|
||||||
|
||
|
Home > Lock file software |
Related keywords: file, lock, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
201. | SoftwareShield System 2.4.10.17 (softwareshield.com) | ||
- A time limited license used for evaluation purposes. The Trial's functionality may be less than the standard product in which case this is a combined demo/trial. The day of expiration is generally set on the day the license is issued. Alternatively, the demo may expire after a certain number of days after installation or after it has been used a certain number of times - or | |||
Updated: 9, 2005 | Rating: 0 | Author: Zack Wickes | Size: 9037 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
202. | SourceGuardian PHP Encoder 5.5 (sourceguardian.com) | ||
Main feature list: + Full Bytecode Encryption - protect your files by removing the original PHP Source Code + Fully encode and deploy for PHP5 (and PHP4) + Choice of Windows/Linux/Mac OS X encoding clients + Command line encoder available now + Encrypt to domain name + Encrypt to IP + License generator for encoded scripts + Easy to use Wizard interface and | |||
Updated: 2, 2006 | Rating: 174 | Author: Sales Department | Size: 3580 kb | Demo Go to category: Web Development > ASP & PHP Similar programs | |||
203. | Spam Trapper for Outlook 1.3.3 (brigsoft.com) | ||
messages will be lost. Additional option makes Outlook to play Mp3 files and other media files. (*) Spam Trapper does not work with Outlook Express. Spam Trapper is a multilevel spam filter for Microsoft Outlook version 2000 and later. It is a plug-in component with clear convenient | |||
Updated: 9, 2005 | Rating: 0 | Author: Rest Alex | Size: 493 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
204. | SpyCapture 1.4.5 (tsm-soft.com) | ||
easily detected or terminate (even by pressing Ctrl-Alt-Delete), it's invisible! Only you will know how to terminate it, if you want. SpyCapture is an excellent PC Surveillance Software. Features: 1. High Invisibility, Password Protected, Encryption enabled and File Manager. 2. Capture all the keystrokes in all of the Windows environment, as long as the user use the | |||
Updated: 9, 2005 | Rating: 0 | Author: Tan Sun Min | Size: 428 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
205. | SpyPC 7.0 (xelerate.biz) | ||
SpyPC is the perfect surveillance tool to see what programs and files have been accessed or what web pages have been searched. SpyPC allows you to log all key strokes, lock your PC, lock setup modifications, disable all system functions such as editing the registry, accessing the control panel or command line and much more. WATCH YOUR EMPLOYEES, because you never | |||
Updated: 9, 2005 | Rating: 0 | Author: Hans Fremuth | Size: 3678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
206. | SQLExecMS 2.6 (laplas-soft.com) | ||
server performance counters;Check utilization of proc cache;Watch locks; Review space used by DB files, tables and indexes; Manage DB file and filegroups;Turn on and off trace flags;Manage scheduled jobs; Change SQL server and database options;Backup and restore databases; Analyze | |||
Updated: 2, 2006 | Rating: 433 | Author: Oleg Dantchenko | Size: 4928 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
207. | StartPro 2.0 (daesoft.com) | ||
remove programs located in the Registry, Startup folder, and win.ini file that load during start-up. Features include SmartBin, which saves deleted items for future restoration, and Boot Options, which allows the user to modify settings located in the msdos.sys file. StartPro also includes | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Price | Size: 440 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
208. | Sticky Notes Std 5.0 (morun.net) | ||
in groups, send sticky notes over LAN/Internet or via e-mail, attach files/urls to sticky notes, lock sticky notes to prevent unauthorized use, import .txt and .rtf files to sticky notes, save sticky note in *.txt, *.rtf formats; save sticky note as pictures (*.jpg, *.bmp formats) | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. net | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
209. | Super Encryption Box 2.4 (loosesoft.com) | ||
secure. Super Encryptoin Box adds a context menu entry to all files and | |||
Updated: 3, 2005 | Rating: 0 | Author: Ming Dave | Size: 135 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
210. | Super Password Guard 3.1 (topaim.net) | ||
also backup all this data at once just by copying single database file. Main features: 1. Fast, compact and easy to use program with familiar interface similar to Windows Explorer. 2. Encrypted password database files, accessible only via user selectable master password (for enhanced security, master password is used as encryption/decryption key only and is not stored | |||
