|
||||||
|
||
|
Home > Lock file software |
Related keywords: file, lock, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
1. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
impossible to use email without receiving spam in large amounts. G-Lock SpamCombat is your powerful solution for clearing your Inbox from spam, virus, and junk emails. G-Lock SpamCombat is email filtering software that lets you eliminate all unwanted messages at the server level without | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
2. | Super Utilities 6.25 (superlogix.net) | ||
in protecting and securing sensitive information. You can hide or lock folders, clean your system tracks, password-protect applications that hold sensitive data, quickly and securely delete files, and hide IE Favorites and Start menu items from view. 3.System Maintenance will help automate computer maintenance jobs to keep it smooth, fast, and error free. It includes Task | |||
Updated: 3, 2006 | Rating: 16 | Author: li jiangnan | Size: 3328 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
3. | EXECryptor 2.3.7 (softcomplete.com) | ||
(12-16 characters). A serial number can be time-limited, may be locked to Hardware ID, can contain encrypted registration information such as license type, allowed features and other user defined information. It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely prevents | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
4. | SQLExecMS 2.6 (laplas-soft.com) | ||
server performance counters;Check utilization of proc cache;Watch locks; Review space used by DB files, tables and indexes; Manage DB file and filegroups;Turn on and off trace flags;Manage scheduled jobs; Change SQL server and database options;Backup and restore databases; Analyze | |||
Updated: 2, 2006 | Rating: 433 | Author: Oleg Dantchenko | Size: 4928 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
5. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents anybody to run the program and change settings and uninstall the program. The 'Import/Export' function helps you set up the same settings on | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
6. | MyCafeCup Platinum 2.214 (mycafecup.com) | ||
real-time way to manage your client machines via monitoring and locking in order to process PC rentals. It offers secure access to client computers and grants access to individuals by creating user code/password accounts that can be charged per use or on a time schedule. New! XP (Home/Pro) SP1-2+ / Server 2003 (all Edition) with DHCP / ICS / Windows Firewall / WOL / nProtect | |||
Updated: 2, 2006 | Rating: 158 | Author: Natalee Jantzent | Size: 8880 kb | Shareware Go to category: Business > Vertical Market Apps Similar programs | |||
7. | Password Maintenance 2.07 (softdd.com) | ||
external device to better secure your passwords, as your password files will not even exist on your pc if you choose this option. You can also print a list of all your passwords and websites on paper for safe backup storage, and you can add, update, and delete websites and passwords in your list. You | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftDD Software | Size: 535 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
8. | Mp3 Filter 4.2.4 (hardcoded.net) | ||
your collection is: Hard drives, Multiple Mp3 CDs, anything. The file comparison process, which basically compare filename's words between them, is completely customizable. Mp3 Filter also have tons of other features: * Profile driven scans. * Incredibly fast comparing engine. * Supports MP3, WMA, OGG, M4A/M4P (iTunes format). * Easy to use profile | |||
Updated: 2, 2006 | Rating: 1578 | Author: Virgil Dupras | Size: 1083 kb | Shareware Go to category: Audio & Multimedia > Audio File Players Similar programs | |||
9. | Instant Remote Control 2.2.9 (omniquad.com) | ||
multiple licenses-requires to be installed only on the administrator's computers used to control other PCs-a single license can support large networks-no warning displayed at remote end-creates a tree of all computers on your network automatically-manually enter IP details and access PCs not listed as well-works by sending a preconfigured host to a would-be host machine-the host | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Sobstel | Size: 2341 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
10. | WiseTerm Telnet/Serial (32-bit) 3.1.2 (johnnypops.demon.co.uk) | ||
tab-stops; char, line, column, rectangle clear/fill functions; line locking; answerback; monitor mode; line drawing; remotely switchable emulation. Supports session logging. Includes a modem dialer and a simple phonebook. When using telnet, you can use your host file, or an edited version of your host file, as a machine directory. Includes printing, and cut and paste | |||
Updated: 2, 2006 | Rating: 48 | Author: John Popplewell | Size: 415 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
11. | wodMailbox 2.0.7.0 (weonlydo.com) | ||
there either regular mailbox just as is used on UNIX systems (one file with full mail messages one after another) or just one message inside, just as Outlook Express saves .eml files. When you need to parse received messages, it might be hard to check all the possibilities that one simple mail message may contain. We all used to receive simple email messages - few headers | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 821 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
12. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
13. | WinLock Remote Administrator 1.22 (crystaloffice.com) | ||
