|
||||||
|
||
|
Home > Locker software |
Related keywords: file locker, folder locker |
|
|
1. | AudioLabel CD/DVD Labeler 3.20 (audiolabel.com) | ||
and filename. Unlike other cd labeling software, you'll never be locked into a particular brand of label paper. All popular brands are supported and even non-standard labels can be adjusted using the "Label Alignment Wizard". Includes support for Epson and Canon direct to CD printing. No matter what kind of paper, our cd cover maker can print your labels with ease. Smart cd label | |||
Updated: 2, 2006 | Rating: 228 | Author: Cripple Creek Software | Size: 3870 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
2. | InfoLock 1.51 (whimsysoft.com) | ||
Interlock 1.5 InfoLock is a software that can help you to encrypt your information. InfoLock can encrypt file or text(which entered by yourself or copy from clipboard). InfoLock use some very safe arithmetic to encrypt your information.Such as DES, which was put out by IBM and NSA. And InfoLock can encrypt file or text(which entered by yourself or copy from clipboard). InfoLock use some very safe arithmetic to encrypt your information,such as DES | |||
Updated: 8, 2004 | Rating: 101 | Author: Wei Zhang | Size: 692 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
3. | Mp3 Filter 4.2.4 (hardcoded.net) | ||
of a duplicate before you delete it. o The results are locked. Thus you can't delete the duplicate and the reference. You don't have to worry about tearing off your hairs because bad mouse clicks. * Scan a CD and copy only files you don't already have. * Create a virtual | |||
Updated: 2, 2006 | Rating: 1578 | Author: Virgil Dupras | Size: 1083 kb | Shareware Go to category: Audio & Multimedia > Audio File Players Similar programs | |||
4. | MP3Guard MP3 Protection 2.0 (zappersoftware.com) | ||
online. This program works, optionally, with ShareGuard to provide a lock and key system for selling mp3 files. 2 Basic Components: MP3Guard Producer - allows you tailor your MP3 player and to create your MP3 playlist. MP3Guard Player - this program and the encrypted mp3 files are distributed. Only the | |||
Updated: 9, 2005 | Rating: 48 | Author: William Bradshaw | Size: 4621 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
5. | NoiseNakPlus 2003 V2.0.0 (nakware.com) | ||
unmuting and startup. The input volume levels can be preset and locked. The volume can automatically alter depending on the recorded level. Screen resolution and volume settings can be set to automatically change depending on the program being run. Networked computers can be remotely muted or screen blanked with the option to send a message, this feature is particularly suitable | |||
Updated: 9, 2005 | Rating: 79 | Author: Andy Erceg | Size: 1676 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
6. | PopGun Ad Stopper 1.21 (kevin.lock2.btinternet.co.uk) | ||
Popup Killer is second to none, download it now FREE, very FAST, very CLEVER. All popups are zapped immediately. No need for lists. It just knows what a popup is!!, and instantly anhialates them ALL. It even has a cute GUI too. PopGun is hungry for your popups, please feed it now, and download it | |||
Updated: 9, 2005 | Rating: 0 | Author: Kevin Lock | Size: 299 kb | Freeware Go to category: Network & Internet > Ad Blockers Similar programs | |||
7. | RainbowGround 1.1 (desktopfay.com) | ||
brightness and contrast sliders. They also affect resulting image. Lock buttons are used to lock groups of sliders so that a) all sliders in the group are linked and moved together and b) locked sliders are not affected by Randomize button. Randomize button changes positions of | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Kozhinov | Size: 511 kb | Freeware Go to category: Graphic Apps > CAD Similar programs | |||
8. | Super Encryption Box 2.4 (loosesoft.com) | ||
Super Encryptoin Box is a powerful and easy-to-use program for encrypting and protecting your data and save you disk space--perfect for offices that need to keep important documents secure. Super Encryptoin Box adds a context menu entry to all files and f | |||
Updated: 3, 2005 | Rating: 0 | Author: Ming Dave | Size: 135 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
9. | Transparent Screen Lock for WinNT/2000/XP/2003 2.10 (e-motional.com) | ||