Updated: 3, 2005 | Rating: 48 | Author: Cheng Zheng | Size: 2000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
211. | Super Utilities 6.25 (superlogix.net) | ||
in protecting and securing sensitive information. You can hide or lock folders, clean your system tracks, password-protect applications that hold sensitive data, quickly and securely delete files, and hide IE Favorites and Start menu items from view. 3.System Maintenance will help automate computer maintenance jobs to keep it smooth, fast, and error free. It includes Task | |||
Updated: 3, 2006 | Rating: 16 | Author: li jiangnan | Size: 3328 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
212. | System Mechanic 6.0s (iolo.com) | ||
accelerate, secure, and maintain your PC with System Mechanic's award-winning arsenal of powerful tools. Use the new PC Repair Wizard to automatically diagnose and fix hundreds of problems with hard drives, system components, installed software, hardware, and more. Instantly Lock Down your System with PC Security Optimizer by automatically finding and repairing Windows | |||
Updated: 2, 2006 | Rating: 45 | Author: iolo technologies | Size: 11980 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
213. | System Mechanic Professional 6.0s (iolo.com) | ||
components, installed software, hardware, and more. Instantly Lock Down your System with PC Security Optimizer by automatically finding and repairing Windows security flaws that leave you open to attack from computer enemies such as spyware, adware, viruses, hackers, and identity thieves. Keep your System Spotless with the PC Cleanup Wizard by automatically removing all forms of | |||
Updated: 2, 2006 | Rating: 64 | Author: iolo technologies | Size: 33888 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
214. | System Protector 1.9 (aidsoft.com) | ||
task manager)Disable Command PromptDisable Registry EditorDisable file and folder delete and moveOptimizing CPU and System cashePersonalize your System folders and fontsFind and delete all cookies on your computerRestrict the access to a directory. It`s recommended to use this option with "Disable Command Prompt" and "Disable Registry Editor" options.Free screen-lock | |||
Updated: 9, 2005 | Rating: 0 | Author: Dimitar Terziev | Size: 1 kb | Demo Go to category: System Utilities > Other Similar programs | |||
215. | System Sentry 2.2.05 (easydesksoftware.com) | ||
added, incorrect versions, and date changes of your system files and replaces them for you. This helps avoid the unnecessary and frustrating task of reinstalling Windows or specific problem programs. System Sentry offers the following features: - Cyclic Redundancy Check, detects files that are corrupt or possibly infected by a virus. - A Program Aligner that makes | |||
Updated: 9, 2005 | Rating: 0 | Author: Guy Young | Size: 3649 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
216. | Task Commander 2.5 (resortlabs.com) | ||
well as providing one-click access to your favorite applications and files! Task Commander installs a tiny icon on your taskbar. As soon as your mouse cursor hovers over it, a menu appears containing the most popular and recently used applications that can be launched with just a click. This menu is | |||
Updated: 2, 2006 | Rating: 0 | Author: Grishin Sergey | Size: 2219 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
217. | The Easy Bee 3.1.4 (theeasybee.com) | ||
design the layout of dashboard pages. The product automatically locks all agents that operate on password-protected pages, hiding the gathered content and preventing agent edition. A global password chosen by the user is used to unlock such private content. Files related to private agents are encrypted on the user disk with standard algorithms provided by Windows systems | |||
Updated: 9, 2005 | Rating: 0 | Author: Altercept | Size: 3463 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
218. | The Easy Bee 3.1.4 (theeasybee.com) | ||
design the layout of dashboard pages. The product automatically locks all agents that operate on password-protected pages, hiding the gathered content and preventing agent edition. A global password chosen by the user is used to unlock such private content. Files related to private agents are encrypted on the user disk with standard algorithms provided by Windows systems | |||
Updated: 9, 2005 | Rating: 0 | Author: Altercept | Size: 3463 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
219. | Time & Chaos 5.6.5 (ChaosSoftware.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 9, 2005 | Rating: 0 | Author: Bill Tiede | Size: 3756 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