remote WinLock and WinLock Professional clients via network, lock remote workstations, and apply security profiles by means of easy-to-use interface. Being a client-server application, Remote Administrator allows the administrator to control the network installations of WinLock without leaving the computer. By means of this tool, administrators can manage WinLock settings, enable | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 2128 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
14. | Windows Security Officer 6.8.1.1 (mybestsoft.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
15. | Password Protected Lock 2.92 (softfolder.com) | ||
Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time and provides an informative message that you can edit as you like | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftFolder Inc | Size: 724 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
16. | Hide Files 3.4 (hide-files.biz) | ||
have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
17. | Hide Files 3.4 (spydex.com) | ||
have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
18. | EF Duplicate Files Manager 3.21 (efsoftware.com) | ||
EF Duplicate Files Manager is a useful program that help you to find out and remove duplicate files with same name, same size, same content on specify paths, files that occupy so unnecessarily storage place on your computer or your server. You can let the program work in several ways. In | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1854 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
19. | Dr.Salman's Window Power Tools 5.0-2005R1 (dmisoftware.com) | ||
by four times. It also cleans your hard drive, searches for garbage files and cleans them, decreases window crashes by 80-90%, provides a memory monitor, recovers precious wasted RAM to give your system the just booted feeling. It will keep your system running as smoothly as possible. Another amazing | |||
Updated: 2, 2006 | Rating: 39 | Author: Dr.Salman Zafar | Size: 5525 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
20. | Backup4all 3.0 (backup4all.com) | ||
removable media (such as USB drives). Backup4all can backup open/locked files and it can perform full, differential, incremental and mirror backups. When defining a backup you can also set file filters and schedule the backup for automatic execution. Once a backup is performed, you can see what files have been changed since the last backup or you can read the | |||
Updated: 2, 2006 | Rating: 24 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
21. | Backup4all 3.0 (backup4all.com) | ||
removable media (such as USB drives). Backup4all can backup open/locked files and it can perform full, differential, incremental and mirror backups. When defining a backup you can also set file filters and schedule the backup for automatic execution. Once a backup is performed, you can see what files have been changed since the last backup or you can read the | |||
Updated: 2, 2006 | Rating: 39 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
22. | Backup4all 3.0 (backup4all.com) | ||
removable media (such as USB drives). Backup4all can backup open/locked files and it can perform full, differential, incremental and mirror backups. When defining a backup you can also set file filters and schedule the backup for automatic execution. Once a backup is performed, you can see what files have been changed since the last backup or you can read the | |||
Updated: 2, 2006 | Rating: 0 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
23. | Asmw PC-Optimizer pro 7.6 (asmwsoft.com) | ||
and optimization utility to tune up windows performance. Remove junk files and zero size files to save valuable disk space; Registry Cleaner, to prevent application crashes;backup and restore backup; popup killer; Startup Manager, to prevent spy applications from running behind your back; erase | |||
Updated: 2, 2006 | Rating: 264 | Author: Asmw Soft Systems | Size: 6400 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
24. | Active Backup Expert 1.92 (backuptool.com) | ||
easily mastered tool maintains backups of files in zip or cab format on hard and removable disks (CD, Zip drives etc.), in a LAN or WAN. A Wizard guides you through the steps of the backup-set creation: supplying the paths and filters for the included and excluded files, specifying the storage | |||
Updated: 2, 2006 | Rating: 16 | Author: Andrey Panichkin | Size: 1531 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
25. | Active Backup Expert Pro 1.92 (backuptool.com) | ||
creates automated zip- or cab-format backups of local and network files on hard disks, CDs and other removable devices, local network or FTP site. A Wizard guides you through the steps of the backup-set creation: selecting the folders and filters for included and excluded files, specifying the | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Panichkin | Size: 2582 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
26. | X2Net WebCompiler 3.0.0.49 (x2net.com) | ||
powerful HTML Compiler produces .exe files for distribution from groups of HTML pages. Built-in ultra fast searching, favorites and history management, page protection, passwords, kiosk mode,form processing etc. Built-in installer/uninstaller, powerful encrytion. System locking to restrict | |||
Updated: 2, 2006 | Rating: 0 | Author: X2Net Staff | Size: 4957 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
27. | Watch Right 2002.0.77 (bpssoft.com) | ||
concerned parent with the ability to "keep an eye" on their child's online activities. Automatically log your child's instant messages, chatroom conversations, email messages, message board postings, and web sites they visit while online. Â Watch Right is designed to work invisibly in the | |||
