|
||||||
|
||
|
Home > Protect computer software |
Related keywords: protect, computer, computer security, computer game, Computer, Protect, password protect, protect files, computer software, computer backup |
|
|
121. | Access Manager for Windows 6.14 (softstack.com) | ||
keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer use by your kids or employees and loads more. This program can lock your computer and ask for a password when Windows loads. Access Manager for Windows is just the thing for keeping | |||
Updated: 2, 2006 | Rating: 55 | Author: IM Soft | Size: 913 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
122. | Access Boss 2.2 (fspro.net) | ||
should be restricted. To do so, you simply mark the required hour(s) of any day of the week as either "allow" or "deny". You may also specify how long a user can access the computer on a per day basis. Once you apply the changes user access restrictions will take effect. When the user's time is up, Access Boss will log the user off automatically. Access Boss features | |||
Updated: 2, 2006 | Rating: 175 | Author: FSPro Labs | Size: 933 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
123. | 1st Security Agent 6.14 (softheap.com) | ||
Security Agent is an excellent password-protected security utility to secure Windows-based computers. It works under any Windows platform and offers an administrative support for controlling which users are allowed to access your computer and the level of access each user may have. You can choose to restrict access to lots of Control Panel applet functions, including | |||
Updated: 2, 2006 | Rating: 42 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
124. | 1st Evidence Remover 2.14 (getfreefile.com) | ||
easily extracted and used against you by any person with a minimal computer knowledge including your spouse and children, your boss, colleagues and the police. When you delete your files using the Delete command, Windows does not actually delete the files but places them to the hidden RECYCLER folder | |||
Updated: 2, 2006 | Rating: 190 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
125. | 1st Evidence Remover 2.14 (softheap.com) | ||
easily extracted and used against you by any person with a minimal computer knowledge including your spouse and children, your boss, colleagues and the police. When you delete your files using the Delete command, Windows does not actually delete the files but places them to the hidden RECYCLER folder | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
126. | 1st Desktop Guard 1.63 (emailarms.com) | ||
desktop wallpaper and screen saver, secure your public access computers, save, restore, manage and lock desktop layouts. With personal computers becoming part of our lives and everyone in the household using them, it's hard to keep track of the icons that are located on the desktop. Many times, you might want to arrange them differently for different jobs. Moreover in | |||
Updated: 2, 2006 | Rating: 903 | Author: emailarms emailarms | Size: 841 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
127. | 1 Click & Lock 2.83 (softstack.com) | ||
can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from the system tray, log access attempts, and apply a custom background image. When | |||
Updated: 2, 2006 | Rating: 56 | Author: IM Soft | Size: 1338 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
128. | Hot Corners 2.3 (southbaypc.com) | ||
you set. This is particularly useful when you need to leave your computer for a brief period, but don't want anybody to be able to access it. Using Hot Corners, you can turn on your screen saver instantly, and know that your computer is protected while you are away. For people who work in an office environment, where the information on their screen is sensitive and | |||
Updated: 2, 2006 | Rating: 0 | Author: South Bay Software | Size: 185 kb | Shareware Go to category: Desktop > Similar programs | |||
129. | FollowUpXpert Standard 3.2 (xtreeme.com) | ||
"Dear Customer"), HTML messages, email forwarding and more.. Let's suppose you want to create a monthly course on, say, e-mail marketing. The course is to be delivered via email. All you have to do is to simply create the messages containing the course parts. That's it! FollowUpXpert takes it from there. Anyone interested can now subscribe via email. The course material will | |||
Updated: 2, 2006 | Rating: 39 | Author: Xtreeme GmbH | Size: 4042 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
130. | WebCloner Offline Browser 2.5 (productsfoundry.com) | ||
ability to move or change the way saved websites will stay on your computer. Also WebCloner is an offline browser, image viewer with advanced browsing and image editing features, site mapping tool, browser assistant, and e-book compiler. You can export saved website to CD, archive, CHM and into stand | |||
Updated: 2, 2006 | Rating: 0 | Author: Candin Jurca | Size: 3142 kb | Shareware Similar programs | |||
|
Home > Protect computer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|