220. | Time & Chaos 5.6.5 (isbister.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 9, 2005 | Rating: 0 | Author: Bill Tiede | Size: 3756 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
221. | Time & Chaos 6.0.4.5 (chaossoftware.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 2, 2006 | Rating: 0 | Author: Bill Tiede | Size: 4171 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
222. | TK8 Safe 2.5 (tk8.com) | ||
passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not only stores your information, but helps you to use it. A fast and easy-to-use interface allows you to find information quickly. You | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
223. | Transparent Screen Lock for WinNT/2000/XP/2003 2.10 (e-motional.com) | ||
protect your workstation or server with Transparent Screen Lock while viewing programs that are running. Any attempts to access the system will display a message box to request the password. Prevent access via CRTL-ALT-DEL. Includes a log file to track activity and failed login attempts. Save log file locally or at a remote network location. Use quick-launch | |||
Updated: 9, 2005 | Rating: 370 | Author: Sandra Buckingham | Size: 562 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
224. | Transparent Screen Lock PRO for WinNT/2000/XP/2003 4.50 (e-motional.com) | ||
protect your workstation or server with Transparent Screen Lock PRO while viewing programs that are running. Prevent system access via CRTL-ALT-DEL. Options to remove the pocess from the Windows Task Manager and restrict configuration menus to Administrators only in order to prevent regular users from disabling or tampering with the program. Log file tracks failed logon | |||
Updated: 2, 2006 | Rating: 16 | Author: Sandra Buckingham | Size: 992 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
225. | Tray Commander 2.3 (ardamax.com) | ||
off, stand by, hibernate and reboot computer Monitor power off Lock Workstation Open favorite web pages Open or close CD tray (with automatical closing) Launch Control Panel items Open files Paste text Launch screen saver Other features: Windows 98/NT/2000/XP support Hot key editor Drag & drop support Large icons in menu support Multilingual | |||
Updated: 2, 2006 | Rating: 0 | Author: Maxim Frolov | Size: 843 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
226. | TurboNote 3.4 (turbonote.com) | ||
change note colours and sizes, have them ring alarms, print them, lock them and keep your screen uncluttered by hiding them. Notes even stay around when you turn your computer off. TurboNote's Quick Launch feature also lets you open Web addresses, programs and files which appear in notes, simply by double-clicking. Network support suits organisation-wide deployment and | |||
Updated: 9, 2005 | Rating: 1234 | Author: Peter Hyde | Size: 542 kb | Freeware Go to category: Business > Other Similar programs | |||
227. | TurboNote+ desktop sticky notes v6.0 (turbonote.com) | ||
Web and email addresses. Change note colors and sizes, set alarms, lock them and keep your screen uncluttered by hiding them. Use handy templates for common messages or make up your own style with optional rich text editing, transparency control and images. TurboNotes stay around when you turn your | |||
Updated: 2, 2006 | Rating: 173 | Author: Vicki Hyde | Size: 1616 kb | Shareware Go to category: Business > Other Similar programs | |||
228. | TZ Privacy Guard 3.1.0.0 (trackzapper.com) | ||
History, favorite's folders and private information: passwords, credit card numbers, social security number etc. ; can expose a lot of your private information that you would like to protect. Also, Personal interests sites, banking information, stocks you monitor on line bidding, and aucations you are tracking, your surfing habits both on and off the web. this information can be | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 4266 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
229. | Ultimate Jukebox 1.1 (ultimatejukebox.murphnet.net) | ||
for your HTPC (Home Theater PC). It will scan your PC for music files (Mp3, OGG, WMA, WAV), and display them in an easy to use interface, like a modern jukebox. It can run full screen with large fonts, has a queue and multiple playlist levels. Features include full control over fonts, colors & skins, album cover display, alarm clock, playlist creation, screen saver, support for | |||
Updated: 9, 2005 | Rating: 0 | Author: Tony Murphy | Size: 2272 kb | Shareware Go to category: Audio & Multimedia > Audio File Players Similar programs | |||
230. | Universal Shield 4.0 (everstrike.com) | ||
Software is the ultimate protection tool for your computer - hide files, folders, and drives, and set access rules using flexible security combinations for your most precious data. A unique feature of Universal Shield is the perfect combination of data hiding and encrypting. This feature is very | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