Updated: 2, 2006 | Rating: 0 | Author: Bradley O'Keefe | Size: 2842 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
28. | Private Shell SSH Client 2.1 (privateshell.com) | ||
CVS, VNC, e-mal clients and other software). Private Shell's default configuration allows you to connect to any SSH1 or SSH2 server in the most secure way by choosing the strongest encryption algorithms supported by a remote computer. Full support for ssh tunneling and X11 forwarding. Use built-in Secure FTP client (SFTP client) to transfer files between computers | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
29. | Hyper Maker HTML 3000.27 (bersoft.com) | ||
pages, linked images, and sounds in a single, encrypted, compressed file. Your creations can include .gif, .bmp, .jpg, and .png graphics; .avi movies; TrueType fonts; and .wav and .mid sound files. A royalty-free setup/viewer program (with a Web browser look-and-feel and multilanguage support) | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Bernardo | Size: 2606 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
30. | G-Lock EasyMail Professional 4.62 (glocksoft.com) | ||
and subject lines via its powerful mail-merge function. EasyMail Pro's distinctive voicemail capability also lets you add audio content to your messages. Supporting a wide range of compression formats, you can even set the recording to start playing when the mail is opened. HTML and Multi part (MIME) | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3324 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
31. | G-Lock EasyMail 4.62 (glocksoft.com) | ||
G-Lock EasyMail was developed to help people run and manage mailing lists, newsletters, announcement lists and customer updates. G-Lock EasyMail is a powerful group mailer which sends your message directly from your outbox to the recipient's mail server (without using any ISP's SMTP server). Program supports multi-threaded delivery, and so works several times | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3281 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
32. | Atomic Newsgroup Explorer 1.40 (atompark.com) | ||
list of e-mail addresses using ANE! The list can be saved to a file, Windows Clipboard or MS Word or MS Excel application. Atomic Newsgroup Extractor does not depend upon any additional software the way many email grabbers depend on third-party libraries. The most important feature of ANE is an availability to work with private newsgroups locked by password and servers | |||
Updated: 2, 2006 | Rating: 42 | Author: Evgeny Medvednicov | Size: 1175 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
33. | TurboNote+ desktop sticky notes v6.0 (turbonote.com) | ||
Web and email addresses. Change note colors and sizes, set alarms, lock them and keep your screen uncluttered by hiding them. Use handy templates for common messages or make up your own style with optional rich text editing, transparency control and images. TurboNotes stay around when you turn your | |||
Updated: 2, 2006 | Rating: 173 | Author: Vicki Hyde | Size: 1616 kb | Shareware Go to category: Business > Other Similar programs | |||
34. | AudioLabel CD/DVD Labeler 3.20 (audiolabel.com) | ||
from the Freedb internet database, CD-Text and CDPlayer.ini file. Our cd label creator can even read and label your MP3 CDs using the ID3 tag and filename. Unlike other cd labeling software, you'll never be locked into a particular brand of label paper. All popular brands are supported and even non-standard labels can be adjusted using the "Label Alignment Wizard" | |||
Updated: 2, 2006 | Rating: 228 | Author: Cripple Creek Software | Size: 3870 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
35. | NotesPlusPlus 5.5 (notesplusplus.com) | ||
any computer sticky note; organize sticky notes in groups, attach files/urls to sticky notes; associate virtual sticky notes with files; modify all sticky note settings; set up default settings for newly created notes; accelerate work using hotkeys; lock sticky notes to prevent unauthorized use; import *.txt and *.rtf files to sticky notes; save sticky notes in | |||
Updated: 9, 2005 | Rating: 0 | Author: NotesPlusPlus. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
36. | Sticky Notes Std 5.0 (morun.net) | ||
in groups, send sticky notes over LAN/Internet or via e-mail, attach files/urls to sticky notes, lock sticky notes to prevent unauthorized use, import .txt and .rtf files to sticky notes, save sticky note in *.txt, *.rtf formats; save sticky note as pictures (*.jpg, *.bmp formats) | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. net | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
37. | MoRUN.net Sticker 5.0 (morun.com) | ||
in groups, send sticky notes over LAN/Internet or via e-mail, attach files/urls to sticky notes, lock sticky notes to prevent unauthorized use, import .txt and .rtf files to sticky notes, save sticky note in *.txt, *.rtf formats; save sticky note as pictures (*.jpg, *.bmp formats) | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
38. | LoanAmortizer Standard Edition 3.1 (loanamortizer.com) | ||
Once any amortization schedule is prepared it can be saved in a file for future reference, comparison or archive. Everything is completed automatically, accurately and is easy and simple to be used and handled. Canadian Mortgage calculations are also implemented in LoanAmortizer Standard Edition, both for mortgage and regular loans. LoanAmortizer Standard Edition is one of the few | |||
Updated: 9, 2005 | Rating: 0 | Author: George Athannassov | Size: 1407 kb | Shareware Go to category: Business > Other Similar programs | |||
39. | RegDesk 4.0 4.0 (easytools.com) | ||
