PcExplorer 2.3
Faster file and network working environment
Keyboard Collector 2.07b
Secretly record and view all keys typed on your pc while you are away, including chat sessions, passwords, email, and more.
 
   
   
     
Example:  KaZaA
 
• New       • TOP       • Most popular       • All soft       • Advertising       • Add program       • Support       • Link to us       • About       • Board      
audio & multimedia  business  communications  desktop  development  education  games & entertainment  graphics apps  home & hobby  network & internet  security & privacy  servers  system utilities  web development  A B C D E F G I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9

Home > Protect computer software

Related keywords: protect, computer, computer security, computer game, Computer, Protect, password protect, protect files, computer software, computer backup

Home
Software
New soft
TOP-10
Best 1000
All Soft
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

Number of references on page:10 | 20 | 30 | 50 | 100
Language: Any | English | German | French | Italian | Japanese | Portuguese | Spanish
License: Any | Freeware | Shareware | Demo | Adware | Commercial | Data Only
Installation: Any | Install and Uninstall | Install Only | No Install Support | Uninstall Only
Operational system: Any | Windows 95 | 98 | ME | NT | 2000 | XP | CE | Unix | Palm | Mac


Search result:
programs found: 550.

291.EF Duplicate Files Manager 3.21 (efsoftware.com) free  EF Duplicate Files Manager download
paths, files that occupy so unnecessarily storage place on your computer or your server. You can let the program work in several ways. In the simplest case you let the program look for all files of same name. Or you give that only such files are to be specified in the result list, which exhibit additionally the same file size. If necessary, the EF Duplicate Files Manager can analyze…
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1854 kb | Shareware
Go to category: System Utilities > File & Disk Management
Similar programs
292.Find Protected 2.0 (aks-labs.com) free  Find <b>Protected</b> download
Protected designed to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware
Go to category: Network & Internet > Search/Lookup Tools
Similar programs
293.Encryption Workshop 3.0 (encryption-workshop.com) free  Encryption Workshop download
if you are really concerned about privacy of your data, there's nothing to stop you from protecting your archives with password and encrypting them. Please be aware that many implementations of encryption algorithms exist on the market. While they all employ the same ideas they don't necessarily have to be binary compatible. Therefore, it may happen that files encrypted by…
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware
Go to category: Security & Privacy > Encryption Tools
Similar programs
294.EndTask Pro 2.00.0123 (products.asynchrony.com) free  EndTask Pro download
Its design isn't based on a specific browser so it will work on most computers. There is no need to install any proxy servers or plug-ins. The Pro edition includes common features such as a "White list" and the classic "Instant-Blocker". Our task management software, like antivirus and firewall…
Updated: 9, 2005 | Rating: 16 | Author: Osama Abdel-Karim | Size: 1507 kb | Shareware
Go to category: System Utilities > Launchers & Task Managers
Similar programs
295.Enforcer 6.2 (posum.com) free  Enforcer download
consistent, limited selection of services such as public displays or computer labs. It is also great for limiting users to the webpages you approve such as on a VPN or for childproofing individual systems. It is easy to configure and requires little to no modifications to your current system…
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1566 kb | Shareware
Go to category: System Utilities > Other
Similar programs
296.Evidence Destructor 2.14 (emailarms.com) free  Evidence Destructor download
you are working on your computer performing the day to day activity like surfing the Internet, paying your bills online and logging into the websites with passwords, your computer is recording most of the steps you take. For example the history of all the web sites you visited, all the pictures…
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware
Go to category: System Utilities > Other
Similar programs
297.Evidence Exterminator 2.14 (softstack.com) free  Evidence Exterminator download
Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information about all your steps: all pictures you have seen, all passwords and bank accounts you use is…
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware
Go to category: System Utilities > File & Disk Management
Similar programs
298.Evidence Killer 2005 1.0 (securedisk.netfirms.com) free  Evidence Killer 2005 download
2005 completely eliminates all hidden evidence of activities on your computer and allows you to clean up the history of all activities on your PC. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files history, your temporary files, recycle bin, clean recent documents lists for popular…
Updated: 2, 2006 | Rating: 82 | Author: Solution inc | Size: 2060 kb | Shareware
Go to category: Security & Privacy > Other
Similar programs
299.Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) free  Exp USB Virtual Driver (EUSBVD) download
of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial
Go to category: Network & Internet > Remote Computing
Similar programs
300.Eyes Care 1.0 (paqtool.com) free  Eyes Care download
Care is designed for the computer users to protect eyes while using computers, especially for those who usually keep sitting in front of a computer for more than 1 hour. While using computers, either playing games or designing or programming, users are always "forgetting" the time. It is dangerous for us to neglect the damage to health caused by the…
Updated: 9, 2005 | Rating: 0 | Author: Victor He | Size: 723 kb | Shareware
Go to category: Desktop >
Similar programs

Sort programs by: relevance | date | alphabet | popularity
Result Page: « Previous | | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | Next »


404 Not Found

404 Not Found


nginx

Home > Protect computer software

Cresotech Convert-It for Palm 2.0
Cresotech CONVERT-IT for Palm is a convenient Palm based tool to convert different measuring system units into each other, and much more!
Youtube Movie to Mobile Phone Value 2.2.06
It's most popular and very easy to use YouTube tools. helps you Fast download, convert, play, manage your favorite YouTube videos. If…
Mosaic 1.4
Mosaic is a puzzle game, with different playing modes and various skill levels. They all are united by common interface and idea - the goal…

Copyright © 2004 - 2010 allworldsoft.com Contact Page