|
||||||
|
||
|
Home > Single deck software |
Related keywords: single, double deck, single file, single player, single elimination, single sign on, Iraqi Most Wanted Deck of Playing Cards, Single, single source, deck |
|
|
381. | SafeData Technology Suite 1.0 (codetek.com) | ||
SafeData™ Technology Suite 1.0 includes SafeFile™, SafeClean™, and SafeShred™. SafeFile™ allows you to create a virtual safe for totally private document storage. SafeFile’s™ virtual safe prevents anyone else who uses the same computer from being able to access any files you place inside the virtual safe | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Thompson | Size: 2365 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
382. | SafeOffice 1.1 (codetek.com) | ||
CodeTek Studios SafeOffice™ is a security program that allows you to protect your important data from human attackers and malicious software that take advantage of flaws in common internet applications (web browsers, e-mail clients, instant messengers, etc.). SafeOffice is designed to protect you and your | |||
Updated: 9, 2005 | Rating: 0 | Size: 4875 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
383. | SafeSystem 2006 (gemiscorp.com) | ||
SafeSystem allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. It can make your files and folders completely invisible, inaccessible or simply read-only and prevent the change of configuration and | |||
Updated: 2, 2006 | Rating: 0 | Author: GemiScorp | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
384. | Screen Privacy 1.2 (pictures-soft.com) | ||
black list. Besides, you can terminate all black-list-application by single key stroke. You can customize your secret hot keys and work with your lists using drag and drop interface. This program is very easy to use. It will help you wherever you are. At home and at your office, you have a lot of | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Shubin | Size: 851 kb | Shareware Go to category: Desktop > Other Similar programs | |||
385. | Search and Recover 3.0d (iolo.com) | ||
of all data on hard drives, CD-ROMs, and DVD-ROMs and save it as one single file for later access. Simply mount the image file, and your original drive or disk with all data intact is accessible in Windows. Use disk images as the ultimate backup tool: all data, including lost, deleted, or damaged data | |||
Updated: 2, 2006 | Rating: 35 | Author: iolo technologies | Size: 4607 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
386. | Folder Security Personal 3.5 (y0ys.com) | ||
Folder Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only ,preventing modification or deletion by other users or programs. The program can also lock Floppy, CDrom, USB sticks, and other removable drives or make | |||
Updated: 2, 2006 | Rating: 666 | Author: Y0YS Software | Size: 803 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
387. | Security23 1.00 (security23.com) | ||
Security23 contain 23 powerful tools to save your privacy in windows XP and protect your files from hackers , it contain those tools : personal firewall , useless files eliminator , files and folders encryptor , spay ware terminator , internet data eraser , memory optimizer , binary data eliminator | |||
Updated: 8, 2004 | Rating: 0 | Author: Dored Ghanem | Size: 3544 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
388. | SecuritySkillz PC SystemGaurd 1.1 (securityskillz.com) | ||
but our code fools it into revealing itself just by clicking a single button. When spy program is forcefully revealed, you can identify the person who installed the spy program on your PC by checking the configuration(or emailing) options on that program. Helps search and destroy them before the spy can get your passwords, credit card details etc. Includes world's most advanced | |||
Updated: 3, 2005 | Rating: 0 | Author: Amit Gupta | Size: 3072 kb | Shareware Go to category: Business > Other Similar programs | |||
389. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
consolidates all security, application and system events into a single database of your choice - MSSQL Server, MySQL, MS Access. It contains Event Log, Syslog events, application history (tasks performed, success or failure in filtering events, etc.). The Configuration Wizard is the tool that allows the auto-detection (auto-discovery) of Microsoft specific servers, such as | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
390. | Shred XP 2.00.10 (aidsoft.com) | ||
and saving trees on demand. With the shredding methods including single (fast), triple, DOD-5200.28, Gutmann (18, 23, 26 and 35), U.S. Army AR380-19, U.S. Navy NAVSO P-5239-26 (RLL, MFM), German VSItR and Russian GOST P50739-95, Shred XP returns control to you. Using over a dozen government and industry-proven shredding methods, Shred XP returns control to you by securely deleting | |||
Updated: 9, 2005 | Rating: 16 | Author: Gale-Force Software | Size: 3063 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Single deck software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|