|
||||||
|
||
|
Home > Protect computer software |
Related keywords: protect, computer, computer security, computer game, Computer, Protect, password protect, protect files, computer software, computer backup |
|
|
291. | EF Duplicate Files Manager 3.21 (efsoftware.com) | ||
paths, files that occupy so unnecessarily storage place on your computer or your server. You can let the program work in several ways. In the simplest case you let the program look for all files of same name. Or you give that only such files are to be specified in the result list, which exhibit additionally the same file size. If necessary, the EF Duplicate Files Manager can analyze | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1854 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
292. | Find Protected 2.0 (aks-labs.com) | ||
Protected designed to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
293. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
if you are really concerned about privacy of your data, there's nothing to stop you from protecting your archives with password and encrypting them. Please be aware that many implementations of encryption algorithms exist on the market. While they all employ the same ideas they don't necessarily have to be binary compatible. Therefore, it may happen that files encrypted by | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
294. | EndTask Pro 2.00.0123 (products.asynchrony.com) | ||
Its design isn't based on a specific browser so it will work on most computers. There is no need to install any proxy servers or plug-ins. The Pro edition includes common features such as a "White list" and the classic "Instant-Blocker". Our task management software, like antivirus and firewall | |||
Updated: 9, 2005 | Rating: 16 | Author: Osama Abdel-Karim | Size: 1507 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
295. | Enforcer 6.2 (posum.com) | ||
consistent, limited selection of services such as public displays or computer labs. It is also great for limiting users to the webpages you approve such as on a VPN or for childproofing individual systems. It is easy to configure and requires little to no modifications to your current system | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1566 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
296. | Evidence Destructor 2.14 (emailarms.com) | ||
you are working on your computer performing the day to day activity like surfing the Internet, paying your bills online and logging into the websites with passwords, your computer is recording most of the steps you take. For example the history of all the web sites you visited, all the pictures | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
297. | Evidence Exterminator 2.14 (softstack.com) | ||
Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information about all your steps: all pictures you have seen, all passwords and bank accounts you use is | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
298. | Evidence Killer 2005 1.0 (securedisk.netfirms.com) | ||
2005 completely eliminates all hidden evidence of activities on your computer and allows you to clean up the history of all activities on your PC. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files history, your temporary files, recycle bin, clean recent documents lists for popular | |||
Updated: 2, 2006 | Rating: 82 | Author: Solution inc | Size: 2060 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
299. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
300. | Eyes Care 1.0 (paqtool.com) | ||
Care is designed for the computer users to protect eyes while using computers, especially for those who usually keep sitting in front of a computer for more than 1 hour. While using computers, either playing games or designing or programming, users are always "forgetting" the time. It is dangerous for us to neglect the damage to health caused by the | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor He | Size: 723 kb | Shareware Go to category: Desktop > Similar programs | |||
|
Home > Protect computer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|