|
||||||
|
||
|
Home > Lock file software |
Related keywords: file, lock, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
1. | AudioLabel CD/DVD Labeler 3.20 (audiolabel.com) | ||
from the Freedb internet database, CD-Text and CDPlayer.ini file. Our cd label creator can even read and label your MP3 CDs using the ID3 tag and filename. Unlike other cd labeling software, you'll never be locked into a particular brand of label paper. All popular brands are supported and even non-standard labels can be adjusted using the "Label Alignment Wizard" | |||
Updated: 2, 2006 | Rating: 228 | Author: Cripple Creek Software | Size: 3870 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
2. | InfoLock 1.51 (whimsysoft.com) | ||
can help you to encrypt your information. InfoLock can encrypt file or text(which entered by yourself or copy from clipboard). InfoLock use some very safe arithmetic to encrypt your information.Such as DES, which was put out by IBM and NSA. And InfoLock use special arithmetic to encrypt your text to make sure you can copy or send it by email with out any difficulty | |||
Updated: 8, 2004 | Rating: 101 | Author: Wei Zhang | Size: 692 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
3. | Mp3 Filter 4.2.4 (hardcoded.net) | ||
your collection is: Hard drives, Multiple Mp3 CDs, anything. The file comparison process, which basically compare filename's words between them, is completely customizable. Mp3 Filter also have tons of other features: * Profile driven scans. * Incredibly fast comparing engine. * Supports MP3, WMA, OGG, M4A/M4P (iTunes format). * Easy to use profile | |||
Updated: 2, 2006 | Rating: 1578 | Author: Virgil Dupras | Size: 1083 kb | Shareware Go to category: Audio & Multimedia > Audio File Players Similar programs | |||
4. | MP3Guard MP3 Protection 2.0 (zappersoftware.com) | ||
This program is for musicians who want to sell or distribute mp3 files online. This program will encrypt your mp3 files. This includes an MP3 player for playing the MP3 files. Users cannot copy your files. This program is ideal for musicians who wish to sell mp3 files online. This program works, optionally, with ShareGuard to provide a lock and key | |||
Updated: 9, 2005 | Rating: 48 | Author: William Bradshaw | Size: 4621 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
5. | RainbowGround 1.1 (desktopfay.com) | ||
brightness and contrast sliders. They also affect resulting image. Lock buttons are used to lock groups of sliders so that a) all sliders in the group are linked and moved together and b) locked sliders are not affected by Randomize button. Randomize button changes positions of | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Kozhinov | Size: 511 kb | Freeware Go to category: Graphic Apps > CAD Similar programs | |||
6. | Super Encryption Box 2.4 (loosesoft.com) | ||
secure. Super Encryptoin Box adds a context menu entry to all files and | |||
Updated: 3, 2005 | Rating: 0 | Author: Ming Dave | Size: 135 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | Ultimate Jukebox 1.1 (ultimatejukebox.murphnet.net) | ||
for your HTPC (Home Theater PC). It will scan your PC for music files (Mp3, OGG, WMA, WAV), and display them in an easy to use interface, like a modern jukebox. It can run full screen with large fonts, has a queue and multiple playlist levels. Features include full control over fonts, colors & skins, album cover display, alarm clock, playlist creation, screen saver, support for | |||
Updated: 9, 2005 | Rating: 0 | Author: Tony Murphy | Size: 2272 kb | Shareware Go to category: Audio & Multimedia > Audio File Players Similar programs | |||
8. | Virtual Flower 1.2 (homepage.ntlworld.com) | ||
of rustling leaves, or visit an island with exotic flowers. The files are extremely tiny, most are four or five KB, suitable for inclusion in 3D scenes. Uses the popular VRML format - get the Cortona plug in to view them, or embed in web page with a java applet such a Blaxxun. You can also make anaglyph flowers which spring into 3D when you view them using red/ blue anaglyph | |||
Updated: 9, 2005 | Rating: 0 | Author: Robert Walker | Size: 2063 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
9. | Zip Backup to CD 3.18 (dh.dk) | ||
Backup to CD is designed to backup your data files using the standard Zip file format, allowing backup files to be viewed and restored with most zip file utilities. Zip Backup to CD distributes the files to be backedup in several stand alone Zip files of a size fitting a standard CD (CD-R) or a size chosen by the user and writes it to CD/DVD | |||
Updated: 9, 2005 | Rating: 0 | Author: Rene Mogensen | Size: 946 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
10. | All Organizer 2.0 (allthesoft.com) | ||
easily and securely. With our leading concurrency record locking mechanism.DreamyStar Organizer can also be used to share workgroup or small business member's personal information through Local Area Network(LAN) environment. An All-In-One powerful information organizer specialize in Personal and workgroup information manage. It can manage all your Personal information | |||
Updated: 9, 2005 | Rating: 36 | Author: Jordan Smith | Size: 2986 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
11. | Computers Hall 2.11 (ruslan.odessa.ua) | ||
window which to remove it is impossible or the keyboard, a mouse is locked; · The program remembers and uses the price for 1 hour of games and 1 hour of the Internet; · Roundoff of the sum of payment; · Return of the rest of money; · From one sight it is visible, what computer is free, what occupied, how many minutes are necessary to work, how many has fulfilled and when will be | |||
Updated: 3, 2005 | Rating: 16 | Author: Ruslan Scherbatuk | Size: 1798 kb | Demo Go to category: Business > Other Similar programs | |||
12. | Dreamystar Organizer 2.8 (dreamysoft.com) | ||