protect your workstation or server with Transparent Screen Lock while viewing programs that are running. Any attempts to access the system will display a message box to request the password. Prevent access via CRTL-ALT-DEL. Includes a log file to track activity and failed login attempts. Save log file locally or at a remote network location. Use quick-launch icon to enable | |||
Updated: 9, 2005 | Rating: 370 | Author: Sandra Buckingham | Size: 562 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
10. | UdoRadio 2.6 (members.aol.com) | ||
We break the genre boundaries- While most Internet stations lock listeners into the same genre-specific music broadcast stations play, UdoRadio listeners build their own play lists across any music genre they like. They can mix Celtic and New Age with Jazz and Opera. Blend Blues with Bluegrass, then add Gospel and Rock. Even build a play list just for the kids! UdoRadio | |||
Updated: 9, 2005 | Rating: 90 | Author: Christopher Pope | Size: 485 kb | Freeware Go to category: Audio & Multimedia > Other Similar programs | |||
11. | Ultimate Jukebox 1.1 (ultimatejukebox.murphnet.net) | ||
screen saver, support for untagged media files, party play mode (lock it down at parties!) and the power of Winamp! Mp3, WMA, OGG & WAV Audio Player, presents your music library in an easy to use jukebox interface. Provides instant access to your music collection, perfect for the HTPC. Can run full screen with large fonts, has a queue and multiple playlist | |||
Updated: 9, 2005 | Rating: 0 | Author: Tony Murphy | Size: 2272 kb | Shareware Go to category: Audio & Multimedia > Audio File Players Similar programs | |||
12. | Virtual Flower 1.2 (homepage.ntlworld.com) | ||
Create flowers and geometrical patterns in 3D. Watch them grow or unfold. A swirling pattern of stars suddenly coalesces into a geodesic sphere with all the points gracefully touching. Navigate a forest of rustling leaves, or visit an island with exotic flowers. The files are extremely tiny, most are four or | |||
Updated: 9, 2005 | Rating: 0 | Author: Robert Walker | Size: 2063 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
13. | Zip Backup to CD 3.18 (dh.dk) | ||
as long as the application that is using the file does not have it locked for read access. Therefore you can backup the complete system if you are running Windows 95, 98, ME. If you are running Windows NT, 2000 or XP you have the option to include the registry and system state, which enables you to | |||
Updated: 9, 2005 | Rating: 0 | Author: Rene Mogensen | Size: 946 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
14. | AGILITA-Client 1.5 (download.agilita.de) | ||
be programmed separately. Included is the ability of automatically locking a record, multilinguality and a user-/group- and authorization concept. Also supported by the client are different report generators, so that printing is already included. Documents can be printed, presented as a preview on the | |||
Updated: 9, 2005 | Rating: 0 | Author: Ralf Becker | Size: 3060 kb | Commercial Go to category: Business > Databases & Tools Similar programs | |||
15. | All Organizer 2.0 (allthesoft.com) | ||
easily and securely. With our leading concurrency record locking mechanism.DreamyStar Organizer can also be used to share workgroup or small business member's personal information through Local Area Network(LAN) environment. An All-In-One powerful information organizer specialize in Personal and workgroup information manage. It can manage all your Personal information and | |||
Updated: 9, 2005 | Rating: 36 | Author: Jordan Smith | Size: 2986 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
16. | Break Time 1.4.50 (kadmi.com) | ||
Break Time helps you avoid the weariness (known as Occupational Overuse Syndrome or Repetitive Strain Injuries), which arises during work on the computer. Weariness arises as a result of long continuous work. It may be prevented if you take a break and do relaxing exercises. Relaxation will be enhanced if | |||
Updated: 9, 2005 | Rating: 0 | Author: Klikov Aleksander | Size: 1101 kb | Shareware Go to category: Home & Hobby > Cataloging Similar programs | |||
17. | CafeTimePro -Internet Cafe Software 4.0 (cafetime.com) | ||
