|
||||||
|
||
|
Home > Lock drives software |
Related keywords: lock, drives, lock folder, lock files, lock folders, lock desktop, cd lock, Software Lock and Key, g lock, lock file |
|
|
21. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
You have got an ability to hide your desktop icons, individual drives, Start menu items and the taskbar features, it enables you to stop others from tampering with your desktop. If you set up the special list of allowed applications nobody will run unwanted programs. The powerful feature 'User Working Time' allows you to limit working time for your children , office colleagues | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
22. | 1st Security Administrator 10.14 (softheap.com) | ||
editing, Internet and Network access. Hide desktop icons, individual drives, Start Menu items, taskbar, task manager, tray icons. Apply password protection to Windows and restrict users to running applications. Control Internet Usage, spy on PC users. Security restrictions can be applied universally or | |||
Updated: 2, 2006 | Rating: 432 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
23. | 1st Security Administrator Pro 10.14 (softheap.com) | ||
editing, Internet and Network access. Hide desktop icons, individual drives, Start Menu items, taskbar, task manager, tray icons. Apply password protection to Windows and restrict users to running applications. Control Internet Usage, spy on PC users. Security restrictions can be applied universally or | |||
Updated: 2, 2006 | Rating: 222 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
24. | 1st Security Agent 6.14 (softheap.com) | ||
you can: disable Start Menu items, hide local and network drives, disable the DOS prompt, boot keys, real DOS mode, Registry editing, taskbar, task manager, and network access, hide desktop icons, and much more. You can apply password protection to Windows and restrict users to running specific applications only. Security restrictions can be applied universally or just to | |||
Updated: 2, 2006 | Rating: 42 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
25. | 1st Security Agent Pro 6.14 (softheap.com) | ||
My Documents, etc. Disable Start Menu items, hide local and network drives, disable the DOS prompt, boot keys, DOS mode, Registry editing, taskbar, task manager, and network access, hide desktop icons, apply password protection to Windows and restrict users to running applications. Due to support of | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
26. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
You have got an ability to hide your desktop icons, individual drives, Start menu items and the taskbar features, it enables you to stop others from tampering with your desktop. If you set up the special list of allowed applications nobody will run unwanted programs. The powerful feature "User Working Time" allows you to limit working time for your children , office colleagues | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
27. | 2002 CD Eject 2.5 (fomine.com) | ||
CD Eject is a utility that manages your CD ROM drive doors. It allows you to open and close the CD ROM door by using a hotkey, desktop shortcut, or via an icon in your system tray. It will automatically close the door within a couple of seconds if you have chosen the action "Get CD". The program creates a separate icon in your system tray for each CD ROM drive, so you can | |||
Updated: 9, 2005 | Rating: 359 | Author: Vitali Fomine | Size: 639 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
28. | StrongDisk Pro 2.9 (strongdisk.de) | ||
your Windows system. With such disks you can work as with usual hard drive- The main difference is that all data written to the disk is encrypted "on fly", while the content of the protected disk is stored in common file with arbitrary name. In order to access existing protected disk user must enter password, which is specified during disk creation, and/or insert electronic key or | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
29. | Access Administrator Pro 4.14 (getfreefile.com) | ||
media: in protecting your files, it just uses a high-reliability VXD driver working at Windows kernel level. This guarantees that Access Administrator Pro will never lose your data. Controls access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
30. | Access Administrator Pro 4.14 (softheap.com) | ||
media: in protecting your files, it just uses a high-reliability VXD driver working at Windows kernel level. This guarantees that Access Administrator Pro will never lose your data. Controls access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Lock drives software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|