|
||||||
|
||
|
Home > Lock file software |
Related keywords: file, lock, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
1. | .IRC 1.1 (joher.com) | ||
SOCKS4-5/HTTP Proxy, Notify/Ignore/Tree/Transfers/Browser/Files/Raw/Events/URL windows, Full Layout/Color/Font Customization, Opacity/Transparency support, Auto OnStart/Connect/Reconnect/OnConnect/Join/Rejoin/OnJoin/Away, Logging, Filtering, Sounds, Alarms, Locking, Aliases, Timers, Variables, Readable/Editable Config/Menu Files. Full Featured Windows .NET IRC | |||
Updated: 9, 2005 | Rating: 0 | Author: Jean-Hugues ROYER | Size: 644 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
2. | 12Ghosts Shredder 7.10 (12ghosts.com) | ||
files, drag and shred, DoD conform, Wipe Disk. Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover files from your disk! Nobody will even find out the previous name or file size. The file can be overwritten several times with random bits so that even the | |||
Updated: 9, 2005 | Rating: 251 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
3. | 1Lock 1.4 (atma-software.com) | ||
files for burning on a CD, or for download, or add a serial number to your own setup program. Strong encryption. 1Lock operates in 3 modes: Encrypted CD, single self-extracting setup, and as a front-end for your own setup program. Language support for languages other than English. Features: -AES (Rijndael) 256 bit encryption -Customized graphics and text for setup program | |||
Updated: 9, 2005 | Rating: 360 | Author: Mark Snegg | Size: 860 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
4. | 1st Evidence Remover 2.14 (getfreefile.com) | ||
you use Windows, open folders, search for files and see pictures, work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use and the | |||
Updated: 2, 2006 | Rating: 190 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
5. | 1st Evidence Remover 2.14 (softheap.com) | ||
you use Windows, open folders, search for files and see pictures, work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use and the | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
6. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents anybody to run the program and change settings and uninstall the program. The 'Import/Export' function helps you set up the same settings on | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
7. | 1st Screen Lock 6.14 (softheap.com) | ||
Screen Lock is a password-protected desktop security utility that lets you lock your desktop with a password on boot, or at the time you are leaving your PC. You can use the built-in spy utility that works in background and enables you to spy on your PC users by fixing all user moves in a log | |||
Updated: 2, 2006 | Rating: 479 | Author: Ixis Ltd | Size: 1106 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
8. | 1st Security Agent Pro 6.14 (softheap.com) | ||
from editing your Favorites, disable downloading and installing files from the Internet, disable individual tabs in the Internet Options dialog, as well as specific settings from each tab. 1st Security Agent Pro allows you to import and export PC security settings, and offers a flexible and complete password protection. The program is very easy-to-use, excellent online help is | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
9. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents anybody to run the program and change settings and uninstall the program. The "Import/Export" function helps you set up the same settings on | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
10. | Access Administrator 4.14 (softheap.com) | ||
your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
11. | Access Administrator 4.14 (getfreefile.com) | ||
your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
12. | Access Administrator Pro 4.14 (getfreefile.com) | ||
Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives you a lot of abilities to allocate access to your files and folders | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
13. | Access Administrator Pro 4.14 (softheap.com) | ||
Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives you a lot of abilities to allocate access to your files and folders | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
14. | Access Denied 3.40 (johnru.com) | ||
requests username and password or simple password upon boot-up and locks desktop by one mouse click. It can't be bypassed on Windows 95/98/ME. All unwanted people are kept out to your PC. Very flexible use: multi-user support(up to 450 users), password encryption, integration with your favorite | |||
Updated: 9, 2005 | Rating: 58 | Author: Ivan Mayrakov | Size: 536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
15. | Accessor 1.7 (nesoft.org) | ||
access to main Windows functions, folders and documents. What's new in version 1.7: 1. New Items are added into Main Menu, such as: - Find Files and Folders, - Empty Recycle Bin, - Clear Documents History, - Formatting Floppy Disk. 2. Now original file icons are displayed while viewing File System (FDD, HDD, CD and Network drives). 3. Settings window | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleksey Skopin | Size: 554 kb | Shareware Go to category: Desktop > Other Similar programs | |||
16. | ACProtect standard 1.20 (ultraprotect.com) | ||
is an application that allows you to protect Windows executable files(PE files) against piracy. Using public keys encryption algorithms (RSA) to create and verify the registration keys and unlock some RSA key locked code. It has an Embedded Protector against file dumping and unpackers. It also has many anti-debug tricks with specialized API system. Mutual | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
17. | Active Backup Expert 1.92 (backuptool.com) | ||
easily mastered tool maintains backups of files in zip or cab format on hard and removable disks (CD, Zip drives etc.), in a LAN or WAN. A Wizard guides you through the steps of the backup-set creation: supplying the paths and filters for the included and excluded files, specifying the storage | |||
Updated: 2, 2006 | Rating: 16 | Author: Andrey Panichkin | Size: 1531 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
18. | Active Backup Expert Pro 1.92 (backuptool.com) | ||