duration and end time are always visible. System Security: Lock down the computer so that only the applications specified by the kiosk administrator are permitted to run. Complete prepay System: Prepaid accounts can be generated in advance for sale to customers. Coin Acceptor Ready | |||
Updated: 9, 2005 | Rating: 558 | Author: Rory Keogh | Size: 5982 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
18. | Computers Hall 2.11 (ruslan.odessa.ua) | ||
window which to remove it is impossible or the keyboard, a mouse is locked; · The program remembers and uses the price for 1 hour of games and 1 hour of the Internet; · Roundoff of the sum of payment; · Return of the rest of money; · From one sight it is visible, what computer is free, what occupied, how many minutes are necessary to work, how many has fulfilled and when will be | |||
Updated: 3, 2005 | Rating: 16 | Author: Ruslan Scherbatuk | Size: 1798 kb | Demo Go to category: Business > Other Similar programs | |||
19. | Create Your Business Cards 1.5 (rytechsoftware.com) | ||
layouts * Adjust page layouts to suit any business card stock * Lock design objects that you do not want to modify * Right-click menus allow for easy and efficient navigation Design and print professional looking business cards in minutes with “Create Your Business Cards” . It comes with many pre-made templates saving you the time of designing your business card from | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Ryan | Size: 1548 kb | Shareware Go to category: Business > Other Similar programs | |||
20. | DeskLook 3.2 (xemico.com) | ||
or use special option to hide data automatically when computer is locked. DeskLook is able to start your Outlook so you can use its launch on startup option to have both programs automatically started each time you switch on your computer. In addition, the program features an option to popup central | |||
Updated: 9, 2005 | Rating: 16 | Author: XemiComputers Ltd. | Size: 1345 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
21. | Dreamystar Organizer 2.8 (dreamysoft.com) | ||
business information manage. With our leading concurrency record locking mechanism.workgroup members can share data effectively and conviently..This Software can manage all your address book,schedule,Notes,to do,anniversary,eBook,ePhoto,finance and secrets.Supports Data Password Protect,Data | |||
Updated: 3, 2005 | Rating: 0 | Author: smartstone Lee | Size: 3014 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
22. | Ebook - The true cost of downtime 1.00 (bin95.com) | ||
Six Sigma and Lean Manufacturing investments. Full version, no locks or passwords, or timers. All unique content completely free, no strings attached, in this large engineering ebook. Primarily explorers manufacturing cost metrics in an exhaustive effort to create awareness of the greatest cost savings opportunities in facilities today. [EXE | |||
Updated: 9, 2005 | Rating: 0 | Author: Don Fitchett | Size: 961 kb | Freeware Go to category: Business > Other Similar programs | |||
23. | eBooksWriter PRO 2005.15.195 (visualvision.com) | ||
- you can assign different passwords for different users; - "lock to PC" personal key protection with the CBProtect Virtual Vault service; - music and video: AVI MPEG WMV......; - frames, text styles, popup windows, rollover / mouse over sensitive images, visual linking: feature rich, easy to use, fast; - forms and shopping cart (Gold edition) - plugin capabilities (e.g. the | |||
Updated: 2, 2006 | Rating: 89 | Author: Aldo Ghigliano | Size: 2460 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
24. | Enigma 2 (enigma.homestead.com) | ||
you lose nothing even if your hard disk dies With Enigma, you can lock away all of your Passwords, Images, Documents, Video and Audio into one Encrypted database for your eyes | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Lamb | Size: 7500 kb | Demo Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
25. | Intellisys Project Desktop 3.00 (webintellisys.com) | ||
costing, searchable help. Advanced features include: schedule locking, automatic resource assignment from a pool, cross-project resource management, multiple access levels/views, critical path analysis, resource utilization views, import/export with MS Project, notes, threaded messages and document attachment to projects. Intellisys Project Desktop is an intuitive visual tool to | |||
