixes old school arcade game play values with characterisation and involving plot to deepen the whole experience. With most of its crew missing and its weapons systems ruined the space research station Aegis is all but lost. As the last remaining pilot you must help rebuild the | |||
Updated: 9, 2005 | Rating: 16 | Author: Mark Featherstone | Size: 13989 kb | Shareware Go to category: Games & Entertainment > Action Similar programs | |||
360. | StartPro 2.0 (daesoft.com) | ||
bug fixes, the correction of a major bug that caused StartPro to lock up when used in Windows 2000, and the correction of a bug that prevented StartPro from retaining its window size and position. StartPro allows users to add and remove programs located in the Registry, Startup folder, and win.ini file that load during | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Price | Size: 440 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
361. | Sticky Notes Free 4.0 (sticky-notes.net) | ||
can accelerate your work with electronic sticky notes using hotkeys, lock sticky notes. All desktop sticky notes contain information about user and time of creation. Ability to create computer sticky notes with different priorities, hide sticky notes or place them on the desktop, hide note's body and | |||
Updated: 9, 2005 | Rating: 0 | Author: Sticky-Notes. net | Size: 1400 kb | Freeware Go to category: Business > PIMS & Calendars Similar programs | |||
362. | Sticky Notes Std 5.0 (morun.net) | ||
over LAN/Internet or via e-mail, attach files/urls to sticky notes, lock sticky notes to prevent unauthorized use, import .txt and .rtf files to sticky notes, save sticky note in *.txt, *.rtf formats; save sticky note as pictures (*.jpg, *.bmp formats). MoRUN.net Sticker provides an easy way to write down important ideas and thoughts. That way important information will never be lost | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. net | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
363. | Sunglass++ 1.0 (sunglass.myrice.com) | ||
Sunglass++ is a hip software tool that helps you to make your translucent e-Card (SunCard)! SunCard is a new kind of e-Card, which has a translucent interface, you can choose 9 very cool effects when you make the SunCard, you can then input anything you want, of course. The size of SunCard is very very | |||
Updated: 3, 2005 | Rating: 0 | Author: Christ Lee | Size: 631 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
364. | Super Encryption Box 2.4 (loosesoft.com) | ||
Super Encryptoin Box is a powerful and easy-to-use program for encrypting and protecting your data and save you disk space--perfect for offices that need to keep important documents secure. Super Encryptoin Box adds a context menu entry to all files and f | |||
Updated: 3, 2005 | Rating: 0 | Author: Ming Dave | Size: 135 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
365. | Super Password Guard 3.1 (topaim.net) | ||
accounts into logical categories for easier access. 4. Security lock. you can set manual or automatically lock the program. So the program will lock automatically(or manual) if you are away from your computer. 5. Built-in password generator. Includes password generator that generates | |||
Updated: 3, 2005 | Rating: 48 | Author: Cheng Zheng | Size: 2000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
366. | Super Utilities 6.25 (superlogix.net) | ||
in protecting and securing sensitive information. You can hide or lock folders, clean your system tracks, password-protect applications that hold sensitive data, quickly and securely delete files, and hide IE Favorites and Start menu items from view. 3.System Maintenance will help automate computer | |||
Updated: 3, 2006 | Rating: 16 | Author: li jiangnan | Size: 3328 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
367. | System Mechanic 6.0s (iolo.com) | ||
components, installed software, hardware, and more. Instantly Lock Down your System with PC Security Optimizer by automatically finding and repairing Windows security flaws that leave you open to attack from computer enemies such as spyware, adware, viruses, hackers, and identity thieves. Keep your System Spotless with the PC Cleanup Wizard by automatically removing all forms of | |||
Updated: 2, 2006 | Rating: 45 | Author: iolo technologies | Size: 11980 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
368. | System Mechanic Professional 6.0s (iolo.com) | ||
components, installed software, hardware, and more. Instantly Lock Down your System with PC Security Optimizer by automatically finding and repairing Windows security flaws that leave you open to attack from computer enemies such as spyware, adware, viruses, hackers, and identity thieves. Keep your System Spotless with the PC Cleanup Wizard by automatically removing all forms of | |||
Updated: 2, 2006 | Rating: 64 | Author: iolo technologies | Size: 33888 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
369. | System Protector 1.9 (aidsoft.com) | ||
