|
||||||
|
||
|
Home > Restrict server access software |
Related keywords: server, access, Access, access control, restrict, Server, web server, ms access, mail server, remote access |
|
|
31. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
32. | SafeSystem 2006 (gemiscorp.com) | ||
allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. It can make your files and folders completely invisible, inaccessible or simply read-only and prevent the change of configuration and the accidental (or even intentional) system files deletion or alteration, so your PC | |||
Updated: 2, 2006 | Rating: 0 | Author: GemiScorp | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
33. | Quicknote 5.2 (jens.metz-furniere.de) | ||
the normal text functions, it can convert units, let you directly access frequently run programs, encrypt secret texts, change the system volume by hotkeys, manage windows tasks, and even send notes through a network. It has also a powerful reminding tool, which can remind you of your notes at certain times, run programs or shutdown automatically your PC. The program is absolutely | |||
Updated: 2, 2006 | Rating: 16 | Author: Jens Mьller | Size: 2086 kb | Freeware Go to category: Business > Other Similar programs | |||
34. | Access Administrator 4.14 (getfreefile.com) | ||
your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
35. | Locked! 4.7.8 (jcmatt.com) | ||
powered off or on, Locked! securely protects your computer against access by others. It's proprietary multi-level structure integrates deeply within the Windows architecture, working with and controlling access until you unlock it with a password. Entries from the keyboard and mouse are | |||
Updated: 2, 2006 | Rating: 0 | Author: James Matt | Size: 2980 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
36. | Hide Files & Folders 2.4 (softstack.com) | ||
securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access to the file or folder, otherwise not. Hide Files and Folders does not modify your media: in | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
37. | File & Folder Protector 2.33 (softheap.com) | ||
securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access to the file or folder, otherwise not. Protect Files and Folders does not modify your media | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 740 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
38. | Examine32 4.31 (examine32.com) | ||
Searches can be across multiple drives over networks or can be restricted to a single folder with the option to search subfolders. Windows Explorer's drag and drop facilities can also be used to select files which can be dropped onto the program's window. Files can be viewed with their associated application, the program's own fully configurable internal viewer | |||
Updated: 2, 2006 | Rating: 0 | Author: Trevor Poile | Size: 625 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
39. | Evidence Exterminator 2.14 (softstack.com) | ||
Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
40. | Dr.Salman's Window Power Tools 5.0-2005R1 (dmisoftware.com) | ||
gives Windows powerful security and anti-hacking features, such as restricting access to dos, games, control panel, system settings, memory settings, display controls, desktop settings, 160 bit file encryption and desktop lock. Window Power Tool is the No. 1 System Optimizer for Windows 95/98/Me/NT4/2000/2003/XP. It not only increases Internet Speed but also make Windows Run | |||
Updated: 2, 2006 | Rating: 39 | Author: Dr.Salman Zafar | Size: 5525 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
|
Home > Restrict server access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|