|
||||||
|
||
|
Home > Protect your family software |
Related keywords: protect, family, family tree, Protect, password protect, protect files, family history, protect folders, protect folder, protect privacy |
|
|
31. | Hide Files 3.4 (spydex.com) | ||
files and folders have not security protection so the best way to protect them is to make files or folders invisible for another's eyes. Hide Files makes hidden any files and folders (or whole Windows folder or even all computer disks). Hide Files allows you to select any folders (and sub | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
32. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
Protect your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
33. | BlazingTools Perfect Keylogger Lite 1.15 (blazingtools.com) | ||
you want to know what your buddy or colleague is typing? May be you want to control your family members - what are they doing on your computer? Some applications of the keylogger: - Monitor children’s activity for parents - Monitor what programs opened and when - Recall what you wrote some time ago - Special purposes Features: - Invisible in Task Manager | |||
Updated: 2, 2006 | Rating: 75 | Author: BlazingTools Software | Size: 172 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
34. | Actual Window Guard 3.8 (actualtools.com) | ||
of Actual Tools Company. Like a real guard or a magic genie, it will protect your computer work by making any application absolutely obedient in your arms. You will be able to do with windows whatever you want! A lot of useful things become accessible now when you load any program! Internet Explorer window as always was opened not in a full size? Or you spend time on | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Tretyakov | Size: 1665 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
35. | Access Boss 2.2 (fspro.net) | ||
should be restricted. To do so, you simply mark the required hour(s) of any day of the week as either "allow" or "deny". You may also specify how long a user can access the computer on a per day basis. Once you apply the changes user access restrictions will take effect. When the user's time is up, Access Boss will log the user off automatically. Access Boss features extensive | |||
Updated: 2, 2006 | Rating: 175 | Author: FSPro Labs | Size: 933 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
36. | Access Administrator 4.14 (softheap.com) | ||
Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
37. | Access Administrator Pro 4.14 (getfreefile.com) | ||
user interface gives you a lot of abilities to allocate access to your files and folders between your users according to predefined schedules. It means that each user has his own list of allowed and disallowed files and folders within certain time periods. The program does not modify your media: in protecting your files, it just uses a high-reliability VXD | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
38. | Access Administrator Pro 4.14 (softheap.com) | ||
user interface gives you a lot of abilities to allocate access to your files and folders between your users according to predefined schedules. It means that each user has his own list of allowed and disallowed files and folders within certain time periods. The program does not modify your media: in protecting your files, it just uses a high-reliability VXD | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
39. | Accent EXCEL Password Recovery 2.40 (passwordrecoverytools.com) | ||
Password Recovery will break the passwords and allow you to access your documents again! Passwords to workbook sheets are found almost instantly. They may differ from the original passwords, but they will be valid. To reduce the time of searching for a password to a workbook, the program has three search methods: a brute-force attack, an attack by an enhanced mask, an enhanced | |||
Updated: 2, 2006 | Rating: 1000 | Author: Denis Gladysh | Size: 734 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
40. | WebCloner Offline Browser 2.5 (productsfoundry.com) | ||
news articles, pictures of any kind including adult content to your hard disk into a single packed file for offline view and manipulation. Once saved, no internet connection is required to access them. Also take advantage of full featured export process that gives you the ability to move or change the way saved websites will stay on your computer. Also WebCloner is an offline | |||
Updated: 2, 2006 | Rating: 0 | Author: Candin Jurca | Size: 3142 kb | Shareware Similar programs | |||
|
Home > Protect your family software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|