|
||||||
|
||
|
Home > Executable protection software |
Related keywords: protection, data protection, password protection, Web Page Protection, Protection, file protection, spam protection, executable, copy protection, software protection |
|
|
101. | Lockout Desktop Security 1.1.652 (dynamicdesigns.co.uk) | ||
The full-version retail price is £30. Some Of Lockout's Features Hide all control panel applets at the click of a button. Disable or restrict display, network, password, printer & system control panel settings. Hide all drives in 'My Computer' window. Disable any window / program from being displayed. Disable Ctrl + Alt + Delete while in protected | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Wilkinson | Size: 2857 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
102. | DCPP 2.7 (securstar.com) | ||
is an important evolutionary step in the field of transparent data protection. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted, validated algorithm chosen by the National | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
103. | Disk CleanUp 2000 4.6 (gregorybraun.com) | ||
deleted files. Deleting a file will normally just remove the file's directory entry, but the data itself still remains on the disk. CleanUp will completely eliminate the contents of your deleted files. Disk CleanUp provides options to specify an NSA approved disk erasure method and background execution priority. Disk CleanUp works with any FAT16 or FAT32 hard drive, as well as MS | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 721 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
104. | DriveCryptPlusPack 1.0c (securstar.de) | ||
allows you to secure your disk(s)(including removable media) with a powerful and proven encryption algorithm(AES-256) at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
105. | Anti-keylogger 6.1 (anti-keyloggers.com) | ||
for Windows 2000/XP provides every computer with strong protection against most types of the keylogging software, both known and unknown. Anti-keylogger blocks keylogging programs activity without using of signature bases. Anti-keylogger is capable to buck various types of keylogging programs possibly included in any commercial, shareware, freeware products, as well as in | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 2659 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
106. | avast! 4 Professional Edition 4.6.652 (avast.com) | ||
any feature of avast!, prepare and run tasks, store and check task's results. On Access Scanner - special providers to protect: the most of available E-mail clients, Instant Messaging - ICQ, Miranda etc., Network traffic - Intrusion Setection - lightweight firewall, P2P protection | |||
Updated: 9, 2005 | Rating: 280 | Author: ALWIL Software | Size: 9250 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
107. | AWbackup 3.1.0 (awicons.com) | ||
We are now living in the age of digital technologies. We all use computers to work and entertain ourselves on regular basis. And as we use more and more various applications for our purposes we create more and more valuable data. Many of us have already transited to digital media. We store texts | |||
Updated: 9, 2005 | Rating: 0 | Author: Neil Sagitov | Size: 649 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
108. | BackUp32 2.0 (soft-one.com) | ||
line execution, archiving to removable media, archives password protection, .BAK files creation, support for commentaries and descriptions, lists of 'included', 'excluded' and 'excluded from compression' files, fast compression speed, nice interface and many options that affect the resulting archive. Intended for data archiving tasks, using compression algorithm compatible with ZIP | |||
Updated: 9, 2005 | Rating: 0 | Author: Vsevolod Vasilyev | Size: 2663 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
109. | Cleaner 1.1 (softcomplete.com) | ||
It is known, that after deleting files in Windows, they can be restored, since the information on the disk is not deleted, and is marked as free blocks. Cleaner securely deletes file data, located in free disk space. After that the restoring of the information becomes impossible. It is known, that after | |||
Updated: 9, 2005 | Rating: 0 | Size: 153 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
110. | 1st Files Privacy Tool 2.4 (privacywindows.com) | ||
what files on your computer. This program provides three levels of protection to suit any user : 'Hidden', 'Read Only', 'Full Control'. It works with any Windows platforms : 9.x/ME/NT/2000/XP . 1st Files Privacy Tool can work with Network folders and fully supports protection of removable media | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Mihailov | Size: 839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Executable protection software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|