|
||||||
|
||
|
Home > Lock file software |
Related keywords: file, lock, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
101. | Kickstart 1.02 (westfaro.com) | ||
a particular database as well as handling security, audit trails and locking. If you want to use that stored procedure as a standard template then you can do it manually, cutting, pasting, editing and testing or you can use Kickstart to do the tedious work for you in a few simple steps. Start Kickstart and point it the database you want to work with. Load your source code into the | |||
Updated: 9, 2005 | Rating: 298 | Size: 7069 kb | Commercial Go to category: Development > Other Similar programs | |||
102. | AllnSync 3.5.2 (rlegsoftware.com) | ||
is a very fast and easy to use Directory / File synchronizer. It's main function is to synchronize critical files in a selected directory and it's sub-directories on two different drives which can be on the same computer, or different computers over a network. It is ideal for keeping files synchronized between a desktop and laptop or between | |||
Updated: 9, 2005 | Rating: 0 | Author: Ray Giovagnoli | Size: 1554 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
103. | Child Control 2005 7.153 (salfeld.com) | ||
The most optimal parental control for all Windows-PCs (incl. XP). Set time limits for the PC and/or the Internet and block/filter unwanted Internet contents. Limit access to internal Windows components and personal folders. A protocol informs you at any time as to what happened on your computer and when | |||
Updated: 9, 2005 | Rating: 16 | Author: Dierk Salfeld | Size: 3703 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
104. | XP System Sentry 2.2.05 (easydesksoftware.com) | ||
replaced, added, incorrect versions, and dates of your system files and replaces them for you. This helps avoid the often unnecessary and frustrating task of reinstalling Windows or specific problem programs. System Sentry offers the following features: - Cyclic Redundancy Check, detects files that are corrupt or possibly infected by a virus. - A utility for | |||
Updated: 9, 2005 | Rating: 39 | Author: Guy Young | Size: 3722 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
105. | fsMechanic 1.1 (freewebs.com) | ||
fsMechanic recovers deleted files and gains access to the NTFS partitions under Windows 9x. - fsMechanic uses original algorithms to recover deleted files. - fsMechanic is a tool that allows you to work with disk images just as existing disks. fsMechanic features: Well-known "Explorer" | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexey Babenko | Size: 438 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
106. | G-Lock Temp Cleaner 2.0 (glocksoft.com) | ||
Temp Cleaner finds and cleans space-wasting garbage files on your hard drive. The program searches your drives potentially unwanted files and allows you to deal with them all with just one click. It comes pre-configured with the most common junk file types and allows you to add your custom extensions. G-Lock Temp Cleaner is easy to use and allows you to | |||
Updated: 9, 2005 | Rating: 248 | Author: Alex Markov | Size: 874 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
107. | GiPo@FileUtilities 2.7 (gibinsoft.net) | ||
services: GiPo@MoveOnBoot - copying/moving/renaming/deleting files and folders on the next system boot. GiPo@DirMonitor - monitoring changes in the file system. GiPo@Mount - local folders substitution and local/remote drives mounting. GiPo@ReadTest - checking files and folders for read errors. Utilities can be integrated into shell. GiPo@MoveOnBoot | |||
Updated: 9, 2005 | Rating: 16 | Author: Igor Artemov | Size: 867 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
108. | LJConfig 1.2 (victechsoftware.com) | ||
of printer connection. It allows you to change the Density, Tray Locking, Fuser Temperature, EconoMode, REt, and Resolution settings. Version 1.2 adds support for setting the lines per page and control panel text, fixes an issue with the setup program when installing to drives other than C:, and | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Boyer | Size: 226 kb | Freeware Go to category: System Utilities > Printer Similar programs | |||
109. | Lock Folder 5.0 (realclicks.com) | ||
Lock Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
110. | LockEXE 2.0 (mazepath.com) | ||
permission! You can either browse for the program you want to lock, or simply drag it to the select box! Nothing could be easier! Set the password and click Lock. The program will no longer run without the password, there is no way around it! So Easy to LockEXE can password protect your programs. Your email, word processor, browser or ANY other programs you choose | |||
Updated: 9, 2005 | Rating: 16 | Author: John Hooper | Size: 145 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
111. | Lockout Desktop Security 1.1.652 (dynamicdesigns.co.uk) | ||
Desktop Security software brings you many ways to secure and lock your desktop. You can define different sets of permissions and restrictions for specific users and groups, control access to certain applications, restrict when your PC can be used, restrict CD usage, log Internet usage, and log attempts at restricted activities. Note: This is a 30-day trial. After 30 | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Wilkinson | Size: 2857 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
112. | LockTheFile 1.8 (okosoft.com) | ||
is a tool that encrypts files with strong encryption alghorytm. You may protect any information - text files, pictures, video and audio files from other eyes and ears, as many files as you need, without any limites. The core functions of this program are: Strong encryption alghorytm; Handy user interface; Ability to send locked files | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Maltsev | Size: 1808 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
113. | EXEsafe 2 (members.aol.com) | ||
allows you to put a lock on almost any program file, such as a game, or your office software. It uses the highly secure blowfish encryption algorithm for extra security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When the protected program is run, the EXEsafe lock will | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
114. | FileLocker 2.1 (lockyourfiles.com) | ||
allows you to hide and encrypt your private or sensitive files using 128bit encryption, while providing an easy to use interface. Locked files can be opened quickly and easily within FileLocker using your system default application for the file type you are opening. Enhanced search and import features allow greater power and flexibility. FileLocker allows | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Rivers | Size: 17500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
115. | FileSpy Pro 2.0 (ic.net) | ||
Pro is a powerful file monitoring utility for Novell file servers. Discover how many users opened a file, the length of time a user had a file open, how many times a user opened a file, the average length of time a user had a file open, etc. With FileSpy Pro you can also send messages to users, clear user's connections, unlock | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2322 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
116. | FolderAccess 2.0 (lockfolder.net) | ||
is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
117. | CoolAp 1.0 (coolfreesoftware.com) | ||
addresses, URLs, etc.), set multiple alarms and attach shortcuts to files or programs. Tools and features include a Memo pad, a Stopwatch, a Countdown timer, a utility to set your system clock to an internet clock at regular intervals, a Caps Lock alarm and an hourly chime. All features are customizable. Comprehensive online help is available. Enter text using shortcuts, set | |||
Updated: 9, 2005 | Rating: 48 | Author: Tom Botterill | Size: 1393 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
118. | CopyLock 1.08 (noeld.com) | ||
that allows replacing, moving, renaming or deleting one or many files which are currently in use (e.g. system files like comctl32.dll, or virus/trojan files.) Add the files to update, click Apply, restart and that's it! You can also list and edit the pending operations from the system after you ran an installer or view the processes which use the | |||
Updated: 9, 2005 | Rating: 0 | Author: Noel DANJOU | Size: 121 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
119. | Cryptainer LE Free Encryption Software 6.0.1 (cypherix.co.uk) | ||
any kind of data in them. Cryptainer LE allows you to encrypt any file or folder on any Windows PC. Protects all types of Media and any type of data. Password protect any file or folder with strong Encryption. It allows you to protect data on USB Drives, CDs and HDDs. Cryptainer LE ensures | |||
Updated: 9, 2005 | Rating: 144 | Author: Cypherix Cypherix | Size: 2719 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
120. | Cryptgine Archiver 1.05 (infolocks.com) | ||
distributing sensitive files over the internet or storing sensitive files that are used infrequently, protect them with unbreakable and customizable security. The first in the Cryptgine application series, the Cryptgine Archiver creates file archives that are both compressed and/or encrypted. The encryption method used to secure the data can be the included 256 bit | |||
Updated: 9, 2005 | Rating: 0 | Author: Info Locks | Size: 94264 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
121. | DataLock 1.0 (unicorntech.net) | ||
and expect it to be safe. But is it really safe? ...Achieve easy file - folder Security with Datalock for any file/folder, any size, any format - High ratio Data Compression achieved - Secure communication of data over internet, LAN/WAN - No need to remember many passwords - easy 3 step process - Eliminates unauthorised access - Designed for all Windows based OS Easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Parish Meghani | Size: 1213 kb | Demo Go to category: System Utilities > Other Similar programs | |||