231. | User Control 2005 (salfeld.com) | ||
you to block any undesired window title or any application / EXE-file. On the Internet you can define exactly which contents shall be allowed and which not. You can also explicitly allow only authorized applications and/or Internet addresses. Block the varied Windows systems areas (such as system control, setting on start menu, downloads from IE, Windows settings, etc.) with just a | |||
Updated: 9, 2005 | Rating: 34 | Author: Dierk Salfeld | Size: 4027 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
232. | Virtual Flower 1.2 (homepage.ntlworld.com) | ||
of rustling leaves, or visit an island with exotic flowers. The files are extremely tiny, most are four or five KB, suitable for inclusion in 3D scenes. Uses the popular VRML format - get the Cortona plug in to view them, or embed in web page with a java applet such a Blaxxun. You can also make anaglyph flowers which spring into 3D when you view them using red/ blue anaglyph | |||
Updated: 9, 2005 | Rating: 0 | Author: Robert Walker | Size: 2063 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
233. | Virtual Flower 1.2 (homepage.ntlworld.com) | ||
of rustling leaves, or visit an island with exotic flowers. The files are extremely tiny, most are four or five KB, suitable for inclusion in larger 3D scenes. Uses the popular VRML format - get the Cortona plug in to view them, or embed in web page with a java applet such a Blaxxun. Or save as flash animated jpegs, flash movies, or animation frames in many formats such as | |||
Updated: 9, 2005 | Rating: 0 | Author: Robert Walker | Size: 2618 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
234. | virtualCrypt 3.02 (netindiasolutions.com) | ||
Moreover these virtual drives are created in innocent sound files using steganographic technique. virtualCrypt is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
235. | VShell 2.2.4 (promaxum.com) | ||
Control Lists allow you to assign the right mix of shell access, file transfer, and application data tunneling to users and groups. Centralized server configuration, options for Kerberos via GSSAPI, end user public-key upload, and triggers for automation of routine tasks reduce hassles for busy system administrators. Integrate this strong security with your existing infrastructure | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 3703 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
236. | Watch Right 2002.0.77 (bpssoft.com) | ||
concerned parent with the ability to "keep an eye" on their child's online activities. Automatically log your child's instant messages, chatroom conversations, email messages, message board postings, and web sites they visit while online. В Watch Right is designed to work invisibly in the | |||
Updated: 2, 2006 | Rating: 0 | Author: Bradley O'Keefe | Size: 2842 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
237. | web based msde dba tool - Shusheng SQL Tool 1.0 (websqltool.com) | ||
Jobs, Job Steps and Schedules. o Monitor connections, locks and performance of SQL server. Kill bad process. o Administrate security for server logins (Windows and SQL accounts), database users and roles. o Assign permission to user(s), role(s), object(s). Support column level permission. o Backup, Restore and Repair database. Compress Transaction | |||
Updated: 9, 2005 | Rating: 72 | Author: Shusheng Zhou | Size: 819 kb | Freeware Go to category: Business > Databases & Tools Similar programs | |||
238. | web based msde dba tool - Shusheng SQL Tool 1.0 (websqltool.com) | ||
Jobs, Job Steps and Schedules. o Monitor connections, locks and performance of SQL server. Kill bad process. o Administrate security for server logins (Windows and SQL accounts), database users and roles. o Assign permission to user(s), role(s), object(s). Support column level permission. o Backup, Restore and Repair database. Compress Transaction | |||
Updated: 9, 2005 | Rating: 0 | Author: Shusheng Zhou | Size: 819 kb | Freeware Go to category: Business > Databases & Tools Similar programs | |||
239. | Wincph encryption software 4.7 (keepsecret.net) | ||
file and folder encryption software.It protect the privacy of your sensitive files and e-mail messages by encrypting them with the highest level of security.Includes ability to store several files and folders in one encrypted archive. Ability to make self-decrypted Archive. Drag and | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuxue Tu | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
240. | Window Security Toolkit 5.0 (dmisoftware.com) | ||