answer to a lock and key? RegDesk 4.0 provides computer security of the highest order, securing opted devices and areas of Desktop and Windows programs. Put together a foolproof desktop security system, which controls access to vital areas of Windows. It provides a facility for hiding of selected drive letters, setting virtual memory, display, network, printer | |||
Updated: 9, 2005 | Rating: 0 | Author: VenkataRangan TNC | Size: 530432 kb | Shareware Go to category: Development > Other Similar programs | |||
40. | 12Ghosts Shredder 7.10 (12ghosts.com) | ||
files, drag and shred, DoD conform, Wipe Disk. Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover files from your disk! Nobody will even find out the previous name or file size. The file can be overwritten several times with random bits so that even the | |||
Updated: 9, 2005 | Rating: 251 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
41. | StrongDisk Pro 2.9 (strongdisk.de) | ||
fly", while the content of the protected disk is stored in common file with arbitrary name. In order to access existing protected disk user must enter password, which is specified during disk creation, and/or insert electronic key or diskette with key file. Without required password and/or a key | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
42. | Picture and Video Encrypt 2.03b (softdd.com) | ||
software will allow you to prevent access by encrypting any media files, and will even disguise the names of the videos or pictures so they cannot be recognized by anyone else. You can easily decrypt and return the files back to normal with the click of a button, and even the file names will return to your original file name. This software is also password | |||
Updated: 9, 2005 | Rating: 42 | Author: SoftDD Software | Size: 576 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
43. | GiPo@FileUtilities 2.9 (gibinsoft.net) | ||
services: GiPo@MoveOnBoot - copying/moving/renaming/deleting files and folders on the next system boot. GiPo@DirMonitor - monitoring changes in the file system. GiPo@Mount - local folders substitution and local/remote drives mounting. GiPo@ReadTest - checking files and folders for read errors. Utilities can be integrated into shell. GiPo@MoveOnBoot | |||
Updated: 9, 2005 | Rating: 0 | Author: Igor Artemov | Size: 867 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
44. | Zip Backup to CD 3.18 (zip-backup.com) | ||
Backup to CD is designed to backup your data files using the standard Zip file format, allowing backup files to be viewed and restored with most zip file utilities. Zip Backup to CD distributes the files to be backedup in several stand alone Zip files of a size fitting a standard CD (CD-R) or a size chosen by the user and writes it to CD/DVD | |||
Updated: 9, 2005 | Rating: 16 | Author: Rene Mogensen | Size: 946 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
45. | PowerControl 1.0 (onlimemedia.com) | ||
will allow you to make Shutdown, Reboot, Hibrnete, Logoff, Standby, Lock the local or removed computer (or several computers). As you may may awake the removed computer with the help of function Wake-On-LAN. You can specify a delay, which can either be an absolute time (eg. 8pm) or a relative time (eg. "20 minutes from now"), during which a message you specify can be displayed | |||
Updated: 9, 2005 | Rating: 20 | Author: Pavel Abraksas | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
46. | SecurDesk! 5.32 (cursorarts.com) | ||
a complete replacement for the Windows default Explorer.exe desktop/file manager shell. SecurDesk! Features Include: a desktop interface which can be custom designed; Logging of system usage; Enhanced file management with optional restrictions; Virtual desktops; Data protection with | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
47. | xReminder Pro 4.2 (xreminder.com) | ||
and Swatch Internet Time. It also can synchronize your computer's clock with Atomic Time Servers. The program also has some useful features like stopwatches and countdown timers. Other options include: smart import-export of data in native and commonly used file formats, pop-up calendar that easy to access from clock or from the system tray, print preview, and more! xReminder | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Kulemin | Size: 1780 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
48. | GiPo@FileUtilities 2.9 (gibinsoft.net) | ||
services: GiPo@MoveOnBoot - copying/moving/renaming/deleting files and folders on the next system boot. GiPo@DirMonitor - monitoring changes in the file system. GiPo@Mount - local folders substitution and local/remote drives mounting. GiPo@ReadTest - checking files and folders for read errors. Utilities can be integrated into shell. GiPo@MoveOnBoot | |||
Updated: 9, 2005 | Rating: 0 | Author: Igor Artemov | Size: 908 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
49. | LockEXE 2.0 (mazepath.com) | ||
permission! You can either browse for the program you want to lock, or simply drag it to the select box! Nothing could be easier! Set the password and click Lock. The program will no longer run without the password, there is no way around it! So Easy to LockEXE can password protect your programs. Your email, word processor, browser or ANY other programs you choose | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 145 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
50. | PalmTree 3.5 (clickok.co.uk) | ||
protect, lock and hide folders or directories and their subdirectories and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No | |||
Updated: 9, 2005 | Rating: 42 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
51. | AllnSync 3.5.2 (rlegsoftware.com) | ||
