|
||||||
|
||
|
Home > Lock down software |
Related keywords: lock, lock folder, lock files, lock folders, lock desktop, