|
||||||
|
||
|
Home > Lock file software |
Related keywords: file, lock, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
1. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
impossible to use email without receiving spam in large amounts. G-Lock SpamCombat is your powerful solution for clearing your Inbox from spam, virus, and junk emails. G-Lock SpamCombat is email filtering software that lets you eliminate all unwanted messages at the server level without | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
2. | PowrClik Suite 2.7.4.104 (genntt.webs.com.ua) | ||
computer. Additional functions: run screen saver, turn off monitor, lock computer, hang up modem connection, run Task Scheduler, run file, play sound on alarm, measure performance. Preventive functions: disable screen saver, prevent suspend mode activation, prevent Windows shut down. And much | |||
Updated: 3, 2006 | Rating: 1651 | Author: Genntt Productions | Size: 315 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
3. | Super Utilities 6.25 (superlogix.net) | ||
in protecting and securing sensitive information. You can hide or lock folders, clean your system tracks, password-protect applications that hold sensitive data, quickly and securely delete files, and hide IE Favorites and Start menu items from view. 3.System Maintenance will help automate computer maintenance jobs to keep it smooth, fast, and error free. It includes Task | |||
Updated: 3, 2006 | Rating: 16 | Author: li jiangnan | Size: 3328 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
4. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | EXECryptor 2.3.7 (softcomplete.com) | ||
(12-16 characters). A serial number can be time-limited, may be locked to Hardware ID, can contain encrypted registration information such as license type, allowed features and other user defined information. It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely prevents | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
6. | SQLExecMS 2.6 (laplas-soft.com) | ||
server performance counters;Check utilization of proc cache;Watch locks; Review space used by DB files, tables and indexes; Manage DB file and filegroups;Turn on and off trace flags;Manage scheduled jobs; Change SQL server and database options;Backup and restore databases; Analyze | |||
Updated: 2, 2006 | Rating: 433 | Author: Oleg Dantchenko | Size: 4928 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
7. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
8. | Sleep Timer Pro 4.8.2 (what-the.net) | ||
Sleep Timer Pro is an all-in-one System Utility to automate the use of your system. With Sleep Timer you may shutdown, reboot, or set an alarm all with a few clicks of the mouse. Set your time in intervals like 15,30,45,60,90 minutes. Version 3.x+ now includes Clock Syncronization to GMT/Navy Clock in minute | |||
Updated: 2, 2006 | Rating: 61 | Size: 4813 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
9. | FineBrowser 3.2.25 (finebrowser.com) | ||
You can change the order of the window tabs by using drag&drop, lock the important windows from accidental close and rename them with ease. The powerful bookmarks manager offers advanced management features, personal page ratings, comments, grouped favorites and more. FineBrowser is designed to work with image archive, wich is organized by the program using different sources | |||
Updated: 2, 2006 | Rating: 76 | Author: Alex Akimov | Size: 3415 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
10. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents anybody to run the program and change settings and uninstall the program. The 'Import/Export' function helps you set up the same settings on | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
11. | Secure Image Express 4.0 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 2, 2006 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
12. | Password Maintenance 2.07 (softdd.com) | ||
external device to better secure your passwords, as your password files will not even exist on your pc if you choose this option. You can also print a list of all your passwords and websites on paper for safe backup storage, and you can add, update, and delete websites and passwords in your list. You | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftDD Software | Size: 535 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
13. | Secure Image Express 4.0 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 2, 2006 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
14. | Mp3 Filter 4.2.4 (hardcoded.net) | ||
your collection is: Hard drives, Multiple Mp3 CDs, anything. The file comparison process, which basically compare filename's words between them, is completely customizable. Mp3 Filter also have tons of other features: * Profile driven scans. * Incredibly fast comparing engine. * Supports MP3, WMA, OGG, M4A/M4P (iTunes format). * Easy to use profile | |||
Updated: 2, 2006 | Rating: 1578 | Author: Virgil Dupras | Size: 1083 kb | Shareware Go to category: Audio & Multimedia > Audio File Players Similar programs | |||
15. | Instant Remote Control 2.2.9 (omniquad.com) | ||
multiple licenses-requires to be installed only on the administrator's computers used to control other PCs-a single license can support large networks-no warning displayed at remote end-creates a tree of all computers on your network automatically-manually enter IP details and access PCs not listed as well-works by sending a preconfigured host to a would-be host machine-the host | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Sobstel | Size: 2341 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
16. | WiseTerm Telnet/Serial (32-bit) 3.1.2 (johnnypops.demon.co.uk) | ||
tab-stops; char, line, column, rectangle clear/fill functions; line locking; answerback; monitor mode; line drawing; remotely switchable emulation. Supports session logging. Includes a modem dialer and a simple phonebook. When using telnet, you can use your host file, or an edited version of your host file, as a machine directory. Includes printing, and cut and paste | |||
Updated: 2, 2006 | Rating: 48 | Author: John Popplewell | Size: 415 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
17. | wodMailbox 2.0.7.0 (weonlydo.com) | ||