Command Prompt" and "Disable Registry Editor" options.Free screen-lock program is included. Some of the program options are:Customize your Control-PanelCustomize Display PropertiesHide/customize Network settingsCustomize Start MenuHide all drives in Control Panel (A:\, C:\, D:\)Customize your Video AdapterCustomize your Active | |||
Updated: 9, 2005 | Rating: 0 | Author: Dimitar Terziev | Size: 1 kb | Demo Go to category: System Utilities > Other Similar programs | |||
370. | System Sentry 2.2.05 (easydesksoftware.com) | ||
file version conflicts that can cause your system to often lock up. It finds system files that have been added or deleted. - System Version Checker finds and fixes incorrect system file versions. - Extension Association, provides an in-depth analysis of any and all program extensions that may exist on your PC. For example, the Current Key Value, Project Value, the | |||
Updated: 9, 2005 | Rating: 0 | Author: Guy Young | Size: 3649 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
371. | Task Commander 2.5 (resortlabs.com) | ||
monitor displays the most resource-hungry apps and helps prevent lock-ups and slowdowns. Tight integration with desktop context menu, taskbar, IE and Windows Explorer makes advanced applications management universally available system-wide! Download FREE trial version today and see the difference! Use this unique application launcher\management\maintenance solution to free up | |||
Updated: 2, 2006 | Rating: 0 | Author: Grishin Sergey | Size: 2219 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
372. | Task Lock 6.2 (posum.com) | ||
Lock provides a simple and effective way to password protect specified applications for Windows no matter how they are executed. Its security is easy to configure and requires little to no modifications to your current system configuration. Administrator functions are enabled for site licenses. Task Lock provides simple and effective password security for specified | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1232 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
373. | The Easy Bee 3.1.4 (theeasybee.com) | ||
design the layout of dashboard pages. The product automatically locks all agents that operate on password-protected pages, hiding the gathered content and preventing agent edition. A global password chosen by the user is used to unlock such private content. Files related to private agents are | |||
Updated: 9, 2005 | Rating: 0 | Author: Altercept | Size: 3463 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
374. | The Easy Bee 3.1.4 (theeasybee.com) | ||
design the layout of dashboard pages. The product automatically locks all agents that operate on password-protected pages, hiding the gathered content and preventing agent edition. A global password chosen by the user is used to unlock such private content. Files related to private agents are | |||
Updated: 9, 2005 | Rating: 0 | Author: Altercept | Size: 3463 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
375. | The Golden Guns 2.0 (nitro5.com) | ||
wheel, triple payline, double spin slot machine. It even has a wheel lock feature which gives you even more chances to win the progressive jackpot! Do you have what it takes to play The Golden Guns? Features: Raytraced realistic 3D graphics, Smooth and realistic animation, Realistic and exciting sounds, 3 wheels with wheel lock, 3 paylines and Progressive jackpot. Minimum | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Ouellet | Size: 1646 kb | Demo Go to category: Games & Entertainment > Other Similar programs | |||
376. | Tile Panic 1.1 (glipsentertainmentinc.com) | ||
of the same color are touching, the player gets points, and they lock down to the playfield, becoming a obstacle. 7 different game styles (including the Progressive game with 65 levels that slowly mutates as the player finishes levels.) 10 different 'themes' for the tiles, and the ability | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory L. Lipscomb | Size: 1300 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
377. | Time & Chaos 5.6.5 (ChaosSoftware.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 9, 2005 | Rating: 0 | Author: Bill Tiede | Size: 3756 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
378. | Time & Chaos 5.6.5 (isbister.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 9, 2005 | Rating: 0 | Author: Bill Tiede | Size: 3756 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
379. | Time & Chaos 6.0.4.5 (chaossoftware.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 2, 2006 | Rating: 0 | Author: Bill Tiede | Size: 4171 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
380. | TK ChildLock! 1.0 (competent-software.com) | ||
With ChildLock! you can limit an user's log on or log off times. Define when users can log on to your PC. If a specified user is already logged on your system on a non-logon-time, it is possible to log him off automatically. I.e. parents can control their children, so that they cannot be logged on to the | |||
Updated: 9, 2005 | Rating: 0 | Author: Timo Kosiol | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
381. | TK8 Safe 2.5 (tk8.com) | ||
