|
||||||
|
||
|
Home > Prevent deletion software |
Related keywords: prevent, deletion, secure deletion, file deletion, PREVENT HACKERS, prevent internet disconnection, prevent hot linking, prevent access, prevent calls, encrypt prevent |
|
|
181. | Reference for Teachers 6.0 (marinosoftware.com.au) | ||
Reference for Teachers helps teachers write student references by allowing them to select from up to ten variants of up to ten sentences giving 10 billion possible references. The sentences are then merged to form a single reference which includes student, teacher and school names and correct personal | |||
Updated: 9, 2005 | Rating: 0 | Author: Robert Tuck | Size: 2365 kb | Shareware Go to category: Education > Teaching & Training Tools Similar programs | |||
182. | ShareGuard Copy Protection 3.6 (zappersoftware.com) | ||
The ShareGuard Key program that users will buy from you will prevent the ShareGuard Lock program from displaying the demo status form. Typically a user will have to enter a certificate number that you will provide for them. After the certificate is validated the software is unlocked. (3) Locksmith Program allows YOU use to build your lock(s) and key(s). Many different options to | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 11474 kb | Shareware Go to category: Development > Other Similar programs | |||
183. | ShareGuard V1 1 (zappersoftware.com) | ||
The ShareGuard Key program that users will buy from you will prevent the ShareGuard Lock program from displaying the demo status form. Typically a user will have to enter a certificate number that you will provide for them. After the certificate is validated the software is unlocked. (3) Locksmith Program allows YOU use to build your lock(s) and key(s). Many different options to | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
184. | EasySec Firewall SDK 1.10b (effectmatrix.com) | ||
of net neighborhood can manage and control the shared resource, prevent information leaking from local network; Lots kinds of filter rules can achieve your requirement for managing network information.. Using EasySec Firewall SDK to add firewall capabilities to applications that will operate on the internet to ensure that your application is safe from various attacks, and that | |||
Updated: 9, 2005 | Rating: 48 | Author: Hanse wu | Size: 1055 kb | Shareware Go to category: Development > Other Similar programs | |||
185. | gReg 4.55 (gitanosoftware.com) | ||
Allows you to control the number of times the application is used. Prevent users from defeating the locking system when they reset the time or date. Save time and money by delivering an evaluation version that you convert to a full product without the expense or time of shipping a new product. Simply | |||
Updated: 9, 2005 | Rating: 0 | Author: Jesus Moreno | Size: 5840 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
186. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
certain records from unauthorized user access. With LASsie, you can prevent a user from opening specific forms/reports, restrict their ability to update data on a form, disable certain controls, filter certain records, all based on a user’s assigned Security Level. LASsie includes a friendly user | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
187. | ACProtect standard 1.20 (ultraprotect.com) | ||
combine the protect code and the program code more closer and prevent cracker from dump the original program; Embedded Protector - You can specify the place in your application to embed the inner cryptor. With the embedded cryptor, your application can not be cracked even though the cracker know the original entry point (OEP) when rebuilding your Import table. Dynamic | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
188. | Help Desk Software - Service Log for Access 3.1 (icon.co.za) | ||
tools needed to provide the support and attention to detail, that prevents logs from falling between the cracks. Service Log is a multi-user workshop help desk solution, that is affordable, simple to install, and easy to use. Fast, easy help desk call logging, easy help desk call tracking, with the full history of all actions | |||
Updated: 9, 2005 | Rating: 0 | Author: Nic Martens | Size: 10107 kb | Shareware Go to category: Business > Other Similar programs | |||
189. | InfoSafe Plus 3.4.6 (wakefieldsoft.com) | ||
and MORE! Password Protection - Choose your own password to prevent unauthorized access to your data. The password is not stored on the handheld or PC, so no one else will be able to retrieve it. Data Encryption - Records are encrypted with 128 bit encryption for security. Customizable Fields List - Customize the fields list. Change any field name for any record! User Definable | |||
Updated: 9, 2005 | Rating: 16 | Author: Shawn Wakefield | Size: 4687 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
190. | Inquiry Management System 1.1a (enventia.com) | ||
overdue followups, lost inquiries, etc. Over and above you can prevent loss of inquiries by being able to track and act according to the system. Know the performance of your Marketing dept. Saves ample time in gathering details which eventually leads to a cut in expenses. Track media campaigns and and find out which media generates more inquiries as well as the conversion ratio | |||
Updated: 9, 2005 | Rating: 0 | Author: Manish Naik | Size: 7374 kb | Freeware Go to category: Business > Other Similar programs | |||
|
Home > Prevent deletion software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|