is a very fast and easy to use Directory / File synchronizer. It's main function is to synchronize critical files in a selected directory and it's sub-directories on two different drives which can be on the same computer, or different computers over a network. It is ideal for keeping files synchronized between a desktop and laptop or between | |||
Updated: 9, 2005 | Rating: 0 | Author: Ray Giovagnoli | Size: 1554 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
52. | Virtual Flower 1.2 (homepage.ntlworld.com) | ||
of rustling leaves, or visit an island with exotic flowers. The files are extremely tiny, most are four or five KB, suitable for inclusion in larger 3D scenes. Uses the popular VRML format - get the Cortona plug in to view them, or embed in web page with a java applet such a Blaxxun. Or save as flash animated jpegs, flash movies, or animation frames in many formats such as | |||
Updated: 9, 2005 | Rating: 0 | Author: Robert Walker | Size: 2618 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
53. | Secure Image Pro 4.0 (artistscope.com) | ||
the images on your web site and CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
54. | ShareGuard V1 1 (padfile.zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
55. | Time & Chaos 5.6.5 (isbister.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 9, 2005 | Rating: 0 | Author: Bill Tiede | Size: 3756 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
56. | WinEbook Compiler 2.3 (superwin.com) | ||
hyperlinks. When finished, it packs the book in a convienient .exe file that is encrypted and may be locked with a password. All the reader has to do is double click on the file and your book is opened in an easy to use viewer that can even read the book. WinEbooks may have a cover, table of contents, about section, book marks, word search, reply form, and index | |||
Updated: 9, 2005 | Rating: 0 | Author: Ray Geide | Size: 2477 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
57. | virtualCrypt 3.02 (netindiasolutions.com) | ||
Moreover these virtual drives are created in innocent sound files using steganographic technique. virtualCrypt is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
58. | Wincph encryption software 4.7 (keepsecret.net) | ||
file and folder encryption software.It protect the privacy of your sensitive files and e-mail messages by encrypting them with the highest level of security.Includes ability to store several files and folders in one encrypted archive. Ability to make self-decrypted Archive. Drag and | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuxue Tu | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
59. | WinDefender 2.1.9.1 (rtsecurity.com) | ||
that you can use to secure your confidential data and protect your files and folders on computers running Windows 95/98/ME. It provides real-time protection and security service with strong encryption. Once you encrypt your private folders then can use them just all others, non-encrypted ones | |||
Updated: 9, 2005 | Rating: 0 | Author: RTSECURITY . | Size: 1351 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
60. | Window Security Toolkit 5.0 (dmisoftware.com) | ||
Internet Explorer and more. Also Includes SHA1 160 bit and MD5 File Encryption plus Ultra Desktop Lock. An excellent program if you don't want others to be messing up with your system. Get over 51 Advanced Security Settings for Windows with this power tool ! Window Security Toolkit helps you make windows totally secured by Providing access restrictions on the control panel | |||
Updated: 9, 2005 | Rating: 0 | Author: Dr.Salman Zafar | Size: 1710 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
61. | WinGuardian 3.0 (webroot.com) | ||
viewing inappropriate web pages. WinGuardian also has the option to "lock down" the Windows 98/Me environment so that users can only run authorized programs. Users will not be able to modify system settings (like the Windows background wallpaper) or run unauthorized software. This is useful in helping to prevent viruses and intentional or unintentional operating system changes. An | |||
Updated: 9, 2005 | Rating: 71 | Author: Steve Thomas | Size: 1561 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
62. | xReminder Pro 4.2 (dualitysoft.com) | ||
and Swatch Internet Time. It also can synchronize your computer's clock with Atomic Time Servers. The program also has some useful features like stopwatches and countdown timers. Other options include: smart import-export of data in native and commonly used file formats, pop-up calendar that easy to access from clock or from the system tray, print preview, and more! xReminder | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Kulemin | Size: 1780 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
63. | SpyCapture 1.4.5 (tsm-soft.com) | ||
easily detected or terminate (even by pressing Ctrl-Alt-Delete), it's invisible! Only you will know how to terminate it, if you want. SpyCapture is an excellent PC Surveillance Software. Features: 1. High Invisibility, Password Protected, Encryption enabled and File Manager. 2. Capture all the keystrokes in all of the Windows environment, as long as the user use the | |||
Updated: 9, 2005 | Rating: 0 | Author: Tan Sun Min | Size: 428 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
64. | StartPro 2.0 (daesoft.com) | ||
remove programs located in the Registry, Startup folder, and win.ini file that load during start-up. Features include SmartBin, which saves deleted items for future restoration, and Boot Options, which allows the user to modify settings located in the msdos.sys file. StartPro also includes | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Price | Size: 440 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
65. | System Locker 2.40 (egtsoft.com) | ||