Internet Explorer and more. Also Includes SHA1 160 bit and MD5 File Encryption plus Ultra Desktop Lock. An excellent program if you don't want others to be messing up with your system. Get over 51 Advanced Security Settings for Windows with this power tool ! Window Security Toolkit helps you make windows totally secured by Providing access restrictions on the control panel | |||
Updated: 9, 2005 | Rating: 0 | Author: Dr.Salman Zafar | Size: 1710 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
241. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
242. | Windows Security Officer 6.8.1.1 (mybestsoft.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
243. | WinForcer 3 (winforcer.com) | ||
can configure multiple machines by using distribution configuration files. So you do not need to individually set up each machines config. Can be configured not to WinForce the Administrator User or prompt anyone logged in as administrator for the password thus ensuring you will not forget the | |||
Updated: 9, 2005 | Rating: 431 | Author: Richard Smee | Size: 2195 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
244. | WinGuard Pro 2006 Free Edition 6.0 (winguardpro.com) | ||
programs, windows and web pages in one easy to use program! What's more, there is also encrytption for your files and folders. It offers an all-in-one security solution for your computer. With extra features to lock the boot keys, task keys, software installations and internet access. This is the free edition download, however there is an option to upgrade to Premium | |||
Updated: 2, 2006 | Rating: 48 | Author: WGP Security Solutions | Size: 2454 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
245. | WinLock Remote Administrator 1.22 (crystaloffice.com) | ||
remote WinLock and WinLock Professional clients via network, lock remote workstations, and apply security profiles by means of easy-to-use interface. Being a client-server application, Remote Administrator allows the administrator to control the network installations of WinLock without leaving the computer. By means of this tool, administrators can manage WinLock settings, enable | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 2128 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
246. | WiseTerm Telnet/Serial (32-bit) 3.1.2 (johnnypops.demon.co.uk) | ||
tab-stops; char, line, column, rectangle clear/fill functions; line locking; answerback; monitor mode; line drawing; remotely switchable emulation. Supports session logging. Includes a modem dialer and a simple phonebook. When using telnet, you can use your host file, or an edited version of your host file, as a machine directory. Includes printing, and cut and paste | |||
Updated: 2, 2006 | Rating: 48 | Author: John Popplewell | Size: 415 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
247. | Without A Trace Surf Guard 5.91 (tekeffect.com) | ||
today's society it is becoming a daily routine that employee's are being fired for surfing the internet, professors are being arrested after their hard drives are examined and/or husbands and wife's become bitter or divorced after the browser history is revealed. Our Without A Trace Surf | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 4027 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
248. | wodMailbox 2.0.7.0 (weonlydo.com) | ||
there either regular mailbox just as is used on UNIX systems (one file with full mail messages one after another) or just one message inside, just as Outlook Express saves .eml files. When you need to parse received messages, it might be hard to check all the possibilities that one simple mail message may contain. We all used to receive simple email messages - few headers | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 821 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
249. | X2Net WebCompiler 3.0.0.49 (x2net.com) | ||
powerful HTML Compiler produces .exe files for distribution from groups of HTML pages. Built-in ultra fast searching, favorites and history management, page protection, passwords, kiosk mode,form processing etc. Built-in installer/uninstaller, powerful encrytion. System locking to restrict | |||
Updated: 2, 2006 | Rating: 0 | Author: X2Net Staff | Size: 4957 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
250. | XP System Sentry 2.2.05 (easydesksoftware.com) | ||
replaced, added, incorrect versions, and dates of your system files and replaces them for you. This helps avoid the often unnecessary and frustrating task of reinstalling Windows or specific problem programs. System Sentry offers the following features: - Cyclic Redundancy Check, detects files that are corrupt or possibly infected by a virus. - A utility for | |||
Updated: 9, 2005 | Rating: 39 | Author: Guy Young | Size: 3722 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
|
Home > Lock file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|