|
||||||
|
||
|
Home > Lock file software |
Related keywords: file, lock, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
1. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
impossible to use email without receiving spam in large amounts. G-Lock SpamCombat is your powerful solution for clearing your Inbox from spam, virus, and junk emails. G-Lock SpamCombat is email filtering software that lets you eliminate all unwanted messages at the server level without | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
2. | PowrClik Suite 2.7.4.104 (genntt.webs.com.ua) | ||
computer. Additional functions: run screen saver, turn off monitor, lock computer, hang up modem connection, run Task Scheduler, run file, play sound on alarm, measure performance. Preventive functions: disable screen saver, prevent suspend mode activation, prevent Windows shut down. And much | |||
Updated: 3, 2006 | Rating: 1651 | Author: Genntt Productions | Size: 315 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
3. | QVCS 3.10.6 (qumasoft.com) | ||
teams, and is easy to use and administer. See at a glance which files are checked out, which files have changed since check out, who most recently changed a file, etc. Directory recursion allows you to see this for a single directory, or for an entire project. Perform common operations | |||
Updated: 2, 2006 | Rating: 52 | Author: Jim Voris | Size: 1820 kb | Shareware Go to category: Development > Other Similar programs | |||
4. | QVCS-Pro 3.10.6 (qumasoft.com) | ||
with MS VS.Net 2003, MS VC++ and other IDEs. See at a glance which files are checked out, which files have changed since check out, who most recently changed a file, etc. Directory recursion allows you to see this for a single directory, or for an entire project. Perform common | |||
Updated: 2, 2006 | Rating: 0 | Author: Jim Voris | Size: 1820 kb | Shareware Go to category: Development > Other Similar programs | |||
5. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | EXECryptor 2.3.7 (softcomplete.com) | ||
(12-16 characters). A serial number can be time-limited, may be locked to Hardware ID, can contain encrypted registration information such as license type, allowed features and other user defined information. It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely prevents | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
7. | SQLExecMS 2.6 (laplas-soft.com) | ||
server performance counters;Check utilization of proc cache;Watch locks; Review space used by DB files, tables and indexes; Manage DB file and filegroups;Turn on and off trace flags;Manage scheduled jobs; Change SQL server and database options;Backup and restore databases; Analyze | |||
Updated: 2, 2006 | Rating: 433 | Author: Oleg Dantchenko | Size: 4928 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
8. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
9. | Sleep Timer Pro 4.8.2 (what-the.net) | ||
Sleep Timer Pro is an all-in-one System Utility to automate the use of your system. With Sleep Timer you may shutdown, reboot, or set an alarm all with a few clicks of the mouse. Set your time in intervals like 15,30,45,60,90 minutes. Version 3.x+ now includes Clock Syncronization to GMT/Navy Clock in minute | |||
Updated: 2, 2006 | Rating: 61 | Size: 4813 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
10. | FineBrowser 3.2.25 (finebrowser.com) | ||
You can change the order of the window tabs by using drag&drop, lock the important windows from accidental close and rename them with ease. The powerful bookmarks manager offers advanced management features, personal page ratings, comments, grouped favorites and more. FineBrowser is designed to work with image archive, wich is organized by the program using different sources | |||
Updated: 2, 2006 | Rating: 76 | Author: Alex Akimov | Size: 3415 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
11. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents anybody to run the program and change settings and uninstall the program. The 'Import/Export' function helps you set up the same settings on | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
12. | Secure Image Express 4.0 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 2, 2006 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
13. | Password Maintenance 2.07 (softdd.com) | ||
external device to better secure your passwords, as your password files will not even exist on your pc if you choose this option. You can also print a list of all your passwords and websites on paper for safe backup storage, and you can add, update, and delete websites and passwords in your list. You | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftDD Software | Size: 535 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
14. | Secure Image Express 4.0 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 2, 2006 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
15. | Mp3 Filter 4.2.4 (hardcoded.net) | ||
your collection is: Hard drives, Multiple Mp3 CDs, anything. The file comparison process, which basically compare filename's words between them, is completely customizable. Mp3 Filter also have tons of other features: * Profile driven scans. * Incredibly fast comparing engine. * Supports MP3, WMA, OGG, M4A/M4P (iTunes format). * Easy to use profile | |||
Updated: 2, 2006 | Rating: 1578 | Author: Virgil Dupras | Size: 1083 kb | Shareware Go to category: Audio & Multimedia > Audio File Players Similar programs | |||
16. | Instant Remote Control 2.2.9 (omniquad.com) | ||
multiple licenses-requires to be installed only on the administrator's computers used to control other PCs-a single license can support large networks-no warning displayed at remote end-creates a tree of all computers on your network automatically-manually enter IP details and access PCs not listed as well-works by sending a preconfigured host to a would-be host machine-the host | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Sobstel | Size: 2341 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
17. | Remote Performance Observer 3.0 (apexoft.com) | ||
IP, TCP, UDP, ICMP, SMTP, etc.), OS critical parameters (Paging File, Running Processes, etc.), running processes information (Processor Usage, Memory Consumption, Threads, Priority, etc.). Setting remote expert diagnosis on processor, memory, hard drive, network components. Maintaining alarms with logging to a file, playing sounds, sending e-mails, sending messages to | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexei Polkovnikov | Size: 2660 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
18. | wodMailbox 2.0.7.0 (weonlydo.com) | ||
there either regular mailbox just as is used on UNIX systems (one file with full mail messages one after another) or just one message inside, just as Outlook Express saves .eml files. When you need to parse received messages, it might be hard to check all the possibilities that one simple mail message may contain. We all used to receive simple email messages - few headers | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 821 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
19. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
20. | WinLock Remote Administrator 1.22 (crystaloffice.com) | ||
remote WinLock and WinLock Professional clients via network, lock remote workstations, and apply security profiles by means of easy-to-use interface. Being a client-server application, Remote Administrator allows the administrator to control the network installations of WinLock without leaving the computer. By means of this tool, administrators can manage WinLock settings, enable | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 2128 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
21. | Windows Security Officer 6.8.1.1 (mybestsoft.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
22. | Tray Commander 2.3 (ardamax.com) | ||
off, stand by, hibernate and reboot computer Monitor power off Lock Workstation Open favorite web pages Open or close CD tray (with automatical closing) Launch Control Panel items Open files Paste text Launch screen saver Other features: Windows 98/NT/2000/XP support Hot key editor Drag & drop support Large icons in menu support Multilingual | |||
Updated: 2, 2006 | Rating: 0 | Author: Maxim Frolov | Size: 843 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
23. | Transparent Screen Lock PRO for WinNT/2000/XP/2003 4.50 (e-motional.com) | ||
protect your workstation or server with Transparent Screen Lock PRO while viewing programs that are running. Prevent system access via CRTL-ALT-DEL. Options to remove the pocess from the Windows Task Manager and restrict configuration menus to Administrators only in order to prevent regular users from disabling or tampering with the program. Log file tracks failed logon | |||
Updated: 2, 2006 | Rating: 16 | Author: Sandra Buckingham | Size: 992 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
24. | Remote Performance Observer 3.0 (apexoft.com) | ||
IP, TCP, UDP, ICMP, SMTP, etc.), OS critical parameters (Paging File, Running Processes, etc.), running processes information (Processor Usage, Memory Consumption, Threads, Priority, etc.). Setting remote expert diagnosis on processor, memory, hard drive, network components. Maintaining alarms with logging to a file, playing sounds, sending e-mails, sending messages to | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexei Polkovnikov | Size: 2660 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
25. | Registry First Aid 4.3.1 (rosecitysoftware.com) | ||
4.3 - It's faster, finds more problems than others and is even easier to use! People's Choice Winner 2003 Shareware Industry Conference! Tired of Windows crashing? Sick of having software lock up on you or taking forever to load? The problem could be all of those incorrect registry entries caused by software installations and un-installations that went awry! Not all | |||
Updated: 2, 2006 | Rating: 16 | Author: Konstantin Golovatsky | Size: 1739 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
26. | Access Administrator 4.14 (getfreefile.com) | ||
your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