122. | Amiasoft Password 3.3.6.22 (amiasoft.com) | ||
registration, Configurable timeout function for unattended program lock-up, Ability to copy username and password to clipboard without entering that particular record, Ability to clear clipboard from within program and upon program exit, Full program help files. Download your trial copy and discover how it can make your life easier today! A tool to help ease your web-based | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Kidd | Size: 713 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
123. | Cipherlok 2.1 (softlok.com) | ||
product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be automatically encrypted at shutdown and decrypted at startup ensuring security when, for example | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
124. | Clipboard Express 3.2.7 (cheqsoft.com) | ||
Tray Iconic left and right click functioning Displays the clipboard's contents for easy reference. Counts characters in the clipboard memory automatically - just click the form and it does the rest! Use Clipboard Express Pro as temporary or permanent storage. Includes 150 storage locations. Each | |||
Updated: 9, 2005 | Rating: 0 | Author: David Hingston | Size: 3845 kb Go to category: System Utilities > Clipboard Tools Similar programs | |||
125. | 1Lock 1.4 (atma-software.com) | ||
files for burning on a CD, or for download, or add a serial number to your own setup program. Strong encryption. 1Lock operates in 3 modes: Encrypted CD, single self-extracting setup, and as a front-end for your own setup program. Language support for languages other than English. Features: -AES (Rijndael) 256 bit encryption -Customized graphics and text for setup program | |||
Updated: 9, 2005 | Rating: 360 | Author: Mark Snegg | Size: 860 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
126. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents anybody to run the program and change settings and uninstall the program. The "Import/Export" function helps you set up the same settings on | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
127. | Access Denied 3.40 (johnru.com) | ||
requests username and password or simple password upon boot-up and locks desktop by one mouse click. It can't be bypassed on Windows 95/98/ME. All unwanted people are kept out to your PC. Very flexible use: multi-user support(up to 450 users), password encryption, integration with your favorite | |||
Updated: 9, 2005 | Rating: 58 | Author: Ivan Mayrakov | Size: 536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
128. | Accessor 1.7 (nesoft.org) | ||
access to main Windows functions, folders and documents. What's new in version 1.7: 1. New Items are added into Main Menu, such as: - Find Files and Folders, - Empty Recycle Bin, - Clear Documents History, - Formatting Floppy Disk. 2. Now original file icons are displayed while viewing File System (FDD, HDD, CD and Network drives). 3. Settings window | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleksey Skopin | Size: 554 kb | Shareware Go to category: Desktop > Other Similar programs | |||
129. | Advanced Hide Folders 4.6 (hide-folders.biz) | ||
Hide Folders enables you to completely hide folders and files on your computer. The hidden files cannot be accessed unless the folders are unlocked with a password from within the program. You can simple drag and drop folders from Windows or add files by mask (e.g hide all .jpg files). In addition, as an added security measure, you can also lock the | |||
Updated: 9, 2005 | Rating: 81 | Author: Otto Schulz | Size: 258 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
130. | Advanced PDF Password Recovery Pro 2.21 (elcomsoft.com) | ||
protected Adobe Acrobat PDF files, which have "user" and/or "owner" passwords set, preventing the file from opening or editing, printing, selecting text and graphics etc. If only "owner" password is set, password recovery is not needed at all, but the file is being decrypted instantly (so all restrictions are being removed). "User" password can be recovered using | |||
Updated: 9, 2005 | Rating: 1485 | Author: Vladimir Katalov | Size: 1551 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
131. | Akala EXE Lock 3.20 (zero2000software.com) | ||
to your computer then I'd bet that there are certain programs and files you don't want others accessing. There are a multitude of options on how to go about doing this. There are encryption programs, programs that restrict access to portions of your computer, programs that make your files invisible. You get the general idea. A novel approach to the problem lies in Akala EXE | |||
Updated: 9, 2005 | Rating: 158 | Author: Zero Lee | Size: 1152 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
132. | Clipboard Express Pro 3.2.7 (cheqsoft.com) | ||