business information manage. With our leading concurrency record locking mechanism.workgroup members can share data effectively and conviently..This Software can manage all your address book,schedule,Notes,to do,anniversary,eBook,ePhoto,finance and secrets.Supports Data Password Protect,Data | |||
Updated: 3, 2005 | Rating: 0 | Author: smartstone Lee | Size: 3014 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
13. | eBooksWriter PRO 2005.15.195 (visualvision.com) | ||
VisualVision's EBooksWriter you can create ebooks with ease. It's a professional all-in-one visual environment, not just a compiler! - you build compact self extracting ebooks with one click; - one ebook, one source file. All visual, no compilation, no coding, no complications...; - no royalties: you're free to redistribute your ebook / ebrochure over the Internet | |||
Updated: 2, 2006 | Rating: 89 | Author: Aldo Ghigliano | Size: 2460 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
14. | Enigma 2 (enigma.homestead.com) | ||
to Encrypt and store almost anything so that only you can access the files through a master password chosen by you. Of course, all or any of your Encrypted files can be restored to their original state any time you choose. You can even backup and restore the entire database to and from CD to ensure that you lose nothing even if your hard disk dies With Enigma, you can | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Lamb | Size: 7500 kb | Demo Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
15. | LoanAmortizer Standard Edition 3.1 (loanamortizer.com) | ||
Once any amortization schedule is prepared it can be saved in a file for future reference, comparison or archive. Everything is completed automatically, accurately and is easy and simple to be used and handled. Canadian Mortgage calculations are also implemented in LoanAmortizer Standard Edition, both for mortgage and regular loans. LoanAmortizer Standard Edition is one of the few | |||
Updated: 9, 2005 | Rating: 0 | Author: George Athannassov | Size: 1407 kb | Shareware Go to category: Business > Other Similar programs | |||
16. | Time & Chaos 5.6.5 (ChaosSoftware.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 9, 2005 | Rating: 0 | Author: Bill Tiede | Size: 3756 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
17. | TurboNote 3.4 (turbonote.com) | ||
change note colours and sizes, have them ring alarms, print them, lock them and keep your screen uncluttered by hiding them. Notes even stay around when you turn your computer off. TurboNote's Quick Launch feature also lets you open Web addresses, programs and files which appear in notes, simply by double-clicking. Network support suits organisation-wide deployment and | |||
Updated: 9, 2005 | Rating: 1234 | Author: Peter Hyde | Size: 542 kb | Freeware Go to category: Business > Other Similar programs | |||
18. | TurboNote+ desktop sticky notes v6.0 (turbonote.com) | ||
Web and email addresses. Change note colors and sizes, set alarms, lock them and keep your screen uncluttered by hiding them. Use handy templates for common messages or make up your own style with optional rich text editing, transparency control and images. TurboNotes stay around when you turn your | |||
Updated: 2, 2006 | Rating: 173 | Author: Vicki Hyde | Size: 1616 kb | Shareware Go to category: Business > Other Similar programs | |||
19. | ACProtect standard 1.20 (ultraprotect.com) | ||
is an application that allows you to protect Windows executable files(PE files) against piracy. Using public keys encryption algorithms (RSA) to create and verify the registration keys and unlock some RSA key locked code. It has an Embedded Protector against file dumping and unpackers. It also has many anti-debug tricks with specialized API system. Mutual | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
20. | AidAim CryptoPressStream 1.00 (aidaim.com) | ||
LoadFromStream, LoadFromFile, SaveToStream, SaveToFile methods, Lock and Unlock methods for multi-thread usage. CryptoPressStream includes TCPSManager thread-safe component that provides an easiest setting of compression and encryption parameters, and contains a list of opened streams. CryptoPressStream contains TCPSManager visual component, Component Reference, 7 demos, License | |||
Updated: 9, 2005 | Rating: 0 | Author: AidAim Software | Size: 1062 kb | Commercial Go to category: Development > Delphi Similar programs | |||
21. | Anti Piracy Tools 2004 Professional 2.1 (logicsoftware.net) | ||
OK, or blocks given registration code, returning the reason for code lock-up. This way, it is easy to implement any type of licensing: from single copy usage only to multiple licenses per one registration code. What is actually a brilliant idea is that the client DLL can pass the server query result | |||
Updated: 3, 2005 | Rating: 29 | Author: Logic Software | Size: 845 kb | Shareware Go to category: Development > Other Similar programs | |||
22. | AntiCrack Software Protector Basic 1.09 (anticrack.us) | ||
exe compressor.You can use it to compress and protect your exe dll files step by step. AntiCrack Software Protector uses public keys encryption algorithms (RSA) to create and verify the registration keys and unlock some RSA key locked code,it has embedded cryptor against dump and unpacker | |||
Updated: 9, 2005 | Rating: 535 | Author: Lusi Chen | Size: 1429 kb | Shareware Go to category: Development > Other Similar programs | |||
23. | Code-Lock 2.35 (chosenbytes.com) | ||
pirates? Stop using your obsolete software protections. Code-Lock, an advanced, secure software protection system, will stop crackers in their tracks. Code-Lock, featuring CodeSecure Technology for Visual Basic, C#, VB.NET and Delphi applications, has never been cracked. It is time to keep crackers awake while you sleep in peace. A lot of shareware are cracked by | |||
Updated: 9, 2005 | Rating: 16 | Author: Ryan Thian | Size: 2721 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
24. | Codelock 2.0 (codelock.co.nz) | ||
HTML scripts. Codelock V2.0 works by encrypting your entire PHP page(s) (including HTML and Javascript). You simply browse your computer harddrive for your file(s) or specify your server path. Then, enter your options through the 2-step wizard. When you're ready, simply click on "ENCRYPT". All your files will then be automatically encrypted for you! Once your | |||
Updated: 9, 2005 | Rating: 101 | Author: Vince Edwards | Size: 279 kb | Demo Go to category: Development > Other Similar programs | |||
25. | EXECryptor 2.3.7 (softcomplete.com) | ||
(12-16 characters). A serial number can be time-limited, may be locked to Hardware ID, can contain encrypted registration information such as license type, allowed features and other user defined information. It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely prevents | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
26. | FlowChart.NET 4.0.3 (nocache.mindfusion.org) | ||
include an alignment grid, shadow effects, scrolling and zooming, locking, z-order and pen styles. Several automatic layout algorithms, link routing and graphs analysis functions make FlowChart.NET even more useful. Diagrams can be stored in files, printed on paper, exported to image files, serialized in .NET streams such as memory buffers or network sockets. The | |||
Updated: 2, 2006 | Rating: 54 | Author: MindFusion Ltd. | Size: 4943 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
27. | FlowChartX control 4 (mindfusion.org) | ||
include an alignment grid; shadow effects; scrolling and zooming; locking; z-order; and pen styles. Diagrams can be printed, exported as image files, stored in OLE compound documents or in separate documents. The control's programming model comprises more than 600 methods, properties, and events. Full source code is available for purchase too, giving you unlimited | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 3787 kb | Commercial Go to category: Development > Active X Similar programs | |||
28. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
to generate an installation-specific Serial Number on the end-user's computer which can be unlocked with a corresponding Unlock Code. Using KeyedAccess means you can create shareware-type versions of your MS Access application where some functionality is locked and is only unlocked when the user enters a valid key. When using the Installation Serial Number and Unlock Code | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
29. | LLLib Licensing Library 2.04 (gppsoftware.com) | ||
is a Software Licensing Library, supplied as .DLLs and .LIB files for 32-bit development. Comprehensive help file including detailed API documentation. Examples in C/C++ and VB. Supports unregistered licenses, time limited licenses, run limited licenses and full registrations, product numbers, registration numbers, number of concurrent users, locking to a machine and | |||
Updated: 9, 2005 | Rating: 0 | Author: Graham Plowman | Size: 1856 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
30. | PC Guard for Win32 5.00 (sofpro.com) | ||
access to your application (EXE/DLL) with password. - Hardware locking! Lock your software to target computer. - Evaluation (trial) version feature! Easily create demo version of your software with execution and date limitations. - Secure distribution! Securely distribute your | |||
Updated: 9, 2005 | Rating: 48 | Author: Blagoje Ceklic | Size: 841 kb | Commercial Go to category: Development > Management & Distribution Similar programs | |||
31. | PE Corrector 1.84 (gigamindsystems.com) | ||
Corrector is very useful when you need to correct PE files. Such correction may be very necessary in this cases: - Some compilers do not clear memory before compilation. Because of this the new exe file may contain binary trash in the header. But also it may contain even your personal security data from your disks (passwords, for example). PE Corrector can correct this | |||
Updated: 9, 2005 | Rating: 0 | Author: GigaMind Systems | Size: 630 kb | Shareware Go to category: Development > Source Editors Similar programs | |||
32. | RegDesk 4.0 4.0 (easytools.com) | ||
answer to a lock and key? RegDesk 4.0 provides computer security of the highest order, securing opted devices and areas of Desktop and Windows programs. Put together a foolproof desktop security system, which controls access to vital areas of Windows. It provides a facility for hiding of selected drive letters, setting virtual memory, display, network, printer | |||
Updated: 9, 2005 | Rating: 0 | Author: VenkataRangan TNC | Size: 530432 kb | Shareware Go to category: Development > Other Similar programs | |||
33. | ShareGuard Copy Protection 3.6 (zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 11474 kb | Shareware Go to category: Development > Other Similar programs | |||
34. | ShareGuard V1 1 (zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
35. | SoftwareShield System 2.4.10.17 (softwareshield.com) | ||
- A time limited license used for evaluation purposes. The Trial's functionality may be less than the standard product in which case this is a combined demo/trial. The day of expiration is generally set on the day the license is issued. Alternatively, the demo may expire after a certain number of days after installation or after it has been used a certain number of times - or | |||
Updated: 9, 2005 | Rating: 0 | Author: Zack Wickes | Size: 9037 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
36. | SQLExecMS 2.6 (laplas-soft.com) | ||
server performance counters;Check utilization of proc cache;Watch locks; Review space used by DB files, tables and indexes; Manage DB file and filegroups;Turn on and off trace flags;Manage scheduled jobs; Change SQL server and database options;Backup and restore databases; Analyze | |||
