|
||||||
|
||
|
Home > Restrict access software |
Related keywords: access, Access, access control, restrict, ms access, remote access, microsoft access, MS Access, Microsoft Access, last access |
|
|
321. | Dr.Salman's Window Power Tools 5.0-2005R1 (dmisoftware.com) | ||
gives Windows powerful security and anti-hacking features, such as restricting access to dos, games, control panel, system settings, memory settings, display controls, desktop settings, 160 bit file encryption and desktop lock. Window Power Tool is the No. 1 System Optimizer for Windows 95/98/Me/NT4/2000/2003/XP. It not only increases Internet Speed but also make Windows Run | |||
Updated: 2, 2006 | Rating: 39 | Author: Dr.Salman Zafar | Size: 5525 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
322. | Easy File Protector 4.14 (softstack.com) | ||
is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
323. | Easy Uninstaller 1.0 (hp-h.us) | ||
Easy uninstaller is a fast, advanced, powerful, and easy to use replacement for slow,and user unfriendly windows Add\Remove control panel applet, it comes with functions like multiple uninstallations in one go, uninstall list backup manager and option to delete uninstaller key entry. Easy uninstaller provides | |||
Updated: 8, 2004 | Rating: 232 | Author: Deepesh Agarwal | Size: 682 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
324. | ECSync 1.0 (EUROCOMP.info) | ||
Professional program that saves and synchronizes data and files on any Windows computer. Easy synchronization of files on notebook, desktop and server. Data can be on internal or external disk or other storage device. Extensive options for configuration. Tasks can be stored in profiles for individual copying | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Osthege | Size: 5007 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
325. | Encrypt PDF (Secure PDF) 2.2 (toppdf.com) | ||
owner password. Opening a PDF with this password will allow you full access to the PDF when a user password has been assigned as well. This means that even if printing was disabled you will still be able to print the PDF when using this password. No password will be prompted for when opening the PDF if | |||
Updated: 2, 2006 | Rating: 0 | Author: verypdf verypdf | Size: 759 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
326. | Encrypt PDF Command Line 2.1 (toppdf.com) | ||
owner password. Opening a PDF with this password will allow you full access to the PDF when a user password has been assigned as well. This means that even if printing was disabled you will still be able to print the PDF when using this password. No password will be prompted for when opening the PDF if | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 34 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
327. | Evidence Destructor 2.14 (emailarms.com) | ||
if your computer is at work, your coworkers or your boss would have access to it. Most of the sources of information that may represent your sensitive information are stored on your computer unprotected, and can be recovered by people with some minimal knowlege of computers. It can even affect you when | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
328. | Evidence Exterminator 2.14 (softstack.com) | ||
work with various software, surf the Internet, use online banking to access your accounts, and so on, information about all your steps: all pictures you have seen, all passwords and bank accounts you use is stored in various files and in the Windows registry? Did you know that anybody with a minimal | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
329. | Examine32 4.31 (examine32.com) | ||
Searches can be across multiple drives over networks or can be restricted to a single folder with the option to search subfolders. Windows Explorer's drag and drop facilities can also be used to select files which can be dropped onto the program's window. Files can be viewed with their associated application, the program's own fully configurable internal viewer which lets the user | |||
Updated: 2, 2006 | Rating: 0 | Author: Trevor Poile | Size: 625 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
330. | EXEsafe 2 (members.aol.com) | ||
EXEsafe lock will process all the information, and decide whether access should be allowed. If not, a customisable message is shown, and the program will not decrypt or run. EXEsafe itself can be protected from unwanted access. Locking programs is simplified by the drag and drop support, and right click context menu association. EXEsafe features an attractive, easy to use | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Restrict access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|