|
||||||
|
||
|
Home > Restriction software |
|
|
121. | Security Administrator 10.14 (getfreefile.com) | ||
security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your desktop. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, etc. You can disable your boot keys, context menus, DOS windows, Registry editing, and network access. Hide your | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
122. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
123. | Folder Security Personal 3.5 (y0ys.com) | ||
Folder Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only ,preventing modification or deletion by other users or programs. The program can also lock Floppy, CDrom, USB sticks, and other removable drives or make | |||
Updated: 2, 2006 | Rating: 666 | Author: Y0YS Software | Size: 803 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
124. | FlowChart.NET 4.0.3 (mindfusion.org) | ||
streams such as memory buffers or network sockets. The control's programming model comprises more than 500 methods, properties, and events. Full source code is available for purchase too, giving you unlimited ability to customize the control. The FlowChart.NET component adds to applications the ability to create and present workflow, flowchart and process diagrams, database | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 4943 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
125. | SafeSystem 2006 (gemiscorp.com) | ||
SafeSystem allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. It can make your files and folders completely invisible, inaccessible or simply read-only and prevent the change of configuration and | |||
Updated: 2, 2006 | Rating: 0 | Author: GemiScorp | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
126. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
RBackup Remote Backup is the premier Online Backup and Restore system containing a full-featured Client and a powerful online backup Server. Designed for use by commercial Remote Backup services. Easily branded. RBackup replaces troublesome tape drives and forgetful computer users, operating unattended and | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
127. | Quicknote 5.2 (jens.metz-furniere.de) | ||
Often you do not need an advanced text processor but a virtual scrapbook to write down an occasional thought, a plan for the day or an Internet URL. With a plain text editor, which can be used for this purpose, you have to run the program first, then create a new file, then type a line or two and save the | |||
Updated: 2, 2006 | Rating: 16 | Author: Jens Mьller | Size: 2086 kb | Freeware Go to category: Business > Other Similar programs | |||
128. | Access Administrator 4.14 (getfreefile.com) | ||
protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user "Admin" has | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
129. | PDF reDirect 2.1 (exp-systems.com) | ||
reDirect is a fast, free, and easy-to-use PDF Creator. It has no restrictions, no watermarks, no spyware, no adware and no pop-up advertisements. Features include basic encryption and full merging. Version 2.1 adds: a live preview of the PDF being created, PDF file size optimization, viewing style settings and compatibility with Windows Terminal Services. PDF reDirect is a fast, free | |||
Updated: 2, 2006 | Rating: 0 | Author: Michel Korwin-Szymanowski | Size: 5376 kb | Freeware Go to category: Business > Other Similar programs | |||
130. | PC LockUp 2.185 (softheap.com) | ||
PC LockUp is a computer security software, which enables you to apply password protection to Windows and restrict others from being able to use your PC while you are away. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and shows a | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Restriction software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|