|
||||||
|
||
|
Home > Lock file software |
Related keywords: file, lock, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
121. | Random Password Generator-PRO 12.1 (hirtlesoftware.com) | ||
created you may then save them to a text, MS-Access, HTML and/or CSV file. CSV may be used with spreadsheet applications such as MS-Excel. A built-in MS-Access editor is provided. Therefore, MS-Access itself is not needed to create, view or edit these files. A dictionary check option will check | |||
Updated: 9, 2005 | Rating: 79 | Author: Tim Hirtle | Size: 7568 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
122. | Registry First Aid 4.3.1 (rosecitysoftware.com) | ||
4.3 - It's faster, finds more problems than others and is even easier to use! People's Choice Winner 2003 Shareware Industry Conference! Tired of Windows crashing? Sick of having software lock up on you or taking forever to load? The problem could be all of those incorrect registry entries caused by software installations and un-installations that went awry! Not all | |||
Updated: 2, 2006 | Rating: 16 | Author: Konstantin Golovatsky | Size: 1739 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
123. | REMOTE DRiVE 1.1 (matcode.com) | ||
can see the detailed information about all users accounts, unlock locked users and alter their passwords. The HOST and CLIENT machines must be connected with a standard parallel link cable or null-modem serial cable. Easy administrative access any computer (FAT, FAT32 and NTFS) over the parallel or the serial cable connection. Run included User Manager, CHKDSK, CIA Unerase or any | |||
Updated: 9, 2005 | Rating: 16 | Author: Vitaly Evseenko | Size: 474 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
124. | Remote Performance Observer 3.0 (apexoft.com) | ||
IP, TCP, UDP, ICMP, SMTP, etc.), OS critical parameters (Paging File, Running Processes, etc.), running processes information (Processor Usage, Memory Consumption, Threads, Priority, etc.). Setting remote expert diagnosis on processor, memory, hard drive, network components. Maintaining alarms with logging to a file, playing sounds, sending e-mails, sending messages to | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexei Polkovnikov | Size: 2660 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
125. | Remote Performance Observer 3.0 (apexoft.com) | ||
IP, TCP, UDP, ICMP, SMTP, etc.), OS critical parameters (Paging File, Running Processes, etc.), running processes information (Processor Usage, Memory Consumption, Threads, Priority, etc.). Setting remote expert diagnosis on processor, memory, hard drive, network components. Maintaining alarms with logging to a file, playing sounds, sending e-mails, sending messages to | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexei Polkovnikov | Size: 2660 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
126. | SafeBox Industry 1.0 (aidsoft.com) | ||
Industry is a new and powerfull file encryption solution. This application can also provide a strong protection, quite good compression, self-decrypting archives, good presentation (use skins form, splash screen), which may be used for secure distribution package.Features : Create Self-Decrypting (Auto Executable), Interface Customizable for Self Extraction, Add Signature inside | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
127. | SAV-MailChecker Pro 1.1 (sav-soft.com) | ||
following ways: -Show a message -Play a sound -Blink with Scroll Lock led on your keyboard -Run a program -Show the number of messages on TaskTray and change it’s icon If you receive large amounts of e-mail messages and you need to keep track on new messages on a regular basis without launching (or running on background) a massive mail-client software – then | |||
Updated: 3, 2005 | Rating: 0 | Author: Aleksey Shevchenko | Size: 321 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
128. | Secura Backup Professional 2.13 (cmfperception.com) | ||
Secura Backup isn't running. The Shadow Copy feature will backup files that are in use or locked by other programs including Outlook PST files, Exchange files and database files like MySQL/MSSQL. The incremental backups feature will prevent files that haven't | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
129. | SecurDesk! 5.32 (cursorarts.net) | ||
a complete replacement for the Windows default Explorer.exe desktop/file manager shell. SecurDesk! Features Include: a desktop interface which can be custom designed; Logging of system usage; Enhanced file management with optional restrictions; Virtual desktops; Data protection with | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
130. | SecurDesk! 5.32 (cursorarts.com) | ||
a complete replacement for the Windows default Explorer.exe desktop/file manager shell. SecurDesk! Features Include: a desktop interface which can be custom designed; Logging of system usage; Enhanced file management with optional restrictions; Virtual desktops; Data protection with | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
131. | Secure Image Express 4.0 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 2, 2006 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
132. | Secure Image Express 4.0 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 2, 2006 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
133. | Secure Image Pro 4.0 (artistscope.com) | ||
the images on your web site and CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
134. | Secure Image Pro 4.0 (artistscope.com) | ||
the images on your web site and CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
135. | Security Folder 2.0 (everstrike.com) | ||
ago, our puny hard drives contained hardly a couple of thousands of files. Today, our massive hard drives contain dozens and even hundreds of thousands of various files and folders and, which is most important, the overall information value increased dramatically. >From private messages to business-critical data – every singe bit of valuable information we may have on our | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
136. | Security Folder 2.0 (security-folder.com) | ||
ago, our puny hard drives contained hardly a couple of thousands of files. Today, our massive hard drives contain dozens and even hundreds of thousands of various files and folders and, which is most important, the overall information value increased dramatically. From private messages to business-critical data – every singe bit of valuable information we may have on our | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 515 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
137. | Server Nanny Network Monitor 4.0.0 (ServerNanny.com) | ||
Reduce downtime and be the first to know when a server or network device fails by using Server Nanny network and server monitoring software. The last time you had a network or server failure how long was it before the problem was discovered? Minutes? Hours? Maybe even days? Use Server Nanny to recover The last time you had a network or server failure how long was it before the problem was discovered? Don't wait for employees or customers to report the problem | |||
Updated: 2, 2006 | Rating: 0 | Author: Xenos Software LLC | Size: 5575 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
138. | ShareGuard Copy Protection 3.6 (zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 11474 kb | Shareware Go to category: Development > Other Similar programs | |||
139. | ShareGuard V1 1 (zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
140. | ShareGuard V1 1 (padfile.zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Lock file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|