|
||||||
|
||
|
Home > Lock computer software |
Related keywords: computer, lock, computer security, computer game, Computer, computer software, computer backup, lock folder, computer games, lock files |
|
|
171. | WindowWatch 1.4.10 (dev4dev.com) | ||
can use to quickly preview the results of their efforts. It locks onto whatever window is currently active on your desktop and lets you manipulate it in a variety of ways, displaying it in various screen resolutions. You can instantly resize a window to any standard desktop size and modify the tool's built-in desktop settings or add several of your own, without altering | |||
Updated: 9, 2005 | Rating: 0 | Author: Kirk Quinbar | Size: 231 kb | Freeware Go to category: Development > Other Similar programs | |||
172. | Secure Image Pro 4.0 (artistscope.com) | ||
the images on your web site and CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
173. | Secure Image Pro 3.0 (artistscope.com) | ||
the images on your web site or CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 5808 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
174. | Secure Image Pro OSX 4.0 (artistscope.com) | ||
the images on your web site or CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 1328 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
175. | AlertMobile Pro 4.0.1 (softsecurity.com) | ||
is a special software for computer security incidents response. It monitors all attempts of unauthorized computer activity, sends SMS alerts to mobile device, receives and handles response commands. Features: - Recording of user logon name, date, time and computer name - Monitoring of active tasks list - Handling of critical programs list - Sending of | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 593 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
176. | Dial-Up Lock Me 2.1 (winutility.com) | ||
Lock Millennium Edition is an Internet security and dial-up (RAS) monitoring software that enables to set user-level security for Internet Dial-Up (RAS) connections. Using Dial-Up Lock Me you can limit and monitor incoming and outgoing traffic, limit and monitor time online and set allowed/denied time periods for selected users on a Windows 95/98/Me. Dial-Up Lock Me | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 765 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
177. | Internet Access Scheduler 2.0 (winutility.com) | ||
based protocols (HTTP, FTP, SMTP, POP3, Telnet, etc.) on a local computer, depending on the time of day and day of the week. You can also set allowed/denied TCP/UDP ports and IP addresses for incoming and outgoing connections. Internet Access Scheduler is completely transparent to users and only authorised users are allowed to set rules. Internet Access Scheduler (IAS) is a firewall | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 784 kb | Demo Go to category: System Utilities > Other Similar programs | |||
178. | 1st Evidence Remover 2.14 (softheap.com) | ||
easily extracted and used against you by any person with a minimal computer knowledge including your spouse and children, your boss, colleagues and the police. When you delete your files using the Delete command, Windows does not actually delete the files but places them to the hidden RECYCLER folder | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
179. | Advanced Security Administrator 10.14 (softheap.com) | ||
your computer and restrict access to Internet with Security Administrator. This nice password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, Printers, System | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
180. | AlertMobile Pro 4.0.1 (softsecurity.com) | ||
is a special software for computer security incidents response. It monitors all attempts of unauthorized computer activity, sends SMS alerts to mobile device, receives and handles response commands. Features: - Recording of user logon name, date, time and computer name - Monitoring of active tasks list - Handling of critical programs list - Sending of | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 593 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
|
Home > Lock computer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|