|
||||||
|
||
|
Home > Protected software |
Related keywords: password protected, Copy Protected WMA, copy protected, find protected, find password protected, search protected, search password protected |
|
|
391. | 12Ghosts 12Gee 7.10 (12ghosts.com) | ||
and make Windows run faster and smoother. They clean up files and protect your privacy, backup and secure data, adjust settings, and manage and control programs according to your needs. Shutdown your system faster, or improve your Windows clock with the date and a second time zone. Improve your productivity with Windows, and save plenty of time with these 'gems' of easy-to-use | |||
Updated: 9, 2005 | Rating: 24 | Author: Philip Ahrens | Size: 2000 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
392. | 12Ghosts SuperGee 7.10 (12ghosts.com) | ||
and make Windows run faster and smoother. They clean up files and protect your privacy, backup and secure data, adjust settings, and manage and control programs according to your needs. Shutdown your system faster, or improve your Windows clock with the date and a second time zone. Powerful extensions for file management allow for fast search and replace, set file dates, create zip | |||
Updated: 9, 2005 | Rating: 124 | Author: Philip Ahrens | Size: 3100 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
393. | 12Ghosts TrayProtect 7.10 (12ghosts.com) | ||
To keep track of many tray icons you may hide those that you don't need all the time. You can still access such hidden tray icons in the context menu of 12-Tray. 12-Tray will also restore tray icons after a 'crash' or restart of the taskbar (which in fact is displayed by the module explorer.exe, aka Windows | |||
Updated: 9, 2005 | Rating: 48 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
394. | StrongDisk Pro 2.9 (strongdisk.de) | ||
creates protected disks inside your Windows system. With such disks you can work as with usual hard drive- The main difference is that all data written to the disk is encrypted "on fly", while the content of the protected disk is stored in common file with arbitrary name. In order to access existing protected disk user must enter password, which is specified during | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
395. | TrojanShield 2.20 (trojanshield.com) | ||
Trojan Shield to protect yourself from hackers and Trojan viruses. If a hacker tries to break into your computer, Trojan Shield automatically warns you so you can take action against them. You don't need to be a computer expert to use Trojan Shield, Just install it and let it go to work. The trial edition of Trojan Shield is fully functional for 15 days, during which time you can | |||
Updated: 9, 2005 | Rating: 0 | Author: Lewis Guest | Size: 2072 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
396. | Epidemic Groove 1.0 (dejobaan.com) | ||
Build microscopic walls, medical lasers, repair pylons, and more, to protect a healthy brain cell from viral and bacterial attack. Gameplay takes place under an electron microscope, and alternates between construction and invasion phases. During construction, you'll have 60 seconds to create defenses around a healthy brain cell to counter attack from viruses and bacteria. Using a | |||
Updated: 9, 2005 | Rating: 0 | Author: Ichiro Lambe | Size: 15454 kb | Shareware Go to category: Games & Entertainment > Action Similar programs | |||
397. | Hide&Protect 1.016c (softwar-protect.com) | ||
is built in as invisible protection of any Windows programs against Hackers. Hide&Protect forbid use of debugger, obstruct the full result of a memory dumper witch makes it inoperative. More, Hide&Protect compress and encrypt your application, and has mechanism of monitoring of your application. Main key features : - Multi process activities - Real time | |||
Updated: 9, 2005 | Rating: 0 | Author: LE CHATELIER Jerome | Size: 1113 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
398. | m9P Phonebook2 2.1 (mental9Production.com) | ||
the license is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card information. This phonebook manager provides you with an easy way to store and retrieve your contacts information. m9P Phonebook2 can handle multiple phonebook databases and is capable of exporting a database to a web form for use on the | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 11348 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
399. | m9P Database 1.2 (mental9Production.com) | ||
license is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card information. m9P Database is a stand-alone database builder and manager for individuals and businesses. It allows for multiple users and each database is secured by a password and by user privileges. It Can export a database to a web form for use on the | |||
Updated: 9, 2005 | Rating: 51 | Author: Khaled Aboulhosn | Size: 12566 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
400. | m9P Zipper X 1.0 (mental9Production.com) | ||
X license is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card information. Special Offer: click Buy Now button on this site to buy the software directly from RegNow and receive 30% discount! m9P Zipper X is a simple file compression (zipping) & decompression (unzipping) tool. It is specifically designed to handle zipping and unzipping | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 4423 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
|
Home > Protected software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|