Updated: 3, 2006 | Rating: 53 | Author: Intellisys Support | Size: 7833 kb | Shareware Go to category: Business > Project Management Similar programs | |||
26. | LoanAmortizer Standard Edition 3.1 (loanamortizer.com) | ||
Standard Edition has a network supporting functions with file locking module that makes it ideal to work in a Network Loan amortization and payment schedule preparation and printing application suitable for personal and business use. This is an award winning financial application helping you create superb loan schedules and loan output data. Install | |||
Updated: 9, 2005 | Rating: 0 | Author: George Athannassov | Size: 1407 kb | Shareware Go to category: Business > Other Similar programs | |||
27. | Recall 4.0 (acastat.com) | ||
you to organize notes and secure confidential information. You can lock files with a password or share files with other Recall | |||
Updated: 9, 2005 | Rating: 42 | Author: Phil Crewson | Size: 2639 kb | Shareware Go to category: Business > Other Similar programs | |||
28. | Security Forms 1.0 (securitylanding.com) | ||
Group payroll, Immediate action required, Job description, Key log, Locker agreement, Loss prevention committee, Loss prevention employee of the month, Loss prevention safety committee, Loss prevention safety committee minutes, Loss prevention safety training notice, Loss prevention training notice, Medication log, Meeting notice, Memo, Osha form 101, Osha form 174, Osha form 200 | |||
Updated: 3, 2005 | Rating: 110 | Author: Paul Pleasant | Size: 173 kb | Freeware Go to category: Business > Other Similar programs | |||
29. | Time & Chaos 5.6.5 (ChaosSoftware.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 9, 2005 | Rating: 0 | Author: Bill Tiede | Size: 3756 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
30. | TurboNote 3.4 (turbonote.com) | ||
change note colours and sizes, have them ring alarms, print them, lock them and keep your screen uncluttered by hiding them. Notes even stay around when you turn your computer off. TurboNote's Quick Launch feature also lets you open Web addresses, programs and files which appear in notes, simply by | |||
Updated: 9, 2005 | Rating: 1234 | Author: Peter Hyde | Size: 542 kb | Freeware Go to category: Business > Other Similar programs | |||
31. | TurboNote+ desktop sticky notes v6.0 (turbonote.com) | ||
Web and email addresses. Change note colors and sizes, set alarms, lock them and keep your screen uncluttered by hiding them. Use handy templates for common messages or make up your own style with optional rich text editing, transparency control and images. TurboNotes stay around when you turn your computer off, and are automatically backed up. TurboNote+'s Quick Launch feature also | |||
Updated: 2, 2006 | Rating: 173 | Author: Vicki Hyde | Size: 1616 kb | Shareware Go to category: Business > Other Similar programs | |||
32. | 1Way 5.5 (atma-software.com) | ||
into time-limited shareware. A function library offering a flexible locking system with solid encryption. Generate serial numbers to register your application. Test program included. Easy to implement. Support for VB, C++, Delphi, other languages. AES (Rijndael) 256 bit encryption. Convert any | |||
Updated: 9, 2005 | Rating: 735 | Author: Mark Snegg | Size: 1787 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
33. | ACProtect standard 1.20 (ultraprotect.com) | ||
to create and verify the registration keys and unlock some RSA key locked code. It has an Embedded Protector against file dumping and unpackers. It also has many anti-debug tricks with specialized API system. Mutual communication between loader and application can also be achieved! Special ACProtect Technics: Metamorph Engine- Metamorph decryption routines and several encrypted | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
34. | AidAim CryptoPressStream 1.00 (aidaim.com) | ||
LoadFromStream, LoadFromFile, SaveToStream, SaveToFile methods, Lock and Unlock methods for multi-thread usage. CryptoPressStream includes TCPSManager thread-safe component that provides an easiest setting of compression and encryption parameters, and contains a list of opened streams. CryptoPressStream contains TCPSManager visual component, Component Reference, 7 demos, License | |||