27. | Password Protected Lock 2.92 (softfolder.com) | ||
Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time and provides an informative message that you can edit as you like | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftFolder Inc | Size: 724 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
28. | Hide Files 3.4 (hide-files.biz) | ||
have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
29. | Hide Files & Folders 2.4 (softstack.com) | ||
Files & Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
30. | Hide Files 3.4 (spydex.com) | ||
have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
31. | File & Folder Protector 2.33 (softheap.com) | ||
Files and Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 740 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
32. | Evidence Exterminator 2.14 (softstack.com) | ||
information. Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information about all your steps: all pictures you have seen, all passwords and | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
33. | EF Duplicate Files Manager 3.21 (efsoftware.com) | ||
EF Duplicate Files Manager is a useful program that help you to find out and remove duplicate files with same name, same size, same content on specify paths, files that occupy so unnecessarily storage place on your computer or your server. You can let the program work in several ways. In | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1854 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
34. | Easy File Protector 4.14 (softstack.com) | ||
File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
35. | Easy Desktop Keeper 1.63 (softheap.com) | ||
Desktop Keeper gives you the ability to save, restore, manage and lock your desktop layout including files and folders located on your desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout, every time you reboot your PC, the | |||
Updated: 2, 2006 | Rating: 68 | Author: Ixis Ltd | Size: 841 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
36. | Dr.Salman's Window Power Tools 5.0-2005R1 (dmisoftware.com) | ||
by four times. It also cleans your hard drive, searches for garbage files and cleans them, decreases window crashes by 80-90%, provides a memory monitor, recovers precious wasted RAM to give your system the just booted feeling. It will keep your system running as smoothly as possible. Another amazing | |||
Updated: 2, 2006 | Rating: 39 | Author: Dr.Salman Zafar | Size: 5525 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
37. | Easy Desktop Keeper 1.63 (getfreefile.com) | ||
Desktop Keeper gives you the ability to save, restore, manage and lock your desktop layout including files and folders located on your desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout, every time you reboot your PC, the | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 841 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
38. | CD-DVD Lock 2.01 (getfreefile.com) | ||
Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them. You can gain access to your devices back by entering a valid password that only you know | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
39. | CD-DVD Lock 2.01 (softheap.com) | ||
Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them. You can gain access to your devices back by entering a valid password that only you know | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
40. | Backup4all 3.0 (backup4all.com) | ||
removable media (such as USB drives). Backup4all can backup open/locked files and it can perform full, differential, incremental and mirror backups. When defining a backup you can also set file filters and schedule the backup for automatic execution. Once a backup is performed, you can see what files have been changed since the last backup or you can read the | |||
Updated: 2, 2006 | Rating: 24 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
41. | Backup4all 3.0 (backup4all.com) | ||
removable media (such as USB drives). Backup4all can backup open/locked files and it can perform full, differential, incremental and mirror backups. When defining a backup you can also set file filters and schedule the backup for automatic execution. Once a backup is performed, you can see what files have been changed since the last backup or you can read the | |||
Updated: 2, 2006 | Rating: 39 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
42. | Backup4all 3.0 (backup4all.com) | ||
removable media (such as USB drives). Backup4all can backup open/locked files and it can perform full, differential, incremental and mirror backups. When defining a backup you can also set file filters and schedule the backup for automatic execution. Once a backup is performed, you can see what files have been changed since the last backup or you can read the | |||
Updated: 2, 2006 | Rating: 0 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
43. | Asmw PC-Optimizer pro 7.6 (asmwsoft.com) | ||
