|
||||||
|
||
|
Home > File password protect software |
Related keywords: file, password, protect, File, file transfer, file management, Password, file encryption, password manager, file manager |
|
|
221. | StormWindow Me 6.02 (cetussoft.com) | ||
shared Windows Me computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of desktop changes; hiding individual drives in My Computer and Explorer; hiding the Start Menu Settings Folders | |||
Updated: 9, 2005 | Rating: 16 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
222. | StormWindow NT 2.14 (cetussoft.com) | ||
shared Windows NT computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of desktop changes; hiding individual drives in My Computer and Explorer; hiding the Start Menu Settings Folders | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1283 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
223. | StrongSearch 1.3.1 (kraslabs.com) | ||
and prompt their employees to use shared resources, searching for files over LAN becomes an increasingly difficult task. Frequently, people do not remember the exact file names, which results in a horrendous amount of time spent waiting for the search results. Plus there are other issues, like searching through hidden shares, password-protected resources | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey Startsev | Size: 1434 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
224. | Surf Spy 2.10 (bysoft.se) | ||
captures the link (URL) of every visited web site and stores it to a password protected encrypted file. For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal for parents who want to monitor their children while they are | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
225. | System Locker 2.40 (egtsoft.com) | ||
Locker is a handy utility that allows you to protect your personal computer from unauthorized access. You can use System Locker to restrict access to your PC. It's attractive, secure, and very easy to use. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop on system lock and provides an informative message to other | |||
Updated: 9, 2005 | Rating: 0 | Author: Rick Skinner | Size: 863 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
226. | TK8 Safe 2.5 (tk8.com) | ||
Safe is the password manager with features that covers all aspects of storing and using sensitive information. You can keep all user names, passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
227. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
Gold includes Top Secret Chat and Top Secret Journal, along with file and e-mail encryption. Includes the Sentry Spell Checking Engine for spell checking of your e-mail, journal, and chat messages. Conduct an encrypted peer-to-peer, computer to computer, secure chat over the Internet. Maintain an encrypted journal, or diary, of you daily thoughts, ideas, notes, etc. Free for | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
228. | Total Text Security 1.0 (softsphere.com) | ||
directly to the editing window. You can encrypt your message with a password, or with an RSA-key (as used by PGP). Moreover, you can sign you message with the RSA-key, so that your partner can be sure that you and not somebody else sent the message. Total Text Security provides rich easy-to-use | |||
Updated: 9, 2005 | Rating: 0 | Author: Iliahu Rabinovich | Size: 463 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
229. | Tweak Genie 6.0.1 (tweakgenie.com) | ||
very easy to use. Tweak Genie also provides you functionality to password protect the application so that you can restrict its use. See what this program offers: the original Tweak Genie в„ў Pro - unlike other tweaking utilities, Tweak Genie в„ў Pro bundles more than 1000 different utilities in one: it was developed to combine both tweaking and optimizing features to | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 620 kb | Freeware Go to category: System Utilities > System Maintenance Similar programs | |||
230. | Universal Shield 4.0 (everstrike.com) | ||
Software is the ultimate protection tool for your computer - hide files, folders, and drives, and set access rules using flexible security combinations for your most precious data. A unique feature of Universal Shield is the perfect combination of data hiding and encrypting. This feature is very | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > File password protect software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|