Locker is a handy utility that allows you to protect your personal computer from unauthorized access. You can use System Locker to restrict access to your PC. It's attractive, secure, and very easy to use. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop on system lock and provides an | |||
Updated: 9, 2005 | Rating: 0 | Author: Rick Skinner | Size: 863 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
66. | System Sentry 2.2.05 (easydesksoftware.com) | ||
added, incorrect versions, and date changes of your system files and replaces them for you. This helps avoid the unnecessary and frustrating task of reinstalling Windows or specific problem programs. System Sentry offers the following features: - Cyclic Redundancy Check, detects files that are corrupt or possibly infected by a virus. - A Program Aligner that makes | |||
Updated: 9, 2005 | Rating: 0 | Author: Guy Young | Size: 3649 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
67. | TK8 Safe 2.5 (tk8.com) | ||
passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not only stores your information, but helps you to use it. A fast and easy-to-use interface allows you to find information quickly. You | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
68. | User Control 2005 (salfeld.com) | ||
you to block any undesired window title or any application / EXE-file. On the Internet you can define exactly which contents shall be allowed and which not. You can also explicitly allow only authorized applications and/or Internet addresses. Block the varied Windows systems areas (such as system control, setting on start menu, downloads from IE, Windows settings, etc.) with just a | |||
Updated: 9, 2005 | Rating: 34 | Author: Dierk Salfeld | Size: 4027 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
69. | RegRepair 2000 4.0.04 (easydesksoftware.com) | ||
that repair IOS errors conflicts and more. Now fixes VXDs. This file contains updates for Windows 98 SE. For all versions of Windows 95/98, English or foreign language machines. IOS means Initiating Operating Sytem and ERRORS means the stuff that messes up your Operating System, you know the stuff that makes you crash and get locked out of Windows. If you never had one I'll | |||
Updated: 9, 2005 | Rating: 0 | Author: Easy Desk Software | Size: 2649 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
70. | SafeBox Industry 1.0 (aidsoft.com) | ||
Industry is a new and powerfull file encryption solution. This application can also provide a strong protection, quite good compression, self-decrypting archives, good presentation (use skins form, splash screen), which may be used for secure distribution package.Features : Create Self-Decrypting (Auto Executable), Interface Customizable for Self Extraction, Add Signature inside | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
71. | Secura Backup Professional 2.13 (cmfperception.com) | ||
Secura Backup isn't running. The Shadow Copy feature will backup files that are in use or locked by other programs including Outlook PST files, Exchange files and database files like MySQL/MSSQL. The incremental backups feature will prevent files that haven't | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
72. | SecurDesk! 5.32 (cursorarts.net) | ||
a complete replacement for the Windows default Explorer.exe desktop/file manager shell. SecurDesk! Features Include: a desktop interface which can be custom designed; Logging of system usage; Enhanced file management with optional restrictions; Virtual desktops; Data protection with | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
73. | ShutDownOne 3.02 (dimaware.com) | ||
can choose from a full shutdown, reboot, log off, power off and also lock the work station, activate hibernate. Any operation can be executed as an emergency (force) shut down. In addition, you can perform scheduled shutdowns, no-activity action and more. ShutDownOne also allows you to perform remote shutdowns for machines on the network and supports commandline operation, as well as | |||
Updated: 9, 2005 | Rating: 2097 | Author: D i m a W a r e | Size: 263 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
74. | PalmTree 3.3 (clickok.co.uk) | ||
protect, lock and hide folders or directories and their subdirectories and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No | |||
Updated: 9, 2005 | Rating: 0 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
75. | Password Protected Lock 2.91 (softfolder.com) | ||
Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time and provides an informative message that you can edit as you like | |||
Updated: 9, 2005 | Rating: 0 | Author: SoftFolder Inc | Size: 724 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
76. | Password Safe and Sound 1.2.0 (northcardinal.com) | ||
all your passwords and related information securely, in an encrypted file that only you can view using your defined password. It also allows you to launch websites, programs, or files associated with your passwords with a simple click of the mouse. Features: • Easy to use • Eliminates the | |||
Updated: 9, 2005 | Rating: 0 | Author: North Cardinal Software | Size: 4819 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
77. | PowerControl 1.0 (onlimemedia.com) | ||
will allow you to make Shutdown, Reboot, Hibrnete, Logoff, Standby, Lock the local or removed computer (or several computers). As you may may awake the removed computer with the help of function Wake-On-LAN. You can specify a delay, which can either be an absolute time (eg. 8pm) or a relative time (eg. "20 minutes from now"), during which a message you specify can be displayed | |||
Updated: 9, 2005 | Rating: 16 | Author: Pavel Abraksas | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