and optimization utility to tune up windows performance. Remove junk files and zero size files to save valuable disk space; Registry Cleaner, to prevent application crashes;backup and restore backup; popup killer; Startup Manager, to prevent spy applications from running behind your back; erase | |||
Updated: 2, 2006 | Rating: 264 | Author: Asmw Soft Systems | Size: 6400 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
44. | Advanced Desktop Shield 1.63 (softstack.com) | ||
and desktop layouts of your users. Desktop layouts are saved to files, which include all files and folders located on the desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout or desktop layouts of your users, every time you or your users reboot your PC, the program will return everything on the desktop back | |||
Updated: 2, 2006 | Rating: 99 | Author: IM Soft | Size: 833 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
45. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at your monitor and he has it all! Introducing Active Screen Lock, the unique security application by DMVSoft, allowing you to do whatever you want to do when you are away from the computer without having to worry a second. Active Screen Lock operates as | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
46. | Active Backup Expert 1.92 (backuptool.com) | ||
easily mastered tool maintains backups of files in zip or cab format on hard and removable disks (CD, Zip drives etc.), in a LAN or WAN. A Wizard guides you through the steps of the backup-set creation: supplying the paths and filters for the included and excluded files, specifying the storage | |||
Updated: 2, 2006 | Rating: 16 | Author: Andrey Panichkin | Size: 1531 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
47. | Active Backup Expert Pro 1.92 (backuptool.com) | ||
creates automated zip- or cab-format backups of local and network files on hard disks, CDs and other removable devices, local network or FTP site. A Wizard guides you through the steps of the backup-set creation: selecting the folders and filters for included and excluded files, specifying the | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Panichkin | Size: 2582 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
48. | Access Administrator 4.14 (softheap.com) | ||
your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
49. | Access Administrator Pro 4.14 (getfreefile.com) | ||
Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives you a lot of abilities to allocate access to your files and folders | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
50. | Access Administrator Pro 4.14 (softheap.com) | ||
Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives you a lot of abilities to allocate access to your files and folders | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
51. | 1st Security Agent Pro 6.14 (softheap.com) | ||
from editing your Favorites, disable downloading and installing files from the Internet, disable individual tabs in the Internet Options dialog, as well as specific settings from each tab. 1st Security Agent Pro allows you to import and export PC security settings, and offers a flexible and complete password protection. The program is very easy-to-use, excellent online help is | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
52. | 1st Screen Lock 6.14 (softheap.com) | ||
Screen Lock is a password-protected desktop security utility that lets you lock your desktop with a password on boot, or at the time you are leaving your PC. You can use the built-in spy utility that works in background and enables you to spy on your PC users by fixing all user moves in a log | |||
Updated: 2, 2006 | Rating: 479 | Author: Ixis Ltd | Size: 1106 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
53. | 1st Evidence Remover 2.14 (getfreefile.com) | ||
you use Windows, open folders, search for files and see pictures, work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use and the | |||
Updated: 2, 2006 | Rating: 190 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
54. | 1st Evidence Remover 2.14 (softheap.com) | ||
you use Windows, open folders, search for files and see pictures, work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use and the | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
55. | X2Net WebCompiler 3.0.0.49 (x2net.com) | ||
powerful HTML Compiler produces .exe files for distribution from groups of HTML pages. Built-in ultra fast searching, favorites and history management, page protection, passwords, kiosk mode,form processing etc. Built-in installer/uninstaller, powerful encrytion. System locking to restrict | |||
Updated: 2, 2006 | Rating: 0 | Author: X2Net Staff | Size: 4957 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
56. | Watch Right 2002.0.77 (bpssoft.com) | ||
concerned parent with the ability to "keep an eye" on their child's online activities. Automatically log your child's instant messages, chatroom conversations, email messages, message board postings, and web sites they visit while online. В Watch Right is designed to work invisibly in the | |||
Updated: 2, 2006 | Rating: 0 | Author: Bradley O'Keefe | Size: 2842 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