Tray Iconic left and right click functioning Displays the clipboard's contents for easy reference. Counts characters in the clipboard memory automatically - just click the form and it does the rest! Use Clipboard Express Pro as temporary or permanent storage. Includes 150 storage locations. Each | |||
Updated: 9, 2005 | Rating: 137 | Author: David Hingston | Size: 3845 kb Go to category: System Utilities > Clipboard Tools Similar programs | |||
133. | TZ Privacy Guard 3.1.0.0 (trackzapper.com) | ||
History, favorite's folders and private information: passwords, credit card numbers, social security number etc. ; can expose a lot of your private information that you would like to protect. Also, Personal interests sites, banking information, stocks you monitor on line bidding, and aucations you are tracking, your surfing habits both on and off the web. this information can be | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 4266 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
134. | Without A Trace Surf Guard 5.91 (tekeffect.com) | ||
today's society it is becoming a daily routine that employee's are being fired for surfing the internet, professors are being arrested after their hard drives are examined and/or husbands and wife's become bitter or divorced after the browser history is revealed. Our Without A Trace Surf | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 4027 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
135. | Spam Trapper for Outlook 1.3.3 (brigsoft.com) | ||
messages will be lost. Additional option makes Outlook to play Mp3 files and other media files. (*) Spam Trapper does not work with Outlook Express. Spam Trapper is a multilevel spam filter for Microsoft Outlook version 2000 and later. It is a plug-in component with clear convenient | |||
Updated: 9, 2005 | Rating: 0 | Author: Rest Alex | Size: 493 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
136. | PrivacyDefence 1.3 (privacydefence.com) | ||
programs and system tracks without breaking their functionality, it's fully customizable and supports 18 programs. Left as is, unwanted system logs can seriously impair your confidentiality because all your Internet activity can be easily recovered: Web pages you've viewed, pictures you've opened | |||
Updated: 9, 2005 | Rating: 0 | Author: MCMK Corp. | Size: 1594 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
137. | IE Lock 1.02 (simpliciti.biz) | ||
Lock works right on your desktops, blocking any attempts at inappropriate browsing before they reach the network. IE Lock reduces or eliminates the need for expensive server side hardware and software solutions. IE Lock's "Allow List" ensures your employees gain access to | |||
Updated: 9, 2005 | Rating: 0 | Author: dave campbell | Size: 500 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
138. | Netvester 2002 1.2 (netvester.com) | ||
the World Wide Web is filled with a huge amount of pictures. What's worse is knewing web addresses that contain countless pictures you have to click on if you want them (apart from all annoying popups, long loading time of websites). Netvester 2002 takes over the downloading of all pictures! You know web sites that are filled with countless pictures or galleries? Try out Netvester | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Schaefer | Size: 4342 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
139. | IE Pets 1.0.0.1 (enjoysoft.com) | ||
needs together and give you single click ease of use. The Break Pet locks your browser from prying eyes. The Clean Pet consolidates the most common cleanup functions for Internet browsing and keeps your cookies and temporary Internet files where they should be, gone. The Library Pet gives you | |||
Updated: 9, 2005 | Rating: 0 | Author: Kurt Diesch | Size: 378 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
140. | Encrypt HTML source 2.03 (encrypt-html.com) | ||
text selection/copying, clipboard, and offline usage of encrypted files. Add referrer check (domain lock), encrypt HTML formatted emails, and compress html code. Hide HTML source from email spiders and site rippers. Encrypt HTML source will also keep away all web content filters and other censor software - they will not be able to analyze your web site and block it - this may | |||
Updated: 9, 2005 | Rating: 128 | Author: Robert Davies | Size: 2092 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
141. | ArtistScope CD 2.0 (artistscope.com) | ||
content into an encrypted archive, combining all your data and image files into a single file. That archive will run similar to a mini web server and run from anywhere, from the user's hard-drive or CD. Almost anything that you can run on your web site can be run on ArtistScope CD. With a | |||
Updated: 9, 2005 | Rating: 101 | Author: William Kent | Size: 3943 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
142. | Atrise HTMLock 1.12.0 (atrise.com) | ||