78. | Random Password Generator-PRO 12.1 (hirtlesoftware.com) | ||
created you may then save them to a text, MS-Access, HTML and/or CSV file. CSV may be used with spreadsheet applications such as MS-Excel. A built-in MS-Access editor is provided. Therefore, MS-Access itself is not needed to create, view or edit these files. A dictionary check option will check | |||
Updated: 9, 2005 | Rating: 79 | Author: Tim Hirtle | Size: 7568 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
79. | AllnSync 3.5.2 (rlegsoftware.com) | ||
is a very fast and easy to use Directory / File synchronizer. It's main function is to synchronize critical files in a selected directory and it's sub-directories on two different drives which can be on the same computer, or different computers over a network. It is ideal for keeping files synchronized between a desktop and laptop or between | |||
Updated: 9, 2005 | Rating: 0 | Author: Ray Giovagnoli | Size: 1554 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
80. | Child Control 2005 7.153 (salfeld.com) | ||
The most optimal parental control for all Windows-PCs (incl. XP). Set time limits for the PC and/or the Internet and block/filter unwanted Internet contents. Limit access to internal Windows components and personal folders. A protocol informs you at any time as to what happened on your computer and when | |||
Updated: 9, 2005 | Rating: 16 | Author: Dierk Salfeld | Size: 3703 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
81. | XP System Sentry 2.2.05 (easydesksoftware.com) | ||
replaced, added, incorrect versions, and dates of your system files and replaces them for you. This helps avoid the often unnecessary and frustrating task of reinstalling Windows or specific problem programs. System Sentry offers the following features: - Cyclic Redundancy Check, detects files that are corrupt or possibly infected by a virus. - A utility for | |||
Updated: 9, 2005 | Rating: 39 | Author: Guy Young | Size: 3722 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
82. | GiPo@FileUtilities 2.7 (gibinsoft.net) | ||
services: GiPo@MoveOnBoot - copying/moving/renaming/deleting files and folders on the next system boot. GiPo@DirMonitor - monitoring changes in the file system. GiPo@Mount - local folders substitution and local/remote drives mounting. GiPo@ReadTest - checking files and folders for read errors. Utilities can be integrated into shell. GiPo@MoveOnBoot | |||
Updated: 9, 2005 | Rating: 16 | Author: Igor Artemov | Size: 867 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
83. | LockEXE 2.0 (mazepath.com) | ||
permission! You can either browse for the program you want to lock, or simply drag it to the select box! Nothing could be easier! Set the password and click Lock. The program will no longer run without the password, there is no way around it! So Easy to LockEXE can password protect your programs. Your email, word processor, browser or ANY other programs you choose | |||
Updated: 9, 2005 | Rating: 16 | Author: John Hooper | Size: 145 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
84. | Lockout Desktop Security 1.1.652 (dynamicdesigns.co.uk) | ||
Desktop Security software brings you many ways to secure and lock your desktop. You can define different sets of permissions and restrictions for specific users and groups, control access to certain applications, restrict when your PC can be used, restrict CD usage, log Internet usage, and log attempts at restricted activities. Note: This is a 30-day trial. After 30 | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Wilkinson | Size: 2857 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
85. | LockTheFile 1.8 (okosoft.com) | ||
is a tool that encrypts files with strong encryption alghorytm. You may protect any information - text files, pictures, video and audio files from other eyes and ears, as many files as you need, without any limites. The core functions of this program are: Strong encryption alghorytm; Handy user interface; Ability to send locked files | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Maltsev | Size: 1808 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
86. | EXEsafe 2 (members.aol.com) | ||
allows you to put a lock on almost any program file, such as a game, or your office software. It uses the highly secure blowfish encryption algorithm for extra security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When the protected program is run, the EXEsafe lock will | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
87. | FileLocker 2.1 (lockyourfiles.com) | ||
allows you to hide and encrypt your private or sensitive files using 128bit encryption, while providing an easy to use interface. Locked files can be opened quickly and easily within FileLocker using your system default application for the file type you are opening. Enhanced search and import features allow greater power and flexibility. FileLocker allows | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Rivers | Size: 17500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
88. | FileSpy Pro 2.0 (ic.net) | ||
Pro is a powerful file monitoring utility for Novell file servers. Discover how many users opened a file, the length of time a user had a file open, how many times a user opened a file, the average length of time a user had a file open, etc. With FileSpy Pro you can also send messages to users, clear user's connections, unlock | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2322 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
89. | Cryptgine Archiver 1.05 (infolocks.com) | ||