57. | Private Shell SSH Client 2.1 (privateshell.com) | ||
CVS, VNC, e-mal clients and other software). Private Shell's default configuration allows you to connect to any SSH1 or SSH2 server in the most secure way by choosing the strongest encryption algorithms supported by a remote computer. Full support for ssh tunneling and X11 forwarding. Use built-in Secure FTP client (SFTP client) to transfer files between computers | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
58. | Hyper Maker HTML 3000.27 (bersoft.com) | ||
pages, linked images, and sounds in a single, encrypted, compressed file. Your creations can include .gif, .bmp, .jpg, and .png graphics; .avi movies; TrueType fonts; and .wav and .mid sound files. A royalty-free setup/viewer program (with a Web browser look-and-feel and multilanguage support) | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Bernardo | Size: 2606 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
59. | Huey PC Remote Control 5.5 (gidsoftware.com) | ||
loss of screen resolution; Reasonable usability at 56k modem speeds; File transfer; Clipboard transfer; User definable hotkeys; User definable IP Port; Proxy socks support; Full screen mode; Login, logout or lock your computer remotely; Data compression; Optional Full Encryption; Swap mouse buttons for left handed users; Thin installation (1 x Client file, 3 x server | |||
Updated: 2, 2006 | Rating: 0 | Author: Glen Dean | Size: 1212 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
60. | G-Lock Email Processor 1.98 (glocksoft.com) | ||
any data from the message body and message header and save it to a file of user definable format. Using Email Processor you are also able to send a text or HTML message to your recipients as well as forward the message you received to another email address. The program can be easily set up to | |||
Updated: 2, 2006 | Rating: 119 | Author: Alex Markov | Size: 2601 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
61. | G-Lock EasyMail Professional 4.62 (glocksoft.com) | ||
and subject lines via its powerful mail-merge function. EasyMail Pro's distinctive voicemail capability also lets you add audio content to your messages. Supporting a wide range of compression formats, you can even set the recording to start playing when the mail is opened. HTML and Multi part (MIME) | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3324 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
62. | G-Lock EasyMail 4.62 (glocksoft.com) | ||
G-Lock EasyMail was developed to help people run and manage mailing lists, newsletters, announcement lists and customer updates. G-Lock EasyMail is a powerful group mailer which sends your message directly from your outbox to the recipient's mail server (without using any ISP's SMTP server). Program supports multi-threaded delivery, and so works several times | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3281 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
63. | Easy File & Folder Protector 4.14 (softstack.com) | ||
files and folders situated on local media of Windows 95/98/ME/NT/2000/XP with Easy File & Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File & Folder Protector has an easy-to-use user interface allowing you to allocate access to your files and folders | |||
Updated: 2, 2006 | Rating: 46 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
64. | Atomic Newsgroup Explorer 1.40 (atompark.com) | ||
list of e-mail addresses using ANE! The list can be saved to a file, Windows Clipboard or MS Word or MS Excel application. Atomic Newsgroup Extractor does not depend upon any additional software the way many email grabbers depend on third-party libraries. The most important feature of ANE is an availability to work with private newsgroups locked by password and servers | |||
Updated: 2, 2006 | Rating: 42 | Author: Evgeny Medvednicov | Size: 1175 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
65. | Advanced Email Verifier 5.15 (glocksoft.com) | ||
Text (.CSV), HTML, Word, Lotus 1-2-3, QuattroPro, XML, MS Access files, and DBISAM tables (.dat files). You can also connect to the database on your disk and verify the email addresses directly from the database. AEV helps you maintain your mailing list clean and decrease the Internet traffic keeping you from sending undeliverable messages that cause a ping-pong of useless | |||
Updated: 2, 2006 | Rating: 42 | Author: Alex Markov | Size: 4148 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
66. | QVCS-Enterprise 1.2.10 (qumasoft.com) | ||
and a custom Ant task to support scripting. See at a glance which files are checked out, which files have changed since check out, who most recently changed a file, etc. Perform common operations like check in or check out with the click of a button. Supports both text and binary | |||
Updated: 2, 2006 | Rating: 0 | Author: Jim Voris | Size: 2652 kb | Shareware Go to category: Development > Other Similar programs | |||
67. | TurboNote+ desktop sticky notes v6.0 (turbonote.com) | ||
