|
||||||
|
||
|
Home > License protection software |
Related keywords: protection, data protection, password protection, license, Web Page Protection, Protection, file protection, spam protection, copy protection, software protection |
|
|
311. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
virtually unlimited number of files. Its unique combination of file protection, event recording, and notification messaging guards critical programs and data to protect against loss, corruption and unwanted access. File and Folder Locking, Hiding and/or File Encryption Select the protection | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
312. | DA Password Recovery Pro 2.03 (deskarsenal.com) | ||
sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at home and no one can overlook your password. You've been entering your password several times, then chose "remember my login and password" option and finally forgot your password. Then your computer crashes or you need to re-type this password for one reason or another, but you don't | |||
Updated: 9, 2005 | Rating: 740 | Author: DeskArsenal.com | Size: 656 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
313. | DB Maker 2.0 (internet-soft.com) | ||
DataBase Maker allows you to extract specific data from HTML and TXT documents and create text databases. The program lets you analyze and search a selected document for specified data, and convert the unstructured results into a text file for further processing in a spreadsheet application like Microsoft | |||
Updated: 9, 2005 | Rating: 42 | Author: DB Maker | Size: 537 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
314. | DCPP 2.7 (securstar.com) | ||
is an important evolutionary step in the field of transparent data protection. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted, validated algorithm chosen by the National | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
315. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
316. | EmailObserver 5.2.2 (softsecurity.com) | ||
is a suitable tool for: - Parents concerned about their children's computer activity, i.e. what kind of messages they send by email, who they communicate with etc. - Spouses concerned about their partner's secret cyber relationship etc. - Businesses trying to control internal information turnover, to stop incorrect using of the company name, drain of trade/industrial | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
317. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
318. | Fast Cleaner Gold 1.61 (eshinesoft.com) | ||
solution to peform disk cleanup,system cleanup and Internet Privacy Protection and more. Fast Cleaner Gold includes Fast Cleaner and Clean Assistant,which provides you the ultimate disk and system clean solutions. With Fast Cleaner,you can clean up those error-making and useless garbage files | |||
Updated: 9, 2005 | Rating: 0 | Author: Haitao Zhao | Size: 2312 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
319. | Flasher Suite 1.0 (eltima.com) | ||
Flasher Suite - The best-selling suite for a professional developer! Flasher Suite combines two award-winning Flash design tools on the market: best-known Flash Optimizer and the most user-friendly and powerful Flash Decompiler. Ordering Flasher Suite now, you will save more than 20% of each product price | |||
Updated: 9, 2005 | Rating: 0 | Author: SoftInfinity | Size: 5814 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
320. | Genie Backup Manager 4.0 (genie-soft.com) | ||
and effective solution for the once-troublesome problem of data protection. An easy to use backup solution that enables you to backup data, emails, programs and settings to CD, DVD and any other location or media recognized by Windows Explorer, it also offers scheduling, security and compression options plus much | |||
Updated: 9, 2005 | Rating: 124 | Author: Muayyad Shehadeh | Size: 5575 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > License protection software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|