distributing sensitive files over the internet or storing sensitive files that are used infrequently, protect them with unbreakable and customizable security. The first in the Cryptgine application series, the Cryptgine Archiver creates file archives that are both compressed and/or encrypted. The encryption method used to secure the data can be the included 256 bit | |||
Updated: 9, 2005 | Rating: 0 | Author: Info Locks | Size: 94264 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
90. | Amiasoft Password 3.3.6.22 (amiasoft.com) | ||
registration, Configurable timeout function for unattended program lock-up, Ability to copy username and password to clipboard without entering that particular record, Ability to clear clipboard from within program and upon program exit, Full program help files. Download your trial copy and discover how it can make your life easier today! A tool to help ease your web-based | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Kidd | Size: 713 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
91. | Cipherlok 2.1 (softlok.com) | ||
product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be automatically encrypted at shutdown and decrypted at startup ensuring security when, for example | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
92. | 1Lock 1.4 (atma-software.com) | ||
files for burning on a CD, or for download, or add a serial number to your own setup program. Strong encryption. 1Lock operates in 3 modes: Encrypted CD, single self-extracting setup, and as a front-end for your own setup program. Language support for languages other than English. Features: -AES (Rijndael) 256 bit encryption -Customized graphics and text for setup program | |||
Updated: 9, 2005 | Rating: 360 | Author: Mark Snegg | Size: 860 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
93. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents anybody to run the program and change settings and uninstall the program. The "Import/Export" function helps you set up the same settings on | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
94. | Access Denied 3.40 (johnru.com) | ||
requests username and password or simple password upon boot-up and locks desktop by one mouse click. It can't be bypassed on Windows 95/98/ME. All unwanted people are kept out to your PC. Very flexible use: multi-user support(up to 450 users), password encryption, integration with your favorite | |||
Updated: 9, 2005 | Rating: 58 | Author: Ivan Mayrakov | Size: 536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
95. | Accessor 1.7 (nesoft.org) | ||
access to main Windows functions, folders and documents. What's new in version 1.7: 1. New Items are added into Main Menu, such as: - Find Files and Folders, - Empty Recycle Bin, - Clear Documents History, - Formatting Floppy Disk. 2. Now original file icons are displayed while viewing File System (FDD, HDD, CD and Network drives). 3. Settings window | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleksey Skopin | Size: 554 kb | Shareware Go to category: Desktop > Other Similar programs | |||
96. | Advanced Hide Folders 4.6 (hide-folders.biz) | ||
Hide Folders enables you to completely hide folders and files on your computer. The hidden files cannot be accessed unless the folders are unlocked with a password from within the program. You can simple drag and drop folders from Windows or add files by mask (e.g hide all .jpg files). In addition, as an added security measure, you can also lock the | |||
Updated: 9, 2005 | Rating: 81 | Author: Otto Schulz | Size: 258 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
97. | Advanced PDF Password Recovery Pro 2.21 (elcomsoft.com) | ||
protected Adobe Acrobat PDF files, which have "user" and/or "owner" passwords set, preventing the file from opening or editing, printing, selecting text and graphics etc. If only "owner" password is set, password recovery is not needed at all, but the file is being decrypted instantly (so all restrictions are being removed). "User" password can be recovered using | |||
Updated: 9, 2005 | Rating: 1485 | Author: Vladimir Katalov | Size: 1551 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
98. | Akala EXE Lock 3.20 (zero2000software.com) | ||
to your computer then I'd bet that there are certain programs and files you don't want others accessing. There are a multitude of options on how to go about doing this. There are encryption programs, programs that restrict access to portions of your computer, programs that make your files invisible. You get the general idea. A novel approach to the problem lies in Akala EXE | |||
Updated: 9, 2005 | Rating: 158 | Author: Zero Lee | Size: 1152 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
99. | TZ Privacy Guard 3.1.0.0 (trackzapper.com) | ||
History, favorite's folders and private information: passwords, credit card numbers, social security number etc. ; can expose a lot of your private information that you would like to protect. Also, Personal interests sites, banking information, stocks you monitor on line bidding, and aucations you are tracking, your surfing habits both on and off the web. this information can be | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 4266 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
100. | Without A Trace Surf Guard 5.91 (tekeffect.com) | ||
today's society it is becoming a daily routine that employee's are being fired for surfing the internet, professors are being arrested after their hard drives are examined and/or husbands and wife's become bitter or divorced after the browser history is revealed. Our Without A Trace Surf | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 4027 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Lock file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|