Web and email addresses. Change note colors and sizes, set alarms, lock them and keep your screen uncluttered by hiding them. Use handy templates for common messages or make up your own style with optional rich text editing, transparency control and images. TurboNotes stay around when you turn your | |||
Updated: 2, 2006 | Rating: 173 | Author: Vicki Hyde | Size: 1616 kb | Shareware Go to category: Business > Other Similar programs | |||
68. | AudioLabel CD/DVD Labeler 3.20 (audiolabel.com) | ||
from the Freedb internet database, CD-Text and CDPlayer.ini file. Our cd label creator can even read and label your MP3 CDs using the ID3 tag and filename. Unlike other cd labeling software, you'll never be locked into a particular brand of label paper. All popular brands are supported and even non-standard labels can be adjusted using the "Label Alignment Wizard" | |||
Updated: 2, 2006 | Rating: 228 | Author: Cripple Creek Software | Size: 3870 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
69. | NotesPlusPlus 5.5 (notesplusplus.com) | ||
any computer sticky note; organize sticky notes in groups, attach files/urls to sticky notes; associate virtual sticky notes with files; modify all sticky note settings; set up default settings for newly created notes; accelerate work using hotkeys; lock sticky notes to prevent unauthorized use; import *.txt and *.rtf files to sticky notes; save sticky notes in | |||
Updated: 9, 2005 | Rating: 0 | Author: NotesPlusPlus. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
70. | Sticky Notes Std 5.0 (morun.net) | ||
in groups, send sticky notes over LAN/Internet or via e-mail, attach files/urls to sticky notes, lock sticky notes to prevent unauthorized use, import .txt and .rtf files to sticky notes, save sticky note in *.txt, *.rtf formats; save sticky note as pictures (*.jpg, *.bmp formats) | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. net | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
71. | MoRUN.net Sticker 5.0 (morun.com) | ||
in groups, send sticky notes over LAN/Internet or via e-mail, attach files/urls to sticky notes, lock sticky notes to prevent unauthorized use, import .txt and .rtf files to sticky notes, save sticky note in *.txt, *.rtf formats; save sticky note as pictures (*.jpg, *.bmp formats) | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
72. | CleanMantra 3.0 (pcmantra.com) | ||
CleanMantra shreds files which compromise privacy, cleans all traces of Online Activities as well as Offline Activities through effortless, secured, user-friendly options. Increases efficiency of PC by permanently cleaning useless files through Shred Function. It enables trouble free browsing by preventing IE Browser Home Page Hijacking. Full Proof Scheduling of | |||
Updated: 9, 2005 | Rating: 0 | Author: PC Mantra | Size: 656 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
73. | LoanAmortizer Standard Edition 3.1 (loanamortizer.com) | ||
Once any amortization schedule is prepared it can be saved in a file for future reference, comparison or archive. Everything is completed automatically, accurately and is easy and simple to be used and handled. Canadian Mortgage calculations are also implemented in LoanAmortizer Standard Edition, both for mortgage and regular loans. LoanAmortizer Standard Edition is one of the few | |||
Updated: 9, 2005 | Rating: 0 | Author: George Athannassov | Size: 1407 kb | Shareware Go to category: Business > Other Similar programs | |||
74. | 12Ghosts Shredder 7.10 (12ghosts.com) | ||
files, drag and shred, DoD conform, Wipe Disk. Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover files from your disk! Nobody will even find out the previous name or file size. The file can be overwritten several times with random bits so that even the | |||
Updated: 9, 2005 | Rating: 251 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
75. | Picture and Video Encrypt 2.03b (softdd.com) | ||
software will allow you to prevent access by encrypting any media files, and will even disguise the names of the videos or pictures so they cannot be recognized by anyone else. You can easily decrypt and return the files back to normal with the click of a button, and even the file names will return to your original file name. This software is also password | |||
Updated: 9, 2005 | Rating: 42 | Author: SoftDD Software | Size: 576 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
76. | GiPo@FileUtilities 2.9 (gibinsoft.net) | ||
services: GiPo@MoveOnBoot - copying/moving/renaming/deleting files and folders on the next system boot. GiPo@DirMonitor - monitoring changes in the file system. GiPo@Mount - local folders substitution and local/remote drives mounting. GiPo@ReadTest - checking files and folders for read errors. Utilities can be integrated into shell. GiPo@MoveOnBoot | |||
Updated: 9, 2005 | Rating: 0 | Author: Igor Artemov | Size: 867 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
77. | Zip Backup to CD 3.18 (zip-backup.com) | ||
Backup to CD is designed to backup your data files using the standard Zip file format, allowing backup files to be viewed and restored with most zip file utilities. Zip Backup to CD distributes the files to be backedup in several stand alone Zip files of a size fitting a standard CD (CD-R) or a size chosen by the user and writes it to CD/DVD | |||