creates automated zip- or cab-format backups of local and network files on hard disks, CDs and other removable devices, local network or FTP site. A Wizard guides you through the steps of the backup-set creation: selecting the folders and filters for included and excluded files, specifying the | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Panichkin | Size: 2582 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
19. | Active System Locker 3.0 (sowsoft.com) | ||
Locker is a handy utility that allows you to protect your personal computer from unauthorized access. You can use System Locker to restrict access to your PC. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop on system lock and provides an informative message | |||
Updated: 9, 2005 | Rating: 138 | Author: Vladimir Sinitsyn | Size: 611 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
20. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at your monitor and he has it all! Introducing Active Screen Lock, the unique security application by DMVSoft, allowing you to do whatever you want to do when you are away from the computer without having to worry a second. Active Screen Lock operates as | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
21. | AddUp 2 (orefa.com) | ||
adjustable button size, selectable font, top-level mode, Num-Lock, snap to screen position, switchable decimal mark. NUMERIC FORMATS: scientific (1.23e-45), currency (12,345.00), fractional (1 2/3) and more, each format is customizable. EDITABLE WORK AREA: better than a regular tape calculator. Enter full expressions, change the numbers, repeat any calculation. Annotate your | |||
Updated: 5, 2005 | Rating: 227 | Author: Réjean Lefebvre | Size: 373 kb | Shareware Similar programs | |||
22. | Advanced Desktop Shield 1.63 (softstack.com) | ||
and desktop layouts of your users. Desktop layouts are saved to files, which include all files and folders located on the desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout or desktop layouts of your users, every time you or your users reboot your PC, the program will return everything on the desktop back | |||
Updated: 2, 2006 | Rating: 99 | Author: IM Soft | Size: 833 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
23. | Advanced Email Verifier 5.15 (glocksoft.com) | ||
Text (.CSV), HTML, Word, Lotus 1-2-3, QuattroPro, XML, MS Access files, and DBISAM tables (.dat files). You can also connect to the database on your disk and verify the email addresses directly from the database. AEV helps you maintain your mailing list clean and decrease the Internet traffic keeping you from sending undeliverable messages that cause a ping-pong of useless | |||
Updated: 2, 2006 | Rating: 42 | Author: Alex Markov | Size: 4148 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
24. | Advanced Hide Folders 4.6 (hide-folders.biz) | ||
Hide Folders enables you to completely hide folders and files on your computer. The hidden files cannot be accessed unless the folders are unlocked with a password from within the program. You can simple drag and drop folders from Windows or add files by mask (e.g hide all .jpg files). In addition, as an added security measure, you can also lock the | |||
Updated: 9, 2005 | Rating: 81 | Author: Otto Schulz | Size: 258 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
25. | Advanced PDF Password Recovery Pro 2.21 (elcomsoft.com) | ||
protected Adobe Acrobat PDF files, which have "user" and/or "owner" passwords set, preventing the file from opening or editing, printing, selecting text and graphics etc. If only "owner" password is set, password recovery is not needed at all, but the file is being decrypted instantly (so all restrictions are being removed). "User" password can be recovered using | |||
Updated: 9, 2005 | Rating: 1485 | Author: Vladimir Katalov | Size: 1551 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
26. | Akala EXE Lock 3.20 (zero2000software.com) | ||
to your computer then I'd bet that there are certain programs and files you don't want others accessing. There are a multitude of options on how to go about doing this. There are encryption programs, programs that restrict access to portions of your computer, programs that make your files invisible. You get the general idea. A novel approach to the problem lies in Akala EXE | |||
Updated: 9, 2005 | Rating: 158 | Author: Zero Lee | Size: 1152 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
27. | All Organizer 2.0 (allthesoft.com) | ||
easily and securely. With our leading concurrency record locking mechanism.DreamyStar Organizer can also be used to share workgroup or small business member's personal information through Local Area Network(LAN) environment. An All-In-One powerful information organizer specialize in Personal and workgroup information manage. It can manage all your Personal information | |||
Updated: 9, 2005 | Rating: 36 | Author: Jordan Smith | Size: 2986 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
28. | AllDay 7.0.1 (calcom.de) | ||
AllDay v7.0 is a calendar for year overviews. Gregorian, Julian, Jewish and Islamic calendar systems are supported. The application computes holidays, times of sunrise, sunset, moonrise, moonset and moon phase as well as number of day in year, number of week in year, julian day number, remaining days in year | |||
Updated: 3, 2005 | Rating: 16 | Author: Ulrich Hilger | Size: 1507 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
29. | AllnSync 3.5.2 (rlegsoftware.com) | ||
is a very fast and easy to use Directory / File synchronizer. It's main function is to synchronize critical files in a selected directory and it's sub-directories on two different drives which can be on the same computer, or different computers over a network. It is ideal for keeping files synchronized between a desktop and laptop or between | |||
Updated: 9, 2005 | Rating: 0 | Author: Ray Giovagnoli | Size: 1554 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
30. | AllnSync 3.5.2 (rlegsoftware.com) | ||
is a very fast and easy to use Directory / File synchronizer. It's main function is to synchronize critical files in a selected directory and it's sub-directories on two different drives which can be on the same computer, or different computers over a network. It is ideal for keeping files synchronized between a desktop and laptop or between | |||
Updated: 9, 2005 | Rating: 0 | Author: Ray Giovagnoli | Size: 1554 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Lock file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|