use classic Copy and Paste commands. The password file can be locked if you leave the room, so the information remains always protected. Even if you forget to lock the file, the program will do this automatically after unused for some time. Advanced users have many options and additional features like multi-user support, additional information panels and automatic | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
382. | Transparent Screen Lock for WinNT/2000/XP/2003 2.10 (e-motional.com) | ||
protect your workstation or server with Transparent Screen Lock while viewing programs that are running. Any attempts to access the system will display a message box to request the password. Prevent access via CRTL-ALT-DEL. Includes a log file to track activity and failed login attempts. Save log file locally or at a remote network location. Use quick-launch icon to enable | |||
Updated: 9, 2005 | Rating: 370 | Author: Sandra Buckingham | Size: 562 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
383. | Transparent Screen Lock PRO for WinNT/2000/XP/2003 4.50 (e-motional.com) | ||
protect your workstation or server with Transparent Screen Lock PRO while viewing programs that are running. Prevent system access via CRTL-ALT-DEL. Options to remove the pocess from the Windows Task Manager and restrict configuration menus to Administrators only in order to prevent regular users from disabling or tampering with the program. Log file tracks failed logon attempts | |||
Updated: 2, 2006 | Rating: 16 | Author: Sandra Buckingham | Size: 992 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
384. | Tray Commander 2.3 (ardamax.com) | ||
off, stand by, hibernate and reboot computer Monitor power off Lock Workstation Open favorite web pages Open or close CD tray (with automatical closing) Launch Control Panel items Open files Paste text Launch screen saver Other features: Windows 98/NT/2000/XP support Hot key editor Drag & drop support Large icons in menu support Multilingual interface | |||
Updated: 2, 2006 | Rating: 0 | Author: Maxim Frolov | Size: 843 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
385. | TurboNote 3.4 (turbonote.com) | ||
change note colours and sizes, have them ring alarms, print them, lock them and keep your screen uncluttered by hiding them. Notes even stay around when you turn your computer off. TurboNote's Quick Launch feature also lets you open Web addresses, programs and files which appear in notes, simply by | |||
Updated: 9, 2005 | Rating: 1234 | Author: Peter Hyde | Size: 542 kb | Freeware Go to category: Business > Other Similar programs | |||
386. | TurboNote+ desktop sticky notes v6.0 (turbonote.com) | ||
Web and email addresses. Change note colors and sizes, set alarms, lock them and keep your screen uncluttered by hiding them. Use handy templates for common messages or make up your own style with optional rich text editing, transparency control and images. TurboNotes stay around when you turn your computer off, and are automatically backed up. TurboNote+'s Quick Launch feature also | |||
Updated: 2, 2006 | Rating: 173 | Author: Vicki Hyde | Size: 1616 kb | Shareware Go to category: Business > Other Similar programs | |||
387. | Tweaking Toolbox for Windows 3.1 (tweakingtoolbox.com) | ||
others from changing your settings, increase Windows security. Lock down Control Panel applets, Internet Explorer options; disable certain dangerous file types from running. You can change Windows 98/Me system performance, by controlling the optimization of applications when defragmenting your hard drive. Settings are changed quickly, safely, and conveniently. Includes the | |||
Updated: 9, 2005 | Rating: 0 | Author: Arie Slob | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
388. | TZ Personal Firewall 3.3.0.0 (TrackZapper.com) | ||
can shut off any unsafe connection. This program includes four inter locking security services: a firewall, an Application Control, an Internet Lock, & Zones. Allows you to Lock your PC ,so no connection will be allowed whatever it trusted or blocked. Zones monitor all incomming & | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 3458 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
389. | TZ Privacy Guard 3.1.0.0 (trackzapper.com) | ||
or some one passing by. TZ Privacy Gaurd lets you encrypt and lock your IE favorite and history folders. This does not affect within explorer other folders that are unlocked. More Features: - Encrypts and locks your favorite's folder(s) and subfolders and files within. - Encrypts and locks your history folders(s). - Encrypts and locks your personal | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 4266 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
390. | UdoRadio 2.6 (members.aol.com) | ||
We break the genre boundaries- While most Internet stations lock listeners into the same genre-specific music broadcast stations play, UdoRadio listeners build their own play lists across any music genre they like. They can mix Celtic and New Age with Jazz and Opera. Blend Blues with Bluegrass, then add Gospel and Rock. Even build a play list just for the kids! UdoRadio | |||