Updated: 9, 2005 | Rating: 16 | Author: Rene Mogensen | Size: 946 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
78. | PowerControl 1.0 (onlimemedia.com) | ||
will allow you to make Shutdown, Reboot, Hibrnete, Logoff, Standby, Lock the local or removed computer (or several computers). As you may may awake the removed computer with the help of function Wake-On-LAN. You can specify a delay, which can either be an absolute time (eg. 8pm) or a relative time (eg. "20 minutes from now"), during which a message you specify can be displayed | |||
Updated: 9, 2005 | Rating: 20 | Author: Pavel Abraksas | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
79. | SecurDesk! 5.32 (cursorarts.com) | ||
a complete replacement for the Windows default Explorer.exe desktop/file manager shell. SecurDesk! Features Include: a desktop interface which can be custom designed; Logging of system usage; Enhanced file management with optional restrictions; Virtual desktops; Data protection with | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
80. | Security Folder 2.0 (security-folder.com) | ||
ago, our puny hard drives contained hardly a couple of thousands of files. Today, our massive hard drives contain dozens and even hundreds of thousands of various files and folders and, which is most important, the overall information value increased dramatically. From private messages to business-critical data – every singe bit of valuable information we may have on our | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 515 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
81. | xReminder Pro 4.2 (xreminder.com) | ||
and Swatch Internet Time. It also can synchronize your computer's clock with Atomic Time Servers. The program also has some useful features like stopwatches and countdown timers. Other options include: smart import-export of data in native and commonly used file formats, pop-up calendar that easy to access from clock or from the system tray, print preview, and more! xReminder | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Kulemin | Size: 1780 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
82. | GiPo@FileUtilities 2.9 (gibinsoft.net) | ||
services: GiPo@MoveOnBoot - copying/moving/renaming/deleting files and folders on the next system boot. GiPo@DirMonitor - monitoring changes in the file system. GiPo@Mount - local folders substitution and local/remote drives mounting. GiPo@ReadTest - checking files and folders for read errors. Utilities can be integrated into shell. GiPo@MoveOnBoot | |||
Updated: 9, 2005 | Rating: 0 | Author: Igor Artemov | Size: 908 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
83. | LockEXE 2.0 (mazepath.com) | ||
permission! You can either browse for the program you want to lock, or simply drag it to the select box! Nothing could be easier! Set the password and click Lock. The program will no longer run without the password, there is no way around it! So Easy to LockEXE can password protect your programs. Your email, word processor, browser or ANY other programs you choose | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 145 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
84. | PalmTree 3.5 (clickok.co.uk) | ||
protect, lock and hide folders or directories and their subdirectories and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No | |||
Updated: 9, 2005 | Rating: 42 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
85. | AllnSync 3.5.2 (rlegsoftware.com) | ||
is a very fast and easy to use Directory / File synchronizer. It's main function is to synchronize critical files in a selected directory and it's sub-directories on two different drives which can be on the same computer, or different computers over a network. It is ideal for keeping files synchronized between a desktop and laptop or between | |||
Updated: 9, 2005 | Rating: 0 | Author: Ray Giovagnoli | Size: 1554 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
86. | Virtual Flower 1.2 (homepage.ntlworld.com) | ||
of rustling leaves, or visit an island with exotic flowers. The files are extremely tiny, most are four or five KB, suitable for inclusion in larger 3D scenes. Uses the popular VRML format - get the Cortona plug in to view them, or embed in web page with a java applet such a Blaxxun. Or save as flash animated jpegs, flash movies, or animation frames in many formats such as | |||
Updated: 9, 2005 | Rating: 0 | Author: Robert Walker | Size: 2618 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
87. | Secure Image Pro 4.0 (artistscope.com) | ||
the images on your web site and CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
88. | ShareGuard V1 1 (padfile.zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
89. | Time & Chaos 5.6.5 (isbister.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 9, 2005 | Rating: 0 | Author: Bill Tiede | Size: 3756 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
