|
||||||
|
||
|
Home > Protect passwords software |
Related keywords: protect, passwords, Protect, Passwords, password protect, protect files, protect folders, protect folder, protect privacy, protect file |
|
|
301. | StormWindow XP 7.01 (cetussoft.com) | ||
or a network manager, or a parent. Access to StormWindow is password protected. Cetus StormWindow [TM] for Windows XP will allow the authorized user to add several types and degrees of security to the desktop and system of any shared Windows XP | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1375 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
302. | StrongSearch 1.3.1 (kraslabs.com) | ||
Plus there are other issues, like searching through hidden shares, password-protected resources, processing files in different languages and so on and so forth. Does your current search utility work the way you want it to?.. Then you probably should consider something completely different. StrongSearch is an effective and flexible LAN file search utility that produces exact | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey Startsev | Size: 1434 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
303. | SuperSecret 1.0 (madlogic.com) | ||
provides secure storage for all of your logins and passwords so that you only have one password to remember from now on. SuperSecret supports multiple users on the same computer using different SuperSecret login names so that you can keep your passwords private even if you share a computer with others at work or home. Only one password is required to use | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Anton | Size: 139 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
304. | Surf Spy 2.10 (bysoft.se) | ||
captures the link (URL) of every visited web site and stores it to a password protected encrypted file. For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal for parents who want to monitor their children while they are away. In the | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
305. | System Locker 2.40 (egtsoft.com) | ||
Locker is a handy utility that allows you to protect your personal computer from unauthorized access. You can use System Locker to restrict access to your PC. It's attractive, secure, and very easy to use. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop on system lock and provides an informative message to other | |||
Updated: 9, 2005 | Rating: 0 | Author: Rick Skinner | Size: 863 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
306. | Task Lock 6.2 (posum.com) | ||
Lock provides a simple and effective way to password protect specified applications for Windows no matter how they are executed. Its security is easy to configure and requires little to no modifications to your current system configuration. Administrator functions are enabled for site licenses. Task Lock provides simple and effective password security for specified | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1232 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
307. | TK8 Safe 2.5 (tk8.com) | ||
Safe is the password manager with features that covers all aspects of storing and using sensitive information. You can keep all user names, passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not only stores your information, but helps you to use it. A fast and | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
308. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
messages and journal entries. Use the Virtual Keyboard that protects against keyboard logging and password sniffing programs to enter your passwords and pass phrases. Top Secret Crypto Gold includes RSA Key Creation, Public and Secret Key Ring Management procedures, data compression procedures, e-mail and file encryption procedures, One Time Pad Key File and | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
309. | Total Text Security 1.0 (softsphere.com) | ||
directly to the editing window. You can encrypt your message with a password, or with an RSA-key (as used by PGP). Moreover, you can sign you message with the RSA-key, so that your partner can be sure that you and not somebody else sent the message. Total Text Security provides rich easy-to-use | |||
Updated: 9, 2005 | Rating: 0 | Author: Iliahu Rabinovich | Size: 463 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
310. | Tweak Genie 6.0.1 (tweakgenie.com) | ||
very easy to use. Tweak Genie also provides you functionality to password protect the application so that you can restrict its use. See what this program offers: the original Tweak Genie в„ў Pro - unlike other tweaking utilities, Tweak Genie в„ў Pro bundles more than 1000 different utilities in one: it was developed to combine both tweaking and optimizing features to | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 620 kb | Freeware Go to category: System Utilities > System Maintenance Similar programs | |||
|
Home > Protect passwords software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|