Updated: 9, 2005 | Rating: 90 | Author: Christopher Pope | Size: 485 kb | Freeware Go to category: Audio & Multimedia > Other Similar programs | |||
391. | Ultimate Jukebox 1.1 (ultimatejukebox.murphnet.net) | ||
screen saver, support for untagged media files, party play mode (lock it down at parties!) and the power of Winamp! Mp3, WMA, OGG & WAV Audio Player, presents your music library in an easy to use jukebox interface. Provides instant access to your music collection, perfect for the HTPC. Can run full screen with large fonts, has a queue and multiple playlist | |||
Updated: 9, 2005 | Rating: 0 | Author: Tony Murphy | Size: 2272 kb | Shareware Go to category: Audio & Multimedia > Audio File Players Similar programs | |||
392. | UltraKeyboard 2.93 (fadsoft.com) | ||
turn off the monitor, close CD tray, tune output volume, lock computer, make a window always on top... UltraKeyboard also has a useful tool called KeySpy, which is used to track all the events of keyboard. UltraKeyboard is a keyboard macro utility which can helps you make better use of your | |||
Updated: 8, 2004 | Rating: 0 | Author: Dart Zheng | Size: 379 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
393. | Universal Shield 4.0 (everstrike.com) | ||
Universal Shield 4.0 by Everstrike Software is the ultimate protection tool for your computer - hide files, folders, and drives, and set access rules using flexible security combinations for your most precious data. A unique feature of Universal Shield is the perfect combination of data hiding and encrypting | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
394. | User Control 2005 (salfeld.com) | ||
etc.) with just a few mouse clicks. Network and multi-user capacity. Lock also your desktop and disallow moving, renaming or deleting icons or changing wallpapers. User Control allows you to block any undesired window title or any application / EXE-file. On the Internet you can define exactly which contents shall be allowed and which not. Varied blocking possibilities for Windows | |||
Updated: 9, 2005 | Rating: 34 | Author: Dierk Salfeld | Size: 4027 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
395. | Vengeance or Bust 2.4 (astralent.com) | ||
of the levels in his castle. The plan backfires when the Nasty Lord locks the back door and the character has to complete all of the levels, backwards. This game has eight levels, each of which is a series of buttons that need to be pushed, while Nasties and other hazards try to prevent this goal | |||
Updated: 9, 2005 | Rating: 16 | Author: Garth Thompson | Size: 11403 kb | Shareware Go to category: Games & Entertainment > Other Similar programs | |||
396. | Virtual Flower 1.2 (homepage.ntlworld.com) | ||
Create flowers and geometrical patterns in 3D. Watch them grow or unfold. A swirling pattern of stars suddenly coalesces into a geodesic sphere with all the points gracefully touching. Navigate a forest of rustling leaves, or visit an island with exotic flowers. The files are extremely tiny, most are four or | |||
Updated: 9, 2005 | Rating: 0 | Author: Robert Walker | Size: 2063 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
397. | Virtual Flower 1.2 (homepage.ntlworld.com) | ||
Create flowers and geometrical patterns in 3D. Watch them grow or unfold. A swirling pattern of stars suddenly coalesces into a geodesic sphere with all the points gracefully touching. Navigate a forest of rustling leaves, or visit an island with exotic flowers. The files are extremely tiny, most are four or A swirling pattern of stars suddenly coalesces into a geodesic sphere with the points gracefully touching. Save as VRML, animated jpegs, flash movies, or animation frames | |||
Updated: 9, 2005 | Rating: 0 | Author: Robert Walker | Size: 2618 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
398. | virtualCrypt 3.02 (netindiasolutions.com) | ||
virtualCrypt is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define virtual drives. These drives are like any other normal drives on | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
399. | VShell 2.2.4 (promaxum.com) | ||
a multi-homed machine, control which NIC VShell listens on to better lock down access to the server. - VShell includes vsh (command-line shell utility), vcp (command-line file transfer utility), and vkeygen (public/private key generator utility). - Jail shell. Two configuration options, ChrootGroups and ChrootUsers, combine to restrict users and members of groups to their home | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 3703 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
400. | Watch Right 2002.0.77 (bpssoft.com) | ||
secret password to unlock Watch Right's monitoring control panel. - Locks log files to prevent deletion without a valid password. - Resists attempts to disable or close without a valid password. Watch Right is a simple and inexpensive parental monitoring system that empowers the concerned parent with | |||
Updated: 2, 2006 | Rating: 0 | Author: Bradley O'Keefe | Size: 2842 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Locker software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|