Updated: 9, 2005 | Rating: 0 | Author: AidAim Software | Size: 1062 kb | Commercial Go to category: Development > Delphi Similar programs | |||
35. | Amirus Mirror Memory 1.4.40 (CitrusControls.com) | ||
design is peer-to-peer with no single point of failure. A global lock facility allows cooperating programs to coordinate access to shared memory, making AmirusMM an ideal platform for the rapid development of distributed applications. Locks can be requested at either Shared or Exclusive levels, allowing efficient and protected access to read-only and read-write memory | |||
Updated: 9, 2005 | Rating: 24 | Author: Tony Cox | Size: 9454 kb | Shareware Go to category: Development > Other Similar programs | |||
36. | Anti Piracy Tools 2004 Professional 2.1 (logicsoftware.net) | ||
OK, or blocks given registration code, returning the reason for code lock-up. This way, it is easy to implement any type of licensing: from single copy usage only to multiple licenses per one registration code. What is actually a brilliant idea is that the client DLL can pass the server query result | |||
Updated: 3, 2005 | Rating: 29 | Author: Logic Software | Size: 845 kb | Shareware Go to category: Development > Other Similar programs | |||
37. | AntiCrack Software Protector Basic 1.09 (anticrack.us) | ||
to create and verify the registration keys and unlock some RSA key locked code,it has embedded cryptor against dump and unpacker. AntiCrack Software Protector also has many anti debug tricks.with specialized API system, mutual communication between loader and application is also can be achieved! AntiCrack Software Protector is designed for such specific tasks as working with | |||
Updated: 9, 2005 | Rating: 535 | Author: Lusi Chen | Size: 1429 kb | Shareware Go to category: Development > Other Similar programs | |||
38. | ASP/VBA/COM ActiveX Dictionary object 1.0 (motobit.com) | ||
to another dictionary object in the same process (Connect method). Lock and Unlock methods to synchronize multithreaded tasks. Items and Keys enumerators. Other functionality Share Application/Session variables in ASP (see ASP - Share application variables sample) Free-threaded hi-speed | |||
Updated: 9, 2005 | Rating: 39 | Author: Antonin Foller | Size: 140 kb | Demo Go to category: Web Development > ASP & PHP Similar programs | |||
39. | Code-Lock 2.35 (chosenbytes.com) | ||
pirates? Stop using your obsolete software protections. Code-Lock, an advanced, secure software protection system, will stop crackers in their tracks. Code-Lock, featuring CodeSecure Technology for Visual Basic, C#, VB.NET and Delphi applications, has never been cracked. It is time to keep crackers awake while you sleep in peace. A lot of shareware are cracked by | |||
Updated: 9, 2005 | Rating: 16 | Author: Ryan Thian | Size: 2721 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
40. | Codelock 2.0 (codelock.co.nz) | ||
protect your scripts with an unlock key for added security, you can lock your scripts to specific domain names or IP addresses AND you can specify an expiry time if you want to. An added feature is that you can choose to encrypt all of your browser HTML output (generated by your PHP scripts). This | |||
Updated: 9, 2005 | Rating: 101 | Author: Vince Edwards | Size: 279 kb | Demo Go to category: Development > Other Similar programs | |||
41. | EXECryptor 2.3.7 (softcomplete.com) | ||
(12-16 characters). A serial number can be time-limited, may be locked to Hardware ID, can contain encrypted registration information such as license type, allowed features and other user defined information. It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely prevents | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
42. | Flash Editor 1.00 (colorpilot.com) | ||
possibilities that are not available when using Macromedia Flash as: locking of main menu and context menu, change of title, change of pictogram, adding midi sound and | |||
Updated: 3, 2005 | Rating: 12666 | Author: Ruben Gurgian | Size: 486 kb | Demo Go to category: Development > Other Similar programs | |||
43. | FlowChart.NET 4.0.3 (nocache.mindfusion.org) | ||
include an alignment grid, shadow effects, scrolling and zooming, locking, z-order and pen styles. Several automatic layout algorithms, link routing and graphs analysis functions make FlowChart.NET even more useful. Diagrams can be stored in files, printed on paper, exported to image files, serialized in .NET streams such as memory buffers or network sockets. The control's | |||
Updated: 2, 2006 | Rating: 54 | Author: MindFusion Ltd. | Size: 4943 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
44. | FlowChartX control 4 (mindfusion.org) | ||
include an alignment grid; shadow effects; scrolling and zooming; locking; z-order; and pen styles. Diagrams can be printed, exported as image files, stored in OLE compound documents or in separate documents. The control's programming model comprises more than 600 methods, properties, and events. Full source code is available for purchase too, giving you unlimited ability to | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 3787 kb | Commercial Go to category: Development > Active X Similar programs | |||
45. | gReg 4.55 (gitanosoftware.com) | ||
out-strips the competition with state-of-the-art encryption that locks out thieves permanently. Smoke your competitors with gReg's advanced customer tracking and technical support history. You and your customer support staff can satisfy every customer quickly and efficiently with our system .Cut your advertising time and costs in half! Use gReg to distribute an evaluation version of | |||
Updated: 9, 2005 | Rating: 0 | Author: Jesus Moreno | Size: 5840 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
46. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
versions of your MS Access application where some functionality is locked and is only unlocked when the user enters a valid key. When using the Installation Serial Number and Unlock Code registration scheme, KeyedAccess pulls information from the end-user's computer hardware to build a Serial Number that requires a specific KeyedAccess-generated Unlock Code. An installation on a | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
47. | LLLib Licensing Library 2.04 (gppsoftware.com) | ||
product numbers, registration numbers, number of concurrent users, locking to a machine and remote registration and unlocking. To date, software products protected by LLLIB have not been cracked by crackers! LLLIB is a library for protecting and controlling the use of your software. Increase registrations by limiting your software to encourage people to register! No longer do you | |||
Updated: 9, 2005 | Rating: 0 | Author: Graham Plowman | Size: 1856 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
48. | MistyGrid 1.0 (mitscom.com) | ||
header styles and colors Sort Show/Hide columns Move columns Lock columns Row headers context sesitive popup menus to access all the functions Multiple cell renderers and editors including JFormattedTextField, Date (including popup Calendar), JProgressBar, JScrollBar, JSpinner, JButton, JCheckBox, Color, JTextField, JRadioButton, JComboBox, etc Copy and paste from Excel | |||
Updated: 3, 2005 | Rating: 82 | Author: M Ghosh | Size: 95 kb | Commercial Go to category: Web Development > Java & JavaScript Similar programs | |||
49. | PC Guard for Win32 5.00 (sofpro.com) | ||
access to your application (EXE/DLL) with password. - Hardware locking! Lock your software to target computer. - Evaluation (trial) version feature! Easily create demo version of your software with execution and date limitations. - Secure distribution! Securely distribute your | |||
Updated: 9, 2005 | Rating: 48 | Author: Blagoje Ceklic | Size: 841 kb | Commercial Go to category: Development > Management & Distribution Similar programs | |||
50. | PE Corrector 1.84 (gigamindsystems.com) | ||
PE Corrector is very useful when you need to correct PE files. Such correction may be very necessary in this cases: - Some compilers do not clear memory before compilation. Because of this the new exe file may contain binary trash in the header. But also it may contain even your personal security data from | |||
Updated: 9, 2005 | Rating: 0 | Author: GigaMind Systems | Size: 630 kb | Shareware Go to category: Development > Source Editors Similar programs | |||
|
Home > Locker software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|