site, CD, DVD, or hard drive. You can password protect HTML and text files. The program is based on JavaScript technology, so it works virtually anywhere. The user-friendly wizard helps you to encrypt HTML and text files in just a few clicks. As the result you get a single HTML file | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Revvo | Size: 652 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
143. | .IRC 1.1 (joher.com) | ||
SOCKS4-5/HTTP Proxy, Notify/Ignore/Tree/Transfers/Browser/Files/Raw/Events/URL windows, Full Layout/Color/Font Customization, Opacity/Transparency support, Auto OnStart/Connect/Reconnect/OnConnect/Join/Rejoin/OnJoin/Away, Logging, Filtering, Sounds, Alarms, Locking, Aliases, Timers, Variables, Readable/Editable Config/Menu Files. Full Featured Windows .NET IRC | |||
Updated: 9, 2005 | Rating: 0 | Author: Jean-Hugues ROYER | Size: 644 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
144. | Secure Image Free 2.2 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 4206 kb | Freeware Go to category: Web Development > HTML Tools Similar programs | |||
145. | Secure Image Pro 4.0 (artistscope.com) | ||
the images on your web site and CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
146. | Zoner GIF Animator 4 (zoner.com) | ||
frame-refresh methods, easy definition of animation borders and its locking, frame printing, optimization of output file to shorten Internet loading times, direct access to the bitmap editor from the program environment, intuitive user interface. Zoner GIF Animator 4 is powerful tool for | |||
Updated: 9, 2005 | Rating: 42 | Author: Ales Hasala | Size: 5754 kb | Shareware Go to category: Graphic Apps > Animation Tools Similar programs | |||
147. | Copysafe Pro 2.0 (artistscope.com) | ||
not able to copy the images in any way. Options include Domain Lock, targeted hyperlink on the image, several display options, status messages, picture frames, batch file import and processing, multi-registry for use on several domains, import images by the folder and batch process more than | |||
Updated: 9, 2005 | Rating: 42 | Author: William Kent | Size: 3722 kb | Demo Go to category: Web Development > HTML Tools Similar programs | |||
148. | PC Guard for Win32 5.00 (sofpro.com) | ||
access to your application (EXE/DLL) with password. - Hardware locking! Lock your software to target computer. - Evaluation (trial) version feature! Easily create demo version of your software with execution and date limitations. - Secure distribution! Securely distribute your | |||
Updated: 9, 2005 | Rating: 48 | Author: Blagoje Ceklic | Size: 841 kb | Commercial Go to category: Development > Management & Distribution Similar programs | |||
149. | PE Corrector 1.84 (gigamindsystems.com) | ||
Corrector is very useful when you need to correct PE files. Such correction may be very necessary in this cases: - Some compilers do not clear memory before compilation. Because of this the new exe file may contain binary trash in the header. But also it may contain even your personal security data from your disks (passwords, for example). PE Corrector can correct this | |||
Updated: 9, 2005 | Rating: 0 | Author: GigaMind Systems | Size: 630 kb | Shareware Go to category: Development > Source Editors Similar programs | |||
150. | ShareGuard Copy Protection 3.6 (zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 11474 kb | Shareware Go to category: Development > Other Similar programs | |||
151. | ShareGuard V1 1 (zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
152. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
to generate an installation-specific Serial Number on the end-user's computer which can be unlocked with a corresponding Unlock Code. Using KeyedAccess means you can create shareware-type versions of your MS Access application where some functionality is locked and is only unlocked when the user enters a valid key. When using the Installation Serial Number and Unlock Code | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
153. | LLLib Licensing Library 2.04 (gppsoftware.com) | ||
is a Software Licensing Library, supplied as .DLLs and .LIB files for 32-bit development. Comprehensive help file including detailed API documentation. Examples in C/C++ and VB. Supports unregistered licenses, time limited licenses, run limited licenses and full registrations, product numbers, registration numbers, number of concurrent users, locking to a machine and | |||
Updated: 9, 2005 | Rating: 0 | Author: Graham Plowman | Size: 1856 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
154. | ACProtect standard 1.20 (ultraprotect.com) | ||
is an application that allows you to protect Windows executable files(PE files) against piracy. Using public keys encryption algorithms (RSA) to create and verify the registration keys and unlock some RSA key locked code. It has an Embedded Protector against file dumping and unpackers. It also has many anti-debug tricks with specialized API system. Mutual | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