90. | virtualCrypt 3.02 (netindiasolutions.com) | ||
Moreover these virtual drives are created in innocent sound files using steganographic technique. virtualCrypt is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
91. | Wincph encryption software 4.7 (keepsecret.net) | ||
file and folder encryption software.It protect the privacy of your sensitive files and e-mail messages by encrypting them with the highest level of security.Includes ability to store several files and folders in one encrypted archive. Ability to make self-decrypted Archive. Drag and | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuxue Tu | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
92. | Window Security Toolkit 5.0 (dmisoftware.com) | ||
Internet Explorer and more. Also Includes SHA1 160 bit and MD5 File Encryption plus Ultra Desktop Lock. An excellent program if you don't want others to be messing up with your system. Get over 51 Advanced Security Settings for Windows with this power tool ! Window Security Toolkit helps you make windows totally secured by Providing access restrictions on the control panel | |||
Updated: 9, 2005 | Rating: 0 | Author: Dr.Salman Zafar | Size: 1710 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
93. | WinForcer 3 (winforcer.com) | ||
can configure multiple machines by using distribution configuration files. So you do not need to individually set up each machines config. Can be configured not to WinForce the Administrator User or prompt anyone logged in as administrator for the password thus ensuring you will not forget the | |||
Updated: 9, 2005 | Rating: 431 | Author: Richard Smee | Size: 2195 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
94. | WinGuardian 3.0 (webroot.com) | ||
viewing inappropriate web pages. WinGuardian also has the option to "lock down" the Windows 98/Me environment so that users can only run authorized programs. Users will not be able to modify system settings (like the Windows background wallpaper) or run unauthorized software. This is useful in helping to prevent viruses and intentional or unintentional operating system changes. An | |||
Updated: 9, 2005 | Rating: 71 | Author: Steve Thomas | Size: 1561 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
95. | xReminder Pro 4.2 (dualitysoft.com) | ||
and Swatch Internet Time. It also can synchronize your computer's clock with Atomic Time Servers. The program also has some useful features like stopwatches and countdown timers. Other options include: smart import-export of data in native and commonly used file formats, pop-up calendar that easy to access from clock or from the system tray, print preview, and more! xReminder | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Kulemin | Size: 1780 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
96. | StartPro 2.0 (daesoft.com) | ||
remove programs located in the Registry, Startup folder, and win.ini file that load during start-up. Features include SmartBin, which saves deleted items for future restoration, and Boot Options, which allows the user to modify settings located in the msdos.sys file. StartPro also includes | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Price | Size: 440 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
97. | System Sentry 2.2.05 (easydesksoftware.com) | ||
added, incorrect versions, and date changes of your system files and replaces them for you. This helps avoid the unnecessary and frustrating task of reinstalling Windows or specific problem programs. System Sentry offers the following features: - Cyclic Redundancy Check, detects files that are corrupt or possibly infected by a virus. - A Program Aligner that makes | |||
Updated: 9, 2005 | Rating: 0 | Author: Guy Young | Size: 3649 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
98. | TK8 Safe 2.5 (tk8.com) | ||
passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not only stores your information, but helps you to use it. A fast and easy-to-use interface allows you to find information quickly. You | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
99. | Universal Shield 4.0 (everstrike.com) | ||
Software is the ultimate protection tool for your computer - hide files, folders, and drives, and set access rules using flexible security combinations for your most precious data. A unique feature of Universal Shield is the perfect combination of data hiding and encrypting. This feature is very | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
100. | User Control 2005 (salfeld.com) | ||
you to block any undesired window title or any application / EXE-file. On the Internet you can define exactly which contents shall be allowed and which not. You can also explicitly allow only authorized applications and/or Internet addresses. Block the varied Windows systems areas (such as system control, setting on start menu, downloads from IE, Windows settings, etc.) with just a | |||
Updated: 9, 2005 | Rating: 34 | Author: Dierk Salfeld | Size: 4027 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Lock file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|