|
||||||
|
||
|
Home > Prevent software |
Related keywords: PREVENT HACKERS, prevent internet disconnection, prevent hot linking, prevent deletion, prevent access, prevent calls, encrypt prevent |
|
|
371. | CD Inspector 1.10 (kgysoft.com) | ||
you can easily prevent the using of the CDs with inadmissible (not tested, dangerous) software or with other inappropriate content. The administrator has absolute control of use of CD in the enterprise network since he checks the content of a CD and decides whether the disk should be used. It's also | |||
Updated: 9, 2005 | Rating: 0 | Author: Gleb Konnov | Size: 915 kb | Demo Go to category: System Utilities > Other Similar programs | |||
372. | CDSHiELD SE 1.04 (mindestworx.free.fr) | ||
of the CD with a CD-Recorder using CD copying softwares. * Prevent users coying the contents of your CD-Rom to their hard drives and removing your original Master CD * Improve sales and revenues and protect yours developments investiments. * Protect your work at lower cost with royalties free >> CDSHiELD SE FEATURES: * CD-PROTECTION + ENCRYPTION SET | |||
Updated: 9, 2005 | Rating: 1704 | Author: Loki mindestworx | Size: 4390 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
373. | CDuke 2.1 (coolutils.com) | ||
comes with an autopilot-like feature that controls disk usage and prevents CD from becoming corrupted as a result of surplus data and incorrect available space calculations. In addition, the program comes with advanced options that allow experienced users to fine-tune the process of CD burning to achieve the desired results. Also, the program features a built-in image viewer, which | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Buzaev | Size: 2900 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
374. | Chaperone 4.0 (css-software.com) | ||
common methods of controlling what programs can be run are based on preventing the program from running at any time. Chaperone gives the added flexibility of enhancing this control by allowing an independent schedule for each program. These schedules can be set to either a maximum number of hours per | |||
Updated: 9, 2005 | Rating: 16 | Author: Kevin Whynot | Size: 2395 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
375. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
Chat Little Black Address Book keeps track of the most personal of personal information about your chat partners. Online chatting has become a new form of social interaction of this century. Many people now rely on chatting in the hopes of finding their soul-mate. Unfortunately, there is no easy way to keep | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
376. | CheckQuota 1.7 (competent-software.com) | ||
user exceeds the directory usage limit, all write processes will be prevented for them. The user can read and delete his data, but writing is not possible. So a system administrator can control and stop increase of directory size. When user deletes data, in order that the directory usage falls under specified limit, he gets all the write access back. CheckQuota is must-have for every | |||
Updated: 9, 2005 | Rating: 0 | Author: Timo Kosiol | Size: 2581 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
377. | CheckSpace 3.3.0 (competent-software.com) | ||
report if an error occured. That helps you to locate the problem and prevent it for the future. With the application monitor you can check if a specified program is running. If not, you can execute it. If it runs, you can terminate it. The CPU usage monitor controls the CPUs and perform an action when | |||
Updated: 9, 2005 | Rating: 0 | Author: Timo Kosiol | Size: 2733 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
378. | Clean Registry 2.0 (winenhance.com) | ||
have lost keys, it may require you to reinstall Windows. In order to prevent the complete reinstallation of Windows (and consequent loss of all information on your system) it is very helpful to have a backup copy of your registry available. The backup copy of the registry can then be used to restore any missing or damaged keys. Why would I need to clean my registry? There are several | |||
Updated: 9, 2005 | Rating: 246 | Author: WinEnhance Marketing | Size: 903 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
379. | 1st Files Privacy Tool 2.4 (privacywindows.com) | ||
(including subdirectories) in various ways. You can hide them or prevent others from deleting, renaming, executing, or modifying your files in any way. The Wildcard feature allows you to specify which files you want to protect (for example, all EXE or DLL files). The file system protection works independently of the program , so if you even close the program the file protection will | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Mihailov | Size: 839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
380. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
Explorer Web browser. It lets you disable individual menu items, prevent others from editing your Favorites, disable individual tabs in the Internet Options dialog, restrict access to the IE browser options. Also the program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Prevent software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|