155. | AidAim CryptoPressStream 1.00 (aidaim.com) | ||
LoadFromStream, LoadFromFile, SaveToStream, SaveToFile methods, Lock and Unlock methods for multi-thread usage. CryptoPressStream includes TCPSManager thread-safe component that provides an easiest setting of compression and encryption parameters, and contains a list of opened streams. CryptoPressStream contains TCPSManager visual component, Component Reference, 7 demos, License | |||
Updated: 9, 2005 | Rating: 0 | Author: AidAim Software | Size: 1062 kb | Commercial Go to category: Development > Delphi Similar programs | |||
156. | AntiCrack Software Protector Basic 1.09 (anticrack.us) | ||
exe compressor.You can use it to compress and protect your exe dll files step by step. AntiCrack Software Protector uses public keys encryption algorithms (RSA) to create and verify the registration keys and unlock some RSA key locked code,it has embedded cryptor against dump and unpacker | |||
Updated: 9, 2005 | Rating: 535 | Author: Lusi Chen | Size: 1429 kb | Shareware Go to category: Development > Other Similar programs | |||
157. | Code-Lock 2.35 (chosenbytes.com) | ||
pirates? Stop using your obsolete software protections. Code-Lock, an advanced, secure software protection system, will stop crackers in their tracks. Code-Lock, featuring CodeSecure Technology for Visual Basic, C#, VB.NET and Delphi applications, has never been cracked. It is time to keep crackers awake while you sleep in peace. A lot of shareware are cracked by | |||
Updated: 9, 2005 | Rating: 16 | Author: Ryan Thian | Size: 2721 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
158. | Codelock 2.0 (codelock.co.nz) | ||
HTML scripts. Codelock V2.0 works by encrypting your entire PHP page(s) (including HTML and Javascript). You simply browse your computer harddrive for your file(s) or specify your server path. Then, enter your options through the 2-step wizard. When you're ready, simply click on "ENCRYPT". All your files will then be automatically encrypted for you! Once your | |||
Updated: 9, 2005 | Rating: 101 | Author: Vince Edwards | Size: 279 kb | Demo Go to category: Development > Other Similar programs | |||
159. | Time & Chaos 5.6.5 (ChaosSoftware.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 9, 2005 | Rating: 0 | Author: Bill Tiede | Size: 3756 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
160. | Recall 4.0 (acastat.com) | ||
and keep a personal log of special events. Create multiple files for family members or establish a file for each type of application, such as home, work, hobbies, and school. Recall can also be used to keep a personal log of daily or weekly activities. Record observations of employee performance which are date stamped, collect incidence reports, or create your own | |||
Updated: 9, 2005 | Rating: 42 | Author: Phil Crewson | Size: 2639 kb | Shareware Go to category: Business > Other Similar programs | |||
161. | Enigma 2 (enigma.homestead.com) | ||
to Encrypt and store almost anything so that only you can access the files through a master password chosen by you. Of course, all or any of your Encrypted files can be restored to their original state any time you choose. You can even backup and restore the entire database to and from CD to ensure that you lose nothing even if your hard disk dies With Enigma, you can | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Lamb | Size: 7500 kb | Demo Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
162. | AGILITA-Client 1.5 (download.agilita.de) | ||
be programmed separately. Included is the ability of automatically locking a record, multilinguality and a user-/group- and authorization concept. Also supported by the client are different report generators, so that printing is already included. Documents can be printed, presented as a preview on the | |||
Updated: 9, 2005 | Rating: 0 | Author: Ralf Becker | Size: 3060 kb | Commercial Go to category: Business > Databases & Tools Similar programs | |||
163. | All Organizer 2.0 (allthesoft.com) | ||
easily and securely. With our leading concurrency record locking mechanism.DreamyStar Organizer can also be used to share workgroup or small business member's personal information through Local Area Network(LAN) environment. An All-In-One powerful information organizer specialize in Personal and workgroup information manage. It can manage all your Personal information | |||
Updated: 9, 2005 | Rating: 36 | Author: Jordan Smith | Size: 2986 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
164. | Ultimate Jukebox 1.1 (ultimatejukebox.murphnet.net) | ||
for your HTPC (Home Theater PC). It will scan your PC for music files (Mp3, OGG, WMA, WAV), and display them in an easy to use interface, like a modern jukebox. It can run full screen with large fonts, has a queue and multiple playlist levels. Features include full control over fonts, colors & skins, album cover display, alarm clock, playlist creation, screen saver, support for | |||