Updated: 2, 2006 | Rating: 433 | Author: Oleg Dantchenko | Size: 4928 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
37. | Copysafe Pro 2.0 (artistscope.com) | ||
not able to copy the images in any way. Options include Domain Lock, targeted hyperlink on the image, several display options, status messages, picture frames, batch file import and processing, multi-registry for use on several domains, import images by the folder and batch process more than | |||
Updated: 9, 2005 | Rating: 42 | Author: William Kent | Size: 3722 kb | Demo Go to category: Web Development > HTML Tools Similar programs | |||
38. | Instant ThumbView Free Edition 1.0 (contextmagic.com) | ||
But you have to start the program to browse and view any individual file. In the latest Windows versions Explorer can be switched into the Thumbnail view too. That is fine. But it can be a pain, if you are looking for one small image or just have to look at couple of files. Instant ThumbView | |||
Updated: 3, 2005 | Rating: 207 | Author: ContextMagic.com | Size: 198 kb | Freeware Go to category: Graphic Apps > Viewers Similar programs | |||
39. | Secure Image Express 4.0 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 2, 2006 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
40. | Secure Image Free 2.2 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 4206 kb | Freeware Go to category: Web Development > HTML Tools Similar programs | |||
41. | Secure Image Pro 4.0 (artistscope.com) | ||
the images on your web site and CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
42. | AllDay 7.0.1 (calcom.de) | ||
AllDay v7.0 is a calendar for year overviews. Gregorian, Julian, Jewish and Islamic calendar systems are supported. The application computes holidays, times of sunrise, sunset, moonrise, moonset and moon phase as well as number of day in year, number of week in year, julian day number, remaining days in year | |||
Updated: 3, 2005 | Rating: 16 | Author: Ulrich Hilger | Size: 1507 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
43. | .IRC 1.1 (joher.com) | ||
SOCKS4-5/HTTP Proxy, Notify/Ignore/Tree/Transfers/Browser/Files/Raw/Events/URL windows, Full Layout/Color/Font Customization, Opacity/Transparency support, Auto OnStart/Connect/Reconnect/OnConnect/Join/Rejoin/OnJoin/Away, Logging, Filtering, Sounds, Alarms, Locking, Aliases, Timers, Variables, Readable/Editable Config/Menu Files. Full Featured Windows .NET IRC | |||
Updated: 9, 2005 | Rating: 0 | Author: Jean-Hugues ROYER | Size: 644 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
44. | 12Ghosts Wash 7.10 (12ghosts.com) | ||
information. Removes history, cookies, temporary cached files, and the typed-address list of Internet Explorer, AOL, MSN, Netscape Navigator, and Opera. Many Windows options, as well as most-recently-used menus are wiped. It even deletes locked files (files that are in use, for example those ominous "index.dat" files). 12-Wash queues deletion for | |||
Updated: 9, 2005 | Rating: 232 | Author: Philip Ahrens | Size: 1500 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
45. | Ad-Rage 2003 1.0 (winguardpro.com) | ||
your programs, files and web pages all in one easy to use program. Give yourself peace of mind from people tampering with your PC with WinGuard Pro 2003 - Free Edition, stop people changing your settings, accessing unauthorized programs, and important files. Best of all it's completely FREE! Ad Rage 2003 is a popup window killer like no other. It requires no | |||
Updated: 3, 2005 | Rating: 149 | Author: Paul H | Size: 278 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
46. | Advanced Email Verifier 5.15 (glocksoft.com) | ||
Text (.CSV), HTML, Word, Lotus 1-2-3, QuattroPro, XML, MS Access files, and DBISAM tables (.dat files). You can also connect to the database on your disk and verify the email addresses directly from the database. AEV helps you maintain your mailing list clean and decrease the Internet traffic keeping you from sending undeliverable messages that cause a ping-pong of useless | |||
Updated: 2, 2006 | Rating: 42 | Author: Alex Markov | Size: 4148 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
47. | All in One SECRETMAKER 4.2.1 (secretmaker.com) | ||
movie blocker blocks Flash ads, besides uncountable adware sources locked out. The pop-up blocker stops unwanted pop-ups, and the privacy protector hides your identity while you surf. The cookie eraser circumvents profiling. Various white lists allow user-specific optimizations. The history cleaner clears needless files, logs, and tracks. All-in-One Secretmaker is suitable for | |||
Updated: 2, 2006 | Rating: 264 | Author: secretmaker team | Size: 1249 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
48. | ArtistScope CD 2.0 (artistscope.com) | ||
content into an encrypted archive, combining all your data and image files into a single file. That archive will run similar to a mini web server and run from anywhere, from the user's hard-drive or CD. Almost anything that you can run on your web site can be run on ArtistScope CD. With a | |||
Updated: 9, 2005 | Rating: 101 | Author: William Kent | Size: 3943 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
49. | Atomic Newsgroup Explorer 1.40 (atompark.com) | ||
list of e-mail addresses using ANE! The list can be saved to a file, Windows Clipboard or MS Word or MS Excel application. Atomic Newsgroup Extractor does not depend upon any additional software the way many email grabbers depend on third-party libraries. The most important feature of ANE is an availability to work with private newsgroups locked by password and servers | |||
Updated: 2, 2006 | Rating: 42 | Author: Evgeny Medvednicov | Size: 1175 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
50. | Atrise HTMLock 1.12.0 (atrise.com) | ||