there either regular mailbox just as is used on UNIX systems (one file with full mail messages one after another) or just one message inside, just as Outlook Express saves .eml files. When you need to parse received messages, it might be hard to check all the possibilities that one simple mail message may contain. We all used to receive simple email messages - few headers | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 821 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
18. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
19. | All in One SECRETMAKER 4.2.1 (secretmaker.com) | ||
movie blocker blocks Flash ads, besides uncountable adware sources locked out. The pop-up blocker stops unwanted pop-ups, and the privacy protector hides your identity while you surf. The cookie eraser circumvents profiling. Various white lists allow user-specific optimizations. The history cleaner clears needless files, logs, and tracks. All-in-One Secretmaker is suitable for | |||
Updated: 2, 2006 | Rating: 264 | Author: secretmaker team | Size: 1249 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
20. | FlowChart.NET 4.0.3 (nocache.mindfusion.org) | ||
include an alignment grid, shadow effects, scrolling and zooming, locking, z-order and pen styles. Several automatic layout algorithms, link routing and graphs analysis functions make FlowChart.NET even more useful. Diagrams can be stored in files, printed on paper, exported to image files, serialized in .NET streams such as memory buffers or network sockets. The | |||
Updated: 2, 2006 | Rating: 54 | Author: MindFusion Ltd. | Size: 4943 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
21. | eBooksWriter PRO 2005.15.195 (visualvision.com) | ||
VisualVision's EBooksWriter you can create ebooks with ease. It's a professional all-in-one visual environment, not just a compiler! - you build compact self extracting ebooks with one click; - one ebook, one source file. All visual, no compilation, no coding, no complications...; - no royalties: you're free to redistribute your ebook / ebrochure over the Internet | |||
Updated: 2, 2006 | Rating: 0 | Author: Aldo Ghigliano | Size: 2460 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
22. | WinLock Remote Administrator 1.22 (crystaloffice.com) | ||
remote WinLock and WinLock Professional clients via network, lock remote workstations, and apply security profiles by means of easy-to-use interface. Being a client-server application, Remote Administrator allows the administrator to control the network installations of WinLock without leaving the computer. By means of this tool, administrators can manage WinLock settings, enable | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 2128 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
23. | WinGuard Pro 2006 Free Edition 6.0 (winguardpro.com) | ||
programs, windows and web pages in one easy to use program! What's more, there is also encrytption for your files and folders. It offers an all-in-one security solution for your computer. With extra features to lock the boot keys, task keys, software installations and internet access. This is the free edition download, however there is an option to upgrade to Premium | |||
Updated: 2, 2006 | Rating: 48 | Author: WGP Security Solutions | Size: 2454 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
24. | Windows Security Officer 6.8.1.1 (mybestsoft.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
25. | Tray Commander 2.3 (ardamax.com) | ||
off, stand by, hibernate and reboot computer Monitor power off Lock Workstation Open favorite web pages Open or close CD tray (with automatical closing) Launch Control Panel items Open files Paste text Launch screen saver Other features: Windows 98/NT/2000/XP support Hot key editor Drag & drop support Large icons in menu support Multilingual | |||
Updated: 2, 2006 | Rating: 0 | Author: Maxim Frolov | Size: 843 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
26. | Task Commander 2.5 (resortlabs.com) | ||
well as providing one-click access to your favorite applications and files! Task Commander installs a tiny icon on your taskbar. As soon as your mouse cursor hovers over it, a menu appears containing the most popular and recently used applications that can be launched with just a click. This menu is | |||
Updated: 2, 2006 | Rating: 0 | Author: Grishin Sergey | Size: 2219 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
27. | System Mechanic Professional 6.0s (iolo.com) | ||
components, installed software, hardware, and more. Instantly Lock Down your System with PC Security Optimizer by automatically finding and repairing Windows security flaws that leave you open to attack from computer enemies such as spyware, adware, viruses, hackers, and identity thieves. Keep your System Spotless with the PC Cleanup Wizard by automatically removing all forms of | |||
Updated: 2, 2006 | Rating: 64 | Author: iolo technologies | Size: 33888 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
28. | System Mechanic 6.0s (iolo.com) | ||
accelerate, secure, and maintain your PC with System Mechanic's award-winning arsenal of powerful tools. Use the new PC Repair Wizard to automatically diagnose and fix hundreds of problems with hard drives, system components, installed software, hardware, and more. Instantly Lock Down your System with PC Security Optimizer by automatically finding and repairing Windows | |||
Updated: 2, 2006 | Rating: 45 | Author: iolo technologies | Size: 11980 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
29. | ABC Security Protector 5.23 (getfreefile.com) | ||
useful if you want to disable the lowlevel access to your system. It's easy to use, excellent online help is also available. Try our password and security tools, free downloads. This nice free security utility enables you to protect your PC by disabling some features like: use of the MS-DOS command | |||
Updated: 2, 2006 | Rating: 39 | Author: Ixis Ltd | Size: 563 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
30. | FlowChart.NET 4.0.3 (mindfusion.org) | ||
include an alignment grid, shadow effects, scrolling and zooming, locking, z-order and pen styles. Several automatic layout algorithms, link routing and graphs analysis functions make FlowChart.NET even more useful. Diagrams can be stored in files, printed on paper, exported to image files, serialized in .NET streams such as memory buffers or network sockets. The | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 4943 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
31. | Registry First Aid 4.3.1 (rosecitysoftware.com) | ||
