|
||||||
|
||
|
Home > Copy protection software |
Related keywords: copy, protection, data protection, password protection, dvd copy, Copy, Web Page Protection, copy dvd, Protection, file protection |
|
|
221. | Advanced HTMLCoder 3.0 (raysion.com) | ||
the program include encryption of Web pages, implementing password protection to restrict access to the Web resources and disabling certain operations in the browser interface. If your page is intended for private use only, you can encrypt its code (using powerful Blowfish and GOST encryption algorithms) and set the access password. You can also protect the source code of your pages | |||
Updated: 8, 2004 | Rating: 59 | Author: Raysion Software Team | Size: 635 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
222. | Web-Text-Stripper 2.00 (easysoftwareuk.com) | ||
get tied up for hours printing the graphics and if you do a normal copy and paste into your word processor you still get all the colors and font sizes. Solution - Just run Web-Text-Stripper in the background. Copy the web page then paste it into your word processor. All you get is the plain | |||
Updated: 8, 2004 | Rating: 0 | Author: John Turnbull | Size: 1100 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
223. | InfoLock 1.51 (whimsysoft.com) | ||
InfoLock can encrypt file or text(which entered by yourself or copy from clipboard). InfoLock use some very safe arithmetic to encrypt your information.Such as DES, which was put out by IBM and NSA. And InfoLock use special arithmetic to encrypt your text to make sure you can copy or send it by email with out any difficulty. If you want to know more about any | |||
Updated: 8, 2004 | Rating: 101 | Author: Wei Zhang | Size: 692 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
224. | SecurDataStor 5.01 (encryptx.com) | ||
to specify access control rules (e.g., permission to read, write, copy, print or share files) and to set an automatic expiration date for access to the data. The audit trail feature enables users to track the information that was shared, with whom, their permissions, and user names and passwords. This file encryption program supports all primary forms of PC-based information | |||
Updated: 8, 2004 | Rating: 65 | Author: David Duncan | Size: 2673 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
225. | BMS-EmailObserver 5.1 (monitoring-software.co.uk) | ||
After installation on the monitored computer it will invisibly copy all outgoing emails and accurately send them to your secret email address pre-configured by the program Control Panel, no matter which email client software a monitored user might use (either Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar). Full control over outgoing emails. It has a unique | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 631 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
226. | ID_Bank 1.10.021 (rainbow-innov.co.uk) | ||
help solve your problem. ID_Bank is a secure identity and password protection system from Rainbow Innovations. ID_Bank is able to hold your personal information relating to usernames, passwords, pins, login details etc; information you often forget or write on scraps of paper that anyone else can | |||
Updated: 8, 2004 | Rating: 0 | Author: John Hudson | Size: 1694 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
227. | Privacy Master 3.9 (webroot.com) | ||
files where you normally keep them, there is no need to hassle with copying or reorganizing files. Install Privacy Master, and you've created a computer within your computer that only you have access to. Whether it's an outside hacker, or someone sitting at your keyboard, you can rest assured | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
228. | SignIt! for Windows 1.1 (xlreader.com) | ||
1) Sign a JAR file (main function) Objective: ensure integrity (protection) and certification of the file. 2) Create private keys Objective: create a key to be used (or reused) to sign JAR files. 3) Manage private keys Objective: change aliases, passwords, copy/delete entries, ... 3 features: 1) sign a JAR file (main function), 2) create private keys, 3) | |||
Updated: 8, 2004 | Rating: 130 | Author: Robert Della Malva | Size: 21300 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Copy protection software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|