site, CD, DVD, or hard drive. You can password protect HTML and text files. The program is based on JavaScript technology, so it works virtually anywhere. The user-friendly wizard helps you to encrypt HTML and text files in just a few clicks. As the result you get a single HTML file | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Revvo | Size: 652 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
51. | Easy File & Folder Protector 4.14 (softstack.com) | ||
files and folders situated on local media of Windows 95/98/ME/NT/2000/XP with Easy File & Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File & Folder Protector has an easy-to-use user interface allowing you to allocate access to your files and folders | |||
Updated: 2, 2006 | Rating: 46 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
52. | Encrypt HTML source 2.03 (encrypt-html.com) | ||
text selection/copying, clipboard, and offline usage of encrypted files. Add referrer check (domain lock), encrypt HTML formatted emails, and compress html code. Hide HTML source from email spiders and site rippers. Encrypt HTML source will also keep away all web content filters and other censor software - they will not be able to analyze your web site and block it - this may | |||
Updated: 9, 2005 | Rating: 128 | Author: Robert Davies | Size: 2092 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
53. | FineBrowser 3.2.25 (finebrowser.com) | ||
You can change the order of the window tabs by using drag&drop, lock the important windows from accidental close and rename them with ease. The powerful bookmarks manager offers advanced management features, personal page ratings, comments, grouped favorites and more. FineBrowser is designed to work with image archive, wich is organized by the program using different sources | |||
Updated: 2, 2006 | Rating: 76 | Author: Alex Akimov | Size: 3415 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
54. | FineBrowser Free 3.2.24 (finebrowser.com) | ||
You can change the order of the window tabs by using drag&drop, lock the important windows from accidental close and rename them with ease. The powerful bookmarks manager offers advanced management features, personal page ratings, comments, grouped favorites and more. FineBrowser is designed to work with image archive, wich is organized by the program using different sources | |||
Updated: 2, 2006 | Rating: 16 | Author: Alex Akimov | Size: 3958 kb | Freeware Go to category: Network & Internet > Browsers Similar programs | |||
55. | G-Lock EasyMail 4.62 (glocksoft.com) | ||
G-Lock EasyMail was developed to help people run and manage mailing lists, newsletters, announcement lists and customer updates. G-Lock EasyMail is a powerful group mailer which sends your message directly from your outbox to the recipient's mail server (without using any ISP's SMTP server). Program supports multi-threaded delivery, and so works several times | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3281 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
56. | G-Lock EasyMail Professional 4.62 (glocksoft.com) | ||
and subject lines via its powerful mail-merge function. EasyMail Pro's distinctive voicemail capability also lets you add audio content to your messages. Supporting a wide range of compression formats, you can even set the recording to start playing when the mail is opened. HTML and Multi part (MIME) | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3324 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
57. | G-Lock Email Processor 1.98 (glocksoft.com) | ||
any data from the message body and message header and save it to a file of user definable format. Using Email Processor you are also able to send a text or HTML message to your recipients as well as forward the message you received to another email address. The program can be easily set up to | |||
Updated: 2, 2006 | Rating: 119 | Author: Alex Markov | Size: 2601 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
58. | Hyper Maker HTML 3000.27 (bersoft.com) | ||
pages, linked images, and sounds in a single, encrypted, compressed file. Your creations can include .gif, .bmp, .jpg, and .png graphics; .avi movies; TrueType fonts; and .wav and .mid sound files. A royalty-free setup/viewer program (with a Web browser look-and-feel and multilanguage support) | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Bernardo | Size: 2606 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
59. | IE Pets 1.0.0.1 (enjoysoft.com) | ||
needs together and give you single click ease of use. The Break Pet locks your browser from prying eyes. The Clean Pet consolidates the most common cleanup functions for Internet browsing and keeps your cookies and temporary Internet files where they should be, gone. The Library Pet gives you | |||
Updated: 9, 2005 | Rating: 0 | Author: Kurt Diesch | Size: 378 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
60. | Intelligent Mailbook 3.1.5 (i-mailbook.info) | ||
databases: never loose mail messages because of one damaged system file! Intelligent Mailbook can rebuild its internal e-mail databases from scratch, might they get damaged. In other e-mail programs this usually results in total-loss of all messages! If new mail is received, the Scroll-Lock | |||
Updated: 3, 2005 | Rating: 0 | Author: Barry Matinus | Size: 4626 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
61. | Cyber Internet Cafe Software - Internet Caffe 4.9.5 (antamedia.com) | ||
for cafe owners - it provides full billing and income control, locks unused computers, generates detailed reports and statistics and supports different password protected employee accounts. Process payments quickly and efficiently and improve your business with various reports and statistics. Low price, beautiful interface, user friendly, feature rich, suitable for Internet and | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladan Antanasijevic | Size: 2567 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
62. | Lock Webpages 2003 1.0.2 (winguardpro.com) | ||