4.3 - It's faster, finds more problems than others and is even easier to use! People's Choice Winner 2003 Shareware Industry Conference! Tired of Windows crashing? Sick of having software lock up on you or taking forever to load? The problem could be all of those incorrect registry entries caused by software installations and un-installations that went awry! Not all | |||
Updated: 2, 2006 | Rating: 16 | Author: Konstantin Golovatsky | Size: 1739 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
32. | Access Administrator 4.14 (getfreefile.com) | ||
your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
33. | Password Protected Lock 2.92 (softfolder.com) | ||
Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time and provides an informative message that you can edit as you like | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftFolder Inc | Size: 724 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
34. | Hide Files 3.4 (hide-files.biz) | ||
have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
35. | Hide Files & Folders 2.4 (softstack.com) | ||
Files & Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
36. | Hide Files 3.4 (spydex.com) | ||
have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
37. | File & Folder Protector 2.33 (softheap.com) | ||
Files and Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 740 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
38. | Evidence Exterminator 2.14 (softstack.com) | ||
information. Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information about all your steps: all pictures you have seen, all passwords and | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
39. | EF Duplicate Files Manager 3.21 (efsoftware.com) | ||
EF Duplicate Files Manager is a useful program that help you to find out and remove duplicate files with same name, same size, same content on specify paths, files that occupy so unnecessarily storage place on your computer or your server. You can let the program work in several ways. In | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1854 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
40. | Easy File Protector 4.14 (softstack.com) | ||
File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
41. | Easy Desktop Keeper 1.63 (softheap.com) | ||
Desktop Keeper gives you the ability to save, restore, manage and lock your desktop layout including files and folders located on your desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout, every time you reboot your PC, the | |||
Updated: 2, 2006 | Rating: 68 | Author: Ixis Ltd | Size: 841 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
42. | Dr.Salman's Window Power Tools 5.0-2005R1 (dmisoftware.com) | ||
by four times. It also cleans your hard drive, searches for garbage files and cleans them, decreases window crashes by 80-90%, provides a memory monitor, recovers precious wasted RAM to give your system the just booted feeling. It will keep your system running as smoothly as possible. Another amazing | |||
Updated: 2, 2006 | Rating: 39 | Author: Dr.Salman Zafar | Size: 5525 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
43. | Easy Desktop Keeper 1.63 (getfreefile.com) | ||
Desktop Keeper gives you the ability to save, restore, manage and lock your desktop layout including files and folders located on your desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout, every time you reboot your PC, the | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 841 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
44. | CD-DVD Lock 2.01 (getfreefile.com) | ||
Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them. You can gain access to your devices back by entering a valid password that only you know | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
45. | CD-DVD Lock 2.01 (softheap.com) | ||
Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them. You can gain access to your devices back by entering a valid password that only you know | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
46. | Backup4all 3.0 (backup4all.com) | ||
removable media (such as USB drives). Backup4all can backup open/locked files and it can perform full, differential, incremental and mirror backups. When defining a backup you can also set file filters and schedule the backup for automatic execution. Once a backup is performed, you can see what files have been changed since the last backup or you can read the | |||
Updated: 2, 2006 | Rating: 24 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
47. | Backup4all 3.0 (backup4all.com) | ||
removable media (such as USB drives). Backup4all can backup open/locked files and it can perform full, differential, incremental and mirror backups. When defining a backup you can also set file filters and schedule the backup for automatic execution. Once a backup is performed, you can see what files have been changed since the last backup or you can read the | |||
Updated: 2, 2006 | Rating: 39 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
48. | Backup4all 3.0 (backup4all.com) | ||
removable media (such as USB drives). Backup4all can backup open/locked files and it can perform full, differential, incremental and mirror backups. When defining a backup you can also set file filters and schedule the backup for automatic execution. Once a backup is performed, you can see what files have been changed since the last backup or you can read the | |||
Updated: 2, 2006 | Rating: 0 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
49. | Asmw PC-Optimizer pro 7.6 (asmwsoft.com) | ||
and optimization utility to tune up windows performance. Remove junk files and zero size files to save valuable disk space; Registry Cleaner, to prevent application crashes;backup and restore backup; popup killer; Startup Manager, to prevent spy applications from running behind your back; erase | |||
Updated: 2, 2006 | Rating: 264 | Author: Asmw Soft Systems | Size: 6400 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
50. | Advanced Desktop Shield 1.63 (softstack.com) | ||
and desktop layouts of your users. Desktop layouts are saved to files, which include all files and folders located on the desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout or desktop layouts of your users, every time you or your users reboot your PC, the program will return everything on the desktop back | |||
Updated: 2, 2006 | Rating: 99 | Author: IM Soft | Size: 833 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Lock file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|