|
||||||
|
||
|
Home > Restricted software |
Related keywords: restricted browser |
|
|
121. | Security Administrator 10.14 (getfreefile.com) | ||
Restrict access to your PC with Security Administrator. This password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your desktop. You can deny access to each individual component of several Control Panel | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
122. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Cypherix's Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
123. | Folder Security Personal 3.5 (y0ys.com) | ||
lock folders and files. You can choose to hide them completely or restrict access by making them read-only ,preventing modification or deletion by other users or programs. The program can also lock Floppy, CDrom, USB sticks, and other removable drives or make them read-only. It works with drive of all | |||
Updated: 2, 2006 | Rating: 666 | Author: Y0YS Software | Size: 803 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
124. | FlowChart.NET 4.0.3 (mindfusion.org) | ||
FlowChart.NET adds to applications the ability to create and present various kinds of diagrams: - flowchart and process diagrams - workflow and data flow charts - database entity-relationship diagrams - organizational and classification charts - hierarchy and relationship diagrams - networks and | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 4943 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
125. | SafeSystem 2006 (gemiscorp.com) | ||
and system folders) from being altered, renamed or removed. - Restrict access to some or all applets in Control Panel, thus preventing users from changing your system configuration (e.g., Display and Date/Time settings). - Prevent users from running or installing unauthorized programs from floppy disk, CD-ROM and DVD-ROM drives. - Prevent users from copying programs or other files | |||
Updated: 2, 2006 | Rating: 0 | Author: GemiScorp | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
126. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
RBackup Remote Backup is the premier Online Backup and Restore system containing a full-featured Client and a powerful online backup Server. Designed for use by commercial Remote Backup services. Easily branded. RBackup replaces troublesome tape drives and forgetful computer users, operating unattended and | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
127. | Quicknote 5.2 (jens.metz-furniere.de) | ||
Often you do not need an advanced text processor but a virtual scrapbook to write down an occasional thought, a plan for the day or an Internet URL. With a plain text editor, which can be used for this purpose, you have to run the program first, then create a new file, then type a line or two and save the | |||
Updated: 2, 2006 | Rating: 16 | Author: Jens Mьller | Size: 2086 kb | Freeware Go to category: Business > Other Similar programs | |||
128. | Access Administrator 4.14 (getfreefile.com) | ||
your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
129. | PDF reDirect 2.1 (exp-systems.com) | ||
PDF reDirect is a fast, free, and easy-to-use PDF Creator. It has no restrictions, no watermarks, no spyware, no adware and no pop-up advertisements. Features include basic encryption and full merging. Version 2.1 adds: a live preview of the PDF being created, PDF file size optimization, viewing style | |||
Updated: 2, 2006 | Rating: 0 | Author: Michel Korwin-Szymanowski | Size: 5376 kb | Freeware Go to category: Business > Other Similar programs | |||
130. | PC LockUp 2.185 (softheap.com) | ||
which enables you to apply password protection to Windows and restrict others from being able to use your PC while you are away. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and shows a picture, which you can change in the options. An allowed time schedule and duration can be defined for each user to | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Restricted software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|