|
||||||
|
||
|
Home > Search password protected software |
Related keywords: password, search, Search, search engine, Password, password manager, search and replace, password protection, search engines, search engine optimization |
|
|
21. | Hide Files & Folders 2.4 (softstack.com) | ||
Files & Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
22. | File & Folder Protector 2.33 (softheap.com) | ||
Protect Files and Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 740 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
23. | Evidence Exterminator 2.14 (softstack.com) | ||
Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
24. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
Protect your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
25. | cPWD 2.6 (absolutedynamics.com) | ||
powerful Information Security Management tool that will protect the local administrator account across the network. Search Active Directory. Target multiple Administrator accounts based on the Security Identifier Descriptor (SID). Dynamically generate and apply C2-Compliant random | |||
Updated: 2, 2006 | Rating: 0 | Author: Donnie Byerley | Size: 725 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
26. | Broken Cross Disk Manager 3.81 (broken-cross.com) | ||
thumbnail or other information, to identify them more easily. Add password-protection to protect items in your database. To search for files, you can open multiple search dialogs with options for date, size and categories. The fast search function supports as well wildcards. Once you found a file, you can open or copy it directly from within the program | |||
Updated: 2, 2006 | Rating: 0 | Author: Kevin Fucik | Size: 893 kb | Shareware Similar programs | |||
27. | Broken Cross Disk Manager 3.81 (bcdm.broken-cross.com) | ||
thumbnail or other information, to identify them more easily. Add password-protection to protect items in your database. To search for files, you can open multiple search dialogs with options for date, size and categories. The fast search function supports as well wildcards. Once you found a file, you can open or copy it directly from within the program | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin Fucik | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
28. | Access Administrator Pro 4.14 (getfreefile.com) | ||
certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives you a lot of abilities to allocate access to your files and folders between your users according to predefined schedules. It means that each user has his own list of allowed and disallowed files and folders within certain time periods. The program does not modify your | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
29. | Access Administrator Pro 4.14 (softheap.com) | ||
certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives you a lot of abilities to allocate access to your files and folders between your users according to predefined schedules. It means that each user has his own list of allowed and disallowed files and folders within certain time periods. The program does not modify your | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
30. | Accent EXCEL Password Recovery 2.40 (passwordrecoverytools.com) | ||
a password to an MS Excel workbook? Lost passwords for modifying sheets in an MS Excel workbook? Accent EXCEL Password Recovery will break the passwords and allow you to access your documents again! Passwords to workbook sheets are found almost instantly. They may differ from the original passwords, but they will be valid. To reduce the time of | |||
Updated: 2, 2006 | Rating: 1000 | Author: Denis Gladysh | Size: 734 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Search password protected software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|