Lock Web Pages can lock out internet sites that you do not want users accessing. It comes with some websites build-in that block sexually explicit content, and you can add more of your own. It can also stop people installing new programs on your computer, and has the option to block popup | |||
Updated: 3, 2005 | Rating: 0 | Author: paul hull | Size: 560 kb | Commercial Go to category: Network & Internet > Other Similar programs | |||
63. | Netvester 2002 1.2 (netvester.com) | ||
the World Wide Web is filled with a huge amount of pictures. What's worse is knewing web addresses that contain countless pictures you have to click on if you want them (apart from all annoying popups, long loading time of websites). Netvester 2002 takes over the downloading of all pictures! You know web sites that are filled with countless pictures or galleries? Try out Netvester | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Schaefer | Size: 4342 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
64. | Instant Remote Control 2.2.9 (omniquad.com) | ||
multiple licenses-requires to be installed only on the administrator's computers used to control other PCs-a single license can support large networks-no warning displayed at remote end-creates a tree of all computers on your network automatically-manually enter IP details and access PCs not listed as well-works by sending a preconfigured host to a would-be host machine-the host | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Sobstel | Size: 2341 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
65. | MyPadlock 1.4 (pages.prodigy.net) | ||
you can see, security 'you' control. For text communication and file encryption get MyPadLock. Encryption keys are not random - you choose the keys to lock your information and you can change the keys as often as necessary. Keys are not saved in the secured information. If fact, your keys are not on your computer at all. They're in your head or wherever you wrote them | |||
Updated: 9, 2005 | Rating: 0 | Author: Don Kreuzberg | Size: 3264 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
66. | PrivacyDefence 1.3 (privacydefence.com) | ||
programs and system tracks without breaking their functionality, it's fully customizable and supports 18 programs. Left as is, unwanted system logs can seriously impair your confidentiality because all your Internet activity can be easily recovered: Web pages you've viewed, pictures you've opened | |||
Updated: 9, 2005 | Rating: 0 | Author: MCMK Corp. | Size: 1594 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
67. | Private Shell SSH Client 2.1 (privateshell.com) | ||
CVS, VNC, e-mal clients and other software). Private Shell's default configuration allows you to connect to any SSH1 or SSH2 server in the most secure way by choosing the strongest encryption algorithms supported by a remote computer. Full support for ssh tunneling and X11 forwarding. Use built-in Secure FTP client (SFTP client) to transfer files between computers | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
68. | SAV-MailChecker Pro 1.1 (sav-soft.com) | ||
following ways: -Show a message -Play a sound -Blink with Scroll Lock led on your keyboard -Run a program -Show the number of messages on TaskTray and change it’s icon If you receive large amounts of e-mail messages and you need to keep track on new messages on a regular basis without launching (or running on background) a massive mail-client software – then | |||
Updated: 3, 2005 | Rating: 0 | Author: Aleksey Shevchenko | Size: 321 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
69. | IE Lock 1.02 (simpliciti.biz) | ||
Lock works right on your desktops, blocking any attempts at inappropriate browsing before they reach the network. IE Lock reduces or eliminates the need for expensive server side hardware and software solutions. IE Lock's "Allow List" ensures your employees gain access to | |||
Updated: 9, 2005 | Rating: 0 | Author: dave campbell | Size: 500 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
70. | SourceGuardian PHP Encoder 5.5 (sourceguardian.com) | ||
Main feature list: + Full Bytecode Encryption - protect your files by removing the original PHP Source Code + Fully encode and deploy for PHP5 (and PHP4) + Choice of Windows/Linux/Mac OS X encoding clients + Command line encoder available now + Encrypt to domain name + Encrypt to IP + License generator for encoded scripts + Easy to use Wizard interface and | |||
Updated: 2, 2006 | Rating: 174 | Author: Sales Department | Size: 3580 kb | Demo Go to category: Web Development > ASP & PHP Similar programs | |||
71. | Spam Trapper for Outlook 1.3.3 (brigsoft.com) | ||
messages will be lost. Additional option makes Outlook to play Mp3 files and other media files. (*) Spam Trapper does not work with Outlook Express. Spam Trapper is a multilevel spam filter for Microsoft Outlook version 2000 and later. It is a plug-in component with clear convenient | |||
Updated: 9, 2005 | Rating: 0 | Author: Rest Alex | Size: 493 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
72. | TZ Privacy Guard 3.1.0.0 (trackzapper.com) | ||
History, favorite's folders and private information: passwords, credit card numbers, social security number etc. ; can expose a lot of your private information that you would like to protect. Also, Personal interests sites, banking information, stocks you monitor on line bidding, and aucations you are tracking, your surfing habits both on and off the web. this information can be | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 4266 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
73. | VShell 2.2.4 (promaxum.com) | ||
Control Lists allow you to assign the right mix of shell access, file transfer, and application data tunneling to users and groups. Centralized server configuration, options for Kerberos via GSSAPI, end user public-key upload, and triggers for automation of routine tasks reduce hassles for busy system administrators. Integrate this strong security with your existing infrastructure | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 3703 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