Updated: 9, 2005 | Rating: 0 | Author: Tony Murphy | Size: 2272 kb | Shareware Go to category: Audio & Multimedia > Audio File Players Similar programs | |||
165. | Virtual Flower 1.2 (homepage.ntlworld.com) | ||
of rustling leaves, or visit an island with exotic flowers. The files are extremely tiny, most are four or five KB, suitable for inclusion in 3D scenes. Uses the popular VRML format - get the Cortona plug in to view them, or embed in web page with a java applet such a Blaxxun. You can also make anaglyph flowers which spring into 3D when you view them using red/ blue anaglyph | |||
Updated: 9, 2005 | Rating: 0 | Author: Robert Walker | Size: 2063 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
166. | Zip Backup to CD 3.18 (dh.dk) | ||
Backup to CD is designed to backup your data files using the standard Zip file format, allowing backup files to be viewed and restored with most zip file utilities. Zip Backup to CD distributes the files to be backedup in several stand alone Zip files of a size fitting a standard CD (CD-R) or a size chosen by the user and writes it to CD/DVD | |||
Updated: 9, 2005 | Rating: 0 | Author: Rene Mogensen | Size: 946 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
167. | RainbowGround 1.1 (desktopfay.com) | ||
brightness and contrast sliders. They also affect resulting image. Lock buttons are used to lock groups of sliders so that a) all sliders in the group are linked and moved together and b) locked sliders are not affected by Randomize button. Randomize button changes positions of | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Kozhinov | Size: 511 kb | Freeware Go to category: Graphic Apps > CAD Similar programs | |||
168. | MP3Guard MP3 Protection 2.0 (zappersoftware.com) | ||
This program is for musicians who want to sell or distribute mp3 files online. This program will encrypt your mp3 files. This includes an MP3 player for playing the MP3 files. Users cannot copy your files. This program is ideal for musicians who wish to sell mp3 files online. This program works, optionally, with ShareGuard to provide a lock and key | |||
Updated: 9, 2005 | Rating: 48 | Author: William Bradshaw | Size: 4621 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
169. | AddUp 2 (orefa.com) | ||
adjustable button size, selectable font, top-level mode, Num-Lock, snap to screen position, switchable decimal mark. NUMERIC FORMATS: scientific (1.23e-45), currency (12,345.00), fractional (1 2/3) and more, each format is customizable. EDITABLE WORK AREA: better than a regular tape calculator. Enter full expressions, change the numbers, repeat any calculation. Annotate your | |||
Updated: 5, 2005 | Rating: 227 | Author: Réjean Lefebvre | Size: 373 kb | Shareware Similar programs | |||
170. | Super Encryption Box 2.4 (loosesoft.com) | ||
secure. Super Encryptoin Box adds a context menu entry to all files and | |||
Updated: 3, 2005 | Rating: 0 | Author: Ming Dave | Size: 135 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
171. | Lock Files and Folders 1.4 (winguardpro.com) | ||
Lock Files & Folders can lock your files and folders without encrypting them. It simply disables users from reading or writing to files, which includes operations such as moving, renaming, deleting and opening. Lock Files & Folders can lock your | |||
Updated: 3, 2005 | Rating: 0 | Author: WG Soft | Size: 446 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
172. | LockBox 2.11 (locksoft.net) | ||
a regular windows folder, except it is opened with a password. Any files dragged into the LockBox are protected with a strong encryption algorithm. Files can be run or modified from directly within the LockBox, without compromising security. Large files can optionally be partially encrypted so they can be stored / used faster. LockBox acts similar to a windows folder | |||
Updated: 3, 2005 | Rating: 474 | Author: David Dosanjh | Size: 600 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
173. | Super Password Guard 3.1 (topaim.net) | ||
also backup all this data at once just by copying single database file. Main features: 1. Fast, compact and easy to use program with familiar interface similar to Windows Explorer. 2. Encrypted password database files, accessible only via user selectable master password (for enhanced security, master password is used as encryption/decryption key only and is not stored | |||
Updated: 3, 2005 | Rating: 48 | Author: Cheng Zheng | Size: 2000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
174. | Dr.Web Anti-Virus for Workstations 4.31.a (advancedforce.com) | ||
for Workstations and it will do all the work for you. The scanner’s unique ability of testing the system memory, detecting the most sophisticated Trojans and backdoor programs running in the background, which are untraceable by ordinary means, makes it a powerful weapon against any non-traditional | |||
