|
||||||
|
||
|
Home > How to lock software |
Related keywords: lock, lock folder, lock files, lock folders, lock desktop, cd lock, Software Lock and Key, g lock, lock file, file lock |
|
|
1. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
ever increasing problem, and nowadays it is practically impossible to use email without receiving spam in large amounts. G-Lock SpamCombat is your powerful solution for clearing your Inbox from spam, virus, and junk emails. G-Lock SpamCombat is email filtering software that lets you | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
2. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
what they can do and when they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to your personal computer. It offers | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
3. | WinLock Professional 4.32 (crystaloffice.com) | ||
sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with Windows and allows you to add an optional startup | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 1628 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
4. | WinLock 4.32 (crystaloffice.com) | ||
sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with Windows and allows you to add an optional startup | |||
Updated: 2, 2006 | Rating: 280 | Author: Denis Zolotov | Size: 1550 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
5. | Windows Security Officer 6.8.1.1 (mybestsoft.com) | ||
what they can do and when they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to your personal computer. It offers | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
6. | Evidence Exterminator 2.14 (softstack.com) | ||
Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
7. | DUST 1.2 (WayBeyondUK.com) | ||
Direct User Switching Task allows you to switch to another logged on session using a chosen hot key combination just like you use Alt+Tab to switch tasks. This does not involve going to the Windows XP welcome screen and with password saving and automatic logon makes it very quick | |||
Updated: 2, 2006 | Rating: 0 | Author: Nicholas Russell | Size: 1436 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
8. | Server Nanny Network Monitor 4.0.0 (ServerNanny.com) | ||
downtime and be the first to know when a server or network device fails by using Server Nanny network and server monitoring software. The last time you had a network or server failure how long was it before the problem was discovered? Minutes? Hours? Maybe even days? Use Server Nanny to recover from failures much faster. Don't wait for employees or customers | |||
Updated: 2, 2006 | Rating: 0 | Author: Xenos Software LLC | Size: 5575 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
9. | Private Shell SSH Client 2.1 (privateshell.com) | ||
Shell is an easy to configure SSH client for Windows. Autoconfiguration wizard helps you to setup basic and advanced SSH sessions. Even if you are not familiar with SSH, you can easily establish connections that use public key authentication and provide ssh tunneling for third-party applications (such as Oracle, MySQL, CVS, VNC, e-mal clients and other software) | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
10. | G-Lock Email Processor 1.98 (glocksoft.com) | ||
Processor is a powerful tool designed to automatically process/parse incoming Internet email such as bounced/undeliverable messages, subscribe/unsubscribe requests, etc. The program is easy to use and provides a wide range of features to process email you receive, automatically extract data and perform other actions based on the message content. Email Processor can work | |||
Updated: 2, 2006 | Rating: 119 | Author: Alex Markov | Size: 2601 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > How to lock software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|