|
||||||
|
||
|
Home > Accessible software |
Related keywords: accessible game |
|
|
121. | ProtectZ 1.60 (actualsecurity.com) | ||
is a security utility for personal and public accessible computers. This software-only solution enables you to restrict access to any non-virtual folders and files, to edit a lot of different system policies of Windows 95/98/Me. ProtectZ enables you to make files and folders invisible or "read-only", to make them undeletable, to forbid rename them, to make them | |||
Updated: 8, 2004 | Rating: 723 | Author: Konstantin Evseenko | Size: 574 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
122. | ProUpdater 5.00.03 (openwindow.com) | ||
and manipulation tasks, but its easy-to-use interface makes it an accessible tool for the average user as well. ProUpdater can be configured to perform backup operations, directory re-alignment operations, general multi-computer "house-cleaning" and a host of other tasks requiring efficient operation on files based on their names, extensions, sizes, ages and attributes. Most | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Bryant | Size: 583 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
123. | R-Linux 1.0 (r-tt.com) | ||
Recovered files can be saved on any (including network) disks accessible by the host operating system. R-Linux is a data recovery and undelete tool for Ext2FS (Linux) file system. File recovery after power failure, system crash, virus infection or partition with the files was reformatted, even for different file | |||
Updated: 9, 2005 | Rating: 743 | Size: 1382 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
124. | R-Undelete 2.0 (r-tt.com) | ||
Explorer shell and all undelete and file recovery functions are accessible from Windows Explorer. R-Undelete Demo version can be registered/activated on the fly without program exit or reinstallation. R-Undelete is file recovery and undelete tool for FAT, NTFS file systems. It recovers files on local logical disks when files were: removed without Recycle Bin; removed by virus | |||
Updated: 9, 2005 | Rating: 477 | Size: 942 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
125. | SafeHouse Hard Drive Encryption 2.10 (pcdynamics.com) | ||
volumes require password authentication before the files become accessible. SafeHouse provides transparent on-the-fly hard drive encryption for your PC. Using SafeHouse, you can allocate portions of your existing hard drives to be reserved for encrypted data. SafeHouse appears to Windows as another drive | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Avritch | Size: 1972 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
126. | Search and Recover 3.0d (iolo.com) | ||
image file, and your original drive or disk with all data intact is accessible in Windows. Use disk images as the ultimate backup tool: all data, including lost, deleted, or damaged data is backed up and ready to use at any time. - Works with all operating systems, devices, and formats, including | |||
Updated: 2, 2006 | Rating: 35 | Author: iolo technologies | Size: 4607 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
127. | Secure Password Store 0.91 (lmphotonics.com) | ||
- Multiple databases - Encrypted database file that is only accessible by a user specified password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number, Registered To, Password, Date, Web address, Supplier, and Comment fields. - "Registered To" and "Password" fields are encrypted | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 627 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
128. | Super Password Guard 3.1 (topaim.net) | ||
similar to Windows Explorer. 2. Encrypted password database files, accessible only via user selectable master password (for enhanced security, master password is used as encryption/decryption key only and is not stored anywhere). You can also assign a short master password hint text so if you | |||
Updated: 3, 2005 | Rating: 48 | Author: Cheng Zheng | Size: 2000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
129. | SyncBack 3.2.7.0 (mjleaver.com) | ||
A comprehensive context sensitive help file provides easily accessible instructions and guidance about all aspects of using SyncBack. Simply click a help button at the bottom of the window you happen to have open, and you'll get taken straight to the help page for that task. In addition an extensive Frequently Asked Questions section provides all the answers you're likely to ask | |||
Updated: 9, 2005 | Rating: 229 | Author: Michael Leaver | Size: 1948 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
130. | System Cleaner 4.94f (oxisoft.com) | ||
the information contained in your Index.dat file which is not accessible through Windows. - Speed up general system performance In addition to occupying valuable space, all this garbage also slows down your system - running Windows when it's so clogged up is a little like trying to drive down a road full of rocks and potholes. System Cleaner seeks out all this garbage and | |||
Updated: 9, 2005 | Rating: 0 | Author: Steven Martins | Size: 1300 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
|
Home > Accessible software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|