|
||||||
|
||
|
Home > Copy protected software |
Related keywords: copy, dvd copy, Copy, copy dvd, copy protection, password protected, Copy Protection, DVD copy, COPY, file copy |
|
|
121. | EldoS KeyLord 4.0 (eldos.org) | ||
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
122. | Encrypt PDF Command Line 2.1 (toppdf.com) | ||
this password will restrict you based on how the PDF was password protected (printing may be disabled, for instance). Encrypt PDF software allows you to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) existing | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 34 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
123. | Find Protected 2.0 (aks-labs.com) | ||
Protected designed to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
124. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
125. | Filzip 3.04 (filzip.com) | ||
(AES) is also supported in Filzip 3.0. You can rename, move copy or delete archives within Filzip. Zipping features: add, delete, view, open files from an archive, view & edit the zip comment, password protect zip files, test files while extracting, automatic installation of archives. For visualization, Filzip supports printing of the archive listings to html, txt or | |||
Updated: 9, 2005 | Rating: 16 | Author: Philipp Engel | Size: 1199 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
126. | Lock Ness 3.1 (folder-lock-ness.com) | ||
Ness is security software to password protect and lock folders against unwanted access. Lock Ness will both secure your folders against accidental deletion and prevent other users from copying them. The folder can be locked or unlocked simply by right-clicking on it within Windows Explorer. The folder remains protected should your PC be rebooted into Windows Safe Mode | |||
Updated: 9, 2005 | Rating: 82 | Author: Arthur Wagner | Size: 770 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
127. | Folder Password Expert 2.1 (folder-password-expert.com) | ||
people from viewing, printing, or altering them. The folder can be protected simply by right-clicking on it within Windows Explorer. Folder Password Expert will both secure your folders against accidental deletion and prevent other users from copying them. The folder remains protected should your PC be rebooted into Windows Safe Mode, DOS or another operating system | |||
Updated: 9, 2005 | Rating: 0 | Author: Olaf Laturner | Size: 846 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
128. | Folder Protection 2.1 (folder-protection.com) | ||
to prevent people from viewing, printing, or altering them. You can protect folders located on your hard drive, as well as on external USB and removable drives. If the drive is connected to another PC, your folders still remain protected. Folder Protection is ideal for notebooks. Prevent | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Cadwallen | Size: 786 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
129. | DCPP 2.7 (securstar.com) | ||
that may be used by U.S. Government organizations (and others) to protect sensitive information. DCPP is automatic and completely transparent to the user. Not only does this decrease user involvement and training requirements, but also it creates the foundation for enforceable security. The careful integration of boot protection and automatic encryption provides a high degree of | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
130. | DiskArcher Backup Utility 2.11 (diskarcher.mastak.com) | ||
backup. DiskArcher knows how to do it! DiskArcher makes several copies of each selected file and stores these copies in different places to protect your data from accidents. DiskArcher updates copies when you change your files. DiskArcher helps you to find files on your disks | |||
Updated: 9, 2005 | Rating: 16 | Size: 298 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Copy protected software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|