|
||||||
|
||
|
Home > Unauthorized access software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access, last access |
|
|
201. | IntraChat 2.0 (intrachat.com) | ||
networks. It does not require a dedicated server or Internet access and can be used by anybody. Download your free trial version | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey Haidukov | Size: 676 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
202. | JustUrls 5.2 (easterndigitalsoftware.com) | ||
JustUrls is a Web Page or URL 'launching' program. The program is designed to get you to your favorite URL's easily and quickly without any fuss. JustUrls launches your default browser and automatically inserts the URL you have associated with a button you click on. JustUrls assumes you have a Web | |||
Updated: 9, 2005 | Rating: 0 | Author: Ken | Size: 1726 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
203. | Lock Folder 5.0 (realclicks.com) | ||
and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
204. | DVD and CD Cover Print 3.3.0 (northcardinal.com) | ||
DVD and CD Cover Print allows you to print your CD and DVD cover art easily and accurately. This software tool allows the user to load CD or DVD cover art and print it to standard size specifications or user defined specifications. This is an easy and quick way for the user to printout DVD or CD covers that | |||
Updated: 9, 2005 | Rating: 163 | Author: North Cardinal Software | Size: 5633 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
205. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your private files and e-mail messages, and all your other sensitive documents can easily fall into the wrong hands. East-Tec FormatSecure 2005, in | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
206. | Find Protected 2.0 (aks-labs.com) | ||
This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT administrators can do a deep inspection of employees' files to enforce an intelligent data security policy across | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
207. | File Monster 2.6.7 (nstarsolutions.com) | ||
information in those files something you want just anyone to have access to? # When you leave your office at night, just who has access to your computer? # Do you trust that neighbor that comes over to your house to use or fix your computer? How about your roommate? # Do you trust the people | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
208. | Folder Guard Professional 7.5 (winability.com) | ||
Guard is a Windows security program which you can use to restrict access to files, folders, and other computer resources. If you share your computer with your business colleagues, family, or roommates, you can use Folder Guard to stop other users from opening your personal files, or even completely | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrei Belogortseff | Size: 1235 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
209. | Folder Shield 2003 1.3 (baxbex.com) | ||
will be hidden and your sensitive data will be protected against unauthorized access. As Folder Shield operates on a driver basis and does not modify or encrypt the data, even huge quantities of data can be concealed quick as a flash with Folder Shield. With the appropriate configuration settings, a hot key (combination of keys) is sufficient to make the selected data | |||
Updated: 9, 2005 | Rating: 0 | Author: Carsten Paasch | Size: 1269 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
210. | FolderAccess 2.0 (lockfolder.net) | ||
and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
|
Home > Unauthorized access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|