Updated: 3, 2005 | Rating: 0 | Author: Igor Daniloff | Size: 4253 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
175. | Ad-Rage 2003 1.0 (winguardpro.com) | ||
your programs, files and web pages all in one easy to use program. Give yourself peace of mind from people tampering with your PC with WinGuard Pro 2003 - Free Edition, stop people changing your settings, accessing unauthorized programs, and important files. Best of all it's completely FREE! Ad Rage 2003 is a popup window killer like no other. It requires no | |||
Updated: 3, 2005 | Rating: 149 | Author: Paul H | Size: 278 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
176. | Lock Webpages 2003 1.0.2 (winguardpro.com) | ||
Lock Web Pages can lock out internet sites that you do not want users accessing. It comes with some websites build-in that block sexually explicit content, and you can add more of your own. It can also stop people installing new programs on your computer, and has the option to block popup | |||
Updated: 3, 2005 | Rating: 0 | Author: paul hull | Size: 560 kb | Commercial Go to category: Network & Internet > Other Similar programs | |||
177. | Dreamystar Organizer 2.8 (dreamysoft.com) | ||
business information manage. With our leading concurrency record locking mechanism.workgroup members can share data effectively and conviently..This Software can manage all your address book,schedule,Notes,to do,anniversary,eBook,ePhoto,finance and secrets.Supports Data Password Protect,Data | |||
Updated: 3, 2005 | Rating: 0 | Author: smartstone Lee | Size: 3014 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
178. | AllDay 7.0.1 (calcom.de) | ||
AllDay v7.0 is a calendar for year overviews. Gregorian, Julian, Jewish and Islamic calendar systems are supported. The application computes holidays, times of sunrise, sunset, moonrise, moonset and moon phase as well as number of day in year, number of week in year, julian day number, remaining days in year | |||
Updated: 3, 2005 | Rating: 16 | Author: Ulrich Hilger | Size: 1507 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
179. | Instant ThumbView Free Edition 1.0 (contextmagic.com) | ||
But you have to start the program to browse and view any individual file. In the latest Windows versions Explorer can be switched into the Thumbnail view too. That is fine. But it can be a pain, if you are looking for one small image or just have to look at couple of files. Instant ThumbView | |||
Updated: 3, 2005 | Rating: 207 | Author: ContextMagic.com | Size: 198 kb | Freeware Go to category: Graphic Apps > Viewers Similar programs | |||
180. | Anti Piracy Tools 2004 Professional 2.1 (logicsoftware.net) | ||
OK, or blocks given registration code, returning the reason for code lock-up. This way, it is easy to implement any type of licensing: from single copy usage only to multiple licenses per one registration code. What is actually a brilliant idea is that the client DLL can pass the server query result | |||
Updated: 3, 2005 | Rating: 29 | Author: Logic Software | Size: 845 kb | Shareware Go to category: Development > Other Similar programs | |||
181. | SAV-MailChecker Pro 1.1 (sav-soft.com) | ||
following ways: -Show a message -Play a sound -Blink with Scroll Lock led on your keyboard -Run a program -Show the number of messages on TaskTray and change it’s icon If you receive large amounts of e-mail messages and you need to keep track on new messages on a regular basis without launching (or running on background) a massive mail-client software – then | |||
Updated: 3, 2005 | Rating: 0 | Author: Aleksey Shevchenko | Size: 321 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
182. | Retrieve PDF V1.0001 (software.ebandwagon.co.uk) | ||
designed for the recovery of content from PDF files that have been locked, either where you have forgotten the user password, and so cannot even open the file to read it, or if you have just forgotten the owner password, and so cannot edit, copy, or print the file. This software was designed by our inhouse team due to a requirement from the publishing | |||
Updated: 8, 2004 | Rating: 0 | Author: Neil Plummer | Size: 1418 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
183. | AppsProtector XP 2.1 (ax-soft.com) | ||
XP allows you to put a lock on a program file, such as a game, or your office software. The program icon is replaced with that of a padlock, and, when the program is run, it will first ask for the password. The password must then be typed in correctly before the program will run. Easy to use and quick to work, this program has limitless possibilities. Stop your kids | |||
Updated: 8, 2004 | Rating: 243 | Author: Moser Damien | Size: 1601 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
184. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth mode option, hot key access, Email logs, Monitoring and logging across | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Lock file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|