|
||||||
|
||
|
Home > Protect computer software |
Related keywords: protect, computer, computer security, computer game, Computer, Protect, password protect, protect files, computer software, computer backup |
|
|
261. | Repellent 2.3.04 (easydesksoftware.com) | ||
Repellent also disables the files that run the scripting. Repellent protects you from all scrip viruses and email attachments like PIF SCR REG file that run and infect your computer when you open your email. It even protects you while you surf the | |||
Updated: 9, 2005 | Rating: 0 | Author: Guy Young | Size: 1633 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
262. | SafeLogon 2.0 (gemiscorp.com) | ||
and authentication system. In other words, SafeLogon allows you to protect your system at home and office from unauthorized access. SafeLogon is fully configurable and allows its Administrator to: - Restrict access to Windows to certain users, optionally controlling the days of the week and the time of the day the user is allowed to log on and use the system. - Define temporary users | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 2291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
263. | SafeOffice 1.1 (codetek.com) | ||
Studios SafeOffice™ is a security program that allows you to protect your important data from human attackers and malicious software that take advantage of flaws in common internet applications (web browsers, e-mail clients, instant messengers, etc.). SafeOffice is designed to protect you and your data from attacks in as unintrusive a manner as possible; and to allow | |||
Updated: 9, 2005 | Rating: 0 | Size: 4875 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
264. | Screen Privacy 1.2 (pictures-soft.com) | ||
allows you to hide and restore windows by pressing a secret key. It protects your privacy and prevent your information from being seen by anyone else. Screen Privacy allows you to work calmly and do not worry about uninvited visitors. While your application are hidden, they are still working and you | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Shubin | Size: 851 kb | Shareware Go to category: Desktop > Other Similar programs | |||
265. | SecurDesk! 5.32 (cursorarts.net) | ||
you are responsible for multiple computers in a corporate office, or just need a way to keep novice users from tampering with the system settings, SecurDesk! offers many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide confusing and irrelevant items from selected users, to simplify training tasks | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
266. | Credit Card Knight 1.3 (fspro.net) | ||
Explorer saves the data you have entered into a safe place (Windows Protected Storage). Protected Storage, however, is not so safe and it is possible to read what it keeps. So your credut card data may be accessed by a violator. Credit Card Knight is a security utility scanning your | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 776 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
267. | SecureWallet 1.01 (coolutils.com) | ||
Import are also present. SecureWallet main window displays a list of protected applications and user names. When you open an entry, you can view notes, instruct the program to generate a random password, or display the password. Different sets of passwords can be stored and opened, each with a default | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Buzaev | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
268. | Security Folder 2.0 (everstrike.com) | ||
days computers are everywhere. Reliable and tireless machines replace human beings at dull routine tasks in almost every area. Each day we tend to rely more and more on electronics as storage media and information processing and distribution systems. A decade ago, our puny hard drives contained hardly a couple of thousands of files. Today, our massive hard drives contain dozens and | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
269. | Security Task Manager 1.6f (neuber.com) | ||
detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The security risk rating is based on an analysis that takes different aspects of the process into consideration, and indicates the likelihood of the process being | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
270. | SerialIP Utilities 1.3 (fogsoft.com) | ||
SerialIP Utilities can transfer the data from COM-ports of local computer to COM-ports of remote computers using TCP/IP and save received data on a disk of local or remote computer. The basic features of SerialIP Utilities: 1. Grant a remote access to any COM-port equipments across Internet, LAN or any TCP/IP connections. 2. Save information received from serial | |||
Updated: 9, 2005 | Rating: 0 | Author: Paul Lashin | Size: 1271 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Protect computer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|