74. | Watch Right 2002.0.77 (bpssoft.com) | ||
concerned parent with the ability to "keep an eye" on their child's online activities. Automatically log your child's instant messages, chatroom conversations, email messages, message board postings, and web sites they visit while online. Â Watch Right is designed to work invisibly in the | |||
Updated: 2, 2006 | Rating: 0 | Author: Bradley O'Keefe | Size: 2842 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
75. | WiseTerm Telnet/Serial (32-bit) 3.1.2 (johnnypops.demon.co.uk) | ||
tab-stops; char, line, column, rectangle clear/fill functions; line locking; answerback; monitor mode; line drawing; remotely switchable emulation. Supports session logging. Includes a modem dialer and a simple phonebook. When using telnet, you can use your host file, or an edited version of your host file, as a machine directory. Includes printing, and cut and paste | |||
Updated: 2, 2006 | Rating: 48 | Author: John Popplewell | Size: 415 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
76. | Without A Trace Surf Guard 5.91 (tekeffect.com) | ||
today's society it is becoming a daily routine that employee's are being fired for surfing the internet, professors are being arrested after their hard drives are examined and/or husbands and wife's become bitter or divorced after the browser history is revealed. Our Without A Trace Surf | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 4027 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
77. | X2Net WebCompiler 3.0.0.49 (x2net.com) | ||
powerful HTML Compiler produces .exe files for distribution from groups of HTML pages. Built-in ultra fast searching, favorites and history management, page protection, passwords, kiosk mode,form processing etc. Built-in installer/uninstaller, powerful encrytion. System locking to restrict | |||
Updated: 2, 2006 | Rating: 0 | Author: X2Net Staff | Size: 4957 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
78. | Aversoft Sticker 4.0 (aversoft.com) | ||
you to create and display as many notes as you want, set note's alarm, schedule tasks, print notes and lock them from being accidentally deleted. It also provides the notes organization function that lets you hide some notes or place them on top of other windows. The notes are saved | |||
Updated: 9, 2005 | Rating: 287 | Author: Sergei Lepyokhin | Size: 728 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
79. | Clipboard Express Pro 3.2.7 (cheqsoft.com) | ||
Tray Iconic left and right click functioning Displays the clipboard's contents for easy reference. Counts characters in the clipboard memory automatically - just click the form and it does the rest! Use Clipboard Express Pro as temporary or permanent storage. Includes 150 storage locations. Each | |||
Updated: 9, 2005 | Rating: 137 | Author: David Hingston | Size: 3845 kb Go to category: System Utilities > Clipboard Tools Similar programs | |||
80. | 1 Click & Go 1.275 (softstack.com) | ||
as a Windows toolbar designed for easy access, open and execute files and folders that you often use. Program similar well-known Microsoft Office Panel, but not lose configuration in case of a system crash. It supports the Drag&Drop and has a simple and comprehensible interface. There is a multi-user mode - some user can have its own set of program. This set is protected with a | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 302 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
81. | 12Ghosts Shredder 7.10 (12ghosts.com) | ||
files, drag and shred, DoD conform, Wipe Disk. Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover files from your disk! Nobody will even find out the previous name or file size. The file can be overwritten several times with random bits so that even the | |||
Updated: 9, 2005 | Rating: 251 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
82. | 1Lock 1.4 (atma-software.com) | ||
files for burning on a CD, or for download, or add a serial number to your own setup program. Strong encryption. 1Lock operates in 3 modes: Encrypted CD, single self-extracting setup, and as a front-end for your own setup program. Language support for languages other than English. Features: -AES (Rijndael) 256 bit encryption -Customized graphics and text for setup program | |||
Updated: 9, 2005 | Rating: 360 | Author: Mark Snegg | Size: 860 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
83. | 1st Evidence Remover 2.14 (getfreefile.com) | ||
you use Windows, open folders, search for files and see pictures, work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use and the | |||
Updated: 2, 2006 | Rating: 190 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
84. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents anybody to run the program and change settings and uninstall the program. The 'Import/Export' function helps you set up the same settings on | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
85. | 1st Screen Lock 6.14 (softheap.com) | ||
Screen Lock is a password-protected desktop security utility that lets you lock your desktop with a password on boot, or at the time you are leaving your PC. You can use the built-in spy utility that works in background and enables you to spy on your PC users by fixing all user moves in a log | |||
Updated: 2, 2006 | Rating: 479 | Author: Ixis Ltd | Size: 1106 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
86. | 1st Security Agent Pro 6.14 (softheap.com) | ||
from editing your Favorites, disable downloading and installing files from the Internet, disable individual tabs in the Internet Options dialog, as well as specific settings from each tab. 1st Security Agent Pro allows you to import and export PC security settings, and offers a flexible and complete password protection. The program is very easy-to-use, excellent online help is | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
87. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents anybody to run the program and change settings and uninstall the program. The "Import/Export" function helps you set up the same settings on | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
88. | ABC Security Protector 5.23 (softheap.com) | ||
useful if you want to disable the lowlevel access to your system. It's easy to use, excellent online help is also available. Try our password and security tools, free downloads. This nice free security utility enables you to protect your PC by disabling some features like: use of the MS-DOS command | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 563 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
89. | Access Administrator 4.14 (softheap.com) | ||
your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
90. | Access Administrator Pro 4.14 (getfreefile.com) | ||
Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives you a lot of abilities to allocate access to your files and folders | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
91. | Access Administrator Pro 4.14 (softheap.com) | ||
Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives you a lot of abilities to allocate access to your files and folders | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
92. | Access Denied 3.40 (johnru.com) | ||
requests username and password or simple password upon boot-up and locks desktop by one mouse click. It can't be bypassed on Windows 95/98/ME. All unwanted people are kept out to your PC. Very flexible use: multi-user support(up to 450 users), password encryption, integration with your favorite | |||
Updated: 9, 2005 | Rating: 58 | Author: Ivan Mayrakov | Size: 536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
93. | Accessor 1.7 (nesoft.org) | ||
access to main Windows functions, folders and documents. What's new in version 1.7: 1. New Items are added into Main Menu, such as: - Find Files and Folders, - Empty Recycle Bin, - Clear Documents History, - Formatting Floppy Disk. 2. Now original file icons are displayed while viewing File System (FDD, HDD, CD and Network drives). 3. Settings window | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleksey Skopin | Size: 554 kb | Shareware Go to category: Desktop > Other Similar programs | |||
94. | Active Backup Expert 1.92 (backuptool.com) | ||
easily mastered tool maintains backups of files in zip or cab format on hard and removable disks (CD, Zip drives etc.), in a LAN or WAN. A Wizard guides you through the steps of the backup-set creation: supplying the paths and filters for the included and excluded files, specifying the storage | |||
Updated: 2, 2006 | Rating: 16 | Author: Andrey Panichkin | Size: 1531 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
95. | Active Backup Expert Pro 1.92 (backuptool.com) | ||
creates automated zip- or cab-format backups of local and network files on hard disks, CDs and other removable devices, local network or FTP site. A Wizard guides you through the steps of the backup-set creation: selecting the folders and filters for included and excluded files, specifying the | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Panichkin | Size: 2582 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
96. | Active System Locker 3.0 (sowsoft.com) | ||
Locker is a handy utility that allows you to protect your personal computer from unauthorized access. You can use System Locker to restrict access to your PC. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop on system lock and provides an informative message | |||
Updated: 9, 2005 | Rating: 138 | Author: Vladimir Sinitsyn | Size: 611 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
97. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at your monitor and he has it all! Introducing Active Screen Lock, the unique security application by DMVSoft, allowing you to do whatever you want to do when you are away from the computer without having to worry a second. Active Screen Lock operates as | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
98. | Advanced Desktop Shield 1.63 (softstack.com) | ||
and desktop layouts of your users. Desktop layouts are saved to files, which include all files and folders located on the desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout or desktop layouts of your users, every time you or your users reboot your PC, the program will return everything on the desktop back | |||
Updated: 2, 2006 | Rating: 99 | Author: IM Soft | Size: 833 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
99. | Advanced Hide Folders 4.6 (hide-folders.biz) | ||
Hide Folders enables you to completely hide folders and files on your computer. The hidden files cannot be accessed unless the folders are unlocked with a password from within the program. You can simple drag and drop folders from Windows or add files by mask (e.g hide all .jpg files). In addition, as an added security measure, you can also lock the | |||
Updated: 9, 2005 | Rating: 81 | Author: Otto Schulz | Size: 258 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
100. | Advanced PDF Password Recovery Pro 2.21 (elcomsoft.com) | ||
protected Adobe Acrobat PDF files, which have "user" and/or "owner" passwords set, preventing the file from opening or editing, printing, selecting text and graphics etc. If only "owner" password is set, password recovery is not needed at all, but the file is being decrypted instantly (so all restrictions are being removed). "User" password can be recovered using | |||
Updated: 9, 2005 | Rating: 1485 | Author: Vladimir Katalov | Size: 1551 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Lock file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|