|
||||||
|
||
|
Home > Lock it software |
Related keywords: lock, lock folder, lock files, lock folders, lock desktop, cd lock, Software Lock and Key, g lock, lock file, file lock |
|
|
1. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
emails have become an ever increasing problem, and nowadays it is practically impossible to use email without receiving spam in large amounts. G-Lock SpamCombat is your powerful solution for clearing your Inbox from spam, virus, and junk emails. G-Lock SpamCombat is email filtering software that lets you eliminate all unwanted messages at the server level without | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
2. | Super Utilities 6.25 (superlogix.net) | ||
tools for fixing, speeding up, maintaining, and protecting your PC. It encompasses four suites of utilities: System Cleaner, Privacy Protector, System Maintenance, and Special Utilities. 1.System Cleaner features a spyware-removal component as well as tools for cleaning your disk and Registry, and for performing routine maintenance tasks. 2.Privacy Protector assists in protecting and | |||
Updated: 3, 2006 | Rating: 16 | Author: li jiangnan | Size: 3328 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
3. | Advanced Net Monitor for Classroom 4.4.1 (eduiq.com) | ||
Immediately after the program Net Monitor for Classroom is started, it checks if the program Net Objective connected to a teacher's computer, is running on any of the remote computers. After that, the program displays the windows of all remote computers, where with time (depending on the | |||
Updated: 3, 2006 | Rating: 64 | Author: Damjan Kriznik | Size: 1906 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
4. | QVCS 3.10.6 (qumasoft.com) | ||
is an affordable version control system for the Windows developer. It matches more expensive products in features that are useful to small development teams, and is easy to use and administer. See at a glance which files are checked out, which files have changed since check out, who most recently | |||
Updated: 2, 2006 | Rating: 52 | Author: Jim Voris | Size: 1820 kb | Shareware Go to category: Development > Other Similar programs | |||
5. | QVCS-Pro 3.10.6 (qumasoft.com) | ||
version control system that includes support for IDE integration. It matches more expensive products in features that are useful to small teams, and is easy to use and administer. Integrate with MS VS.Net 2003, MS VC++ and other IDEs. See at a glance which files are checked out, which files have changed since check out, who most recently changed a file, etc. Directory recursion | |||
Updated: 2, 2006 | Rating: 0 | Author: Jim Voris | Size: 1820 kb | Shareware Go to category: Development > Other Similar programs | |||
6. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | EXECryptor 2.3.7 (softcomplete.com) | ||
(12-16 characters). A serial number can be time-limited, may be locked to Hardware ID, can contain encrypted registration information such as license type, allowed features and other user defined information. It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
8. | SQLExecMS 2.6 (laplas-soft.com) | ||
tool for Microsoft® SQL Server DBAs and database developers.It supports MS SQL Server 7, 2000, 2005 and MSDE. Unique all-in-one interface for management, tuning up, development, deployment and data manipulation. Ultimate tool for MSDE developers and administrators. SQLExecMS doesn't require any additional installation, just 'drop and run', that is why it is almost perfect | |||
Updated: 2, 2006 | Rating: 433 | Author: Oleg Dantchenko | Size: 4928 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
9. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even protects them from | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
10. | Hide Window Hotkey 2.5 (elongsoft.com) | ||
to hide the windows, and programs which are running on your screen.It will instantly hide or close all (or some) programs on your screen through Mouse Hotkey or Keyboard Hotkey in order to prevent uninvited persons from seeing them.It will serve you well at your work place or at home. By hiding windows you have the freedom to protect your privacy and hide sensitive information | |||
Updated: 2, 2006 | Rating: 0 | Author: Helen Lin | Size: 885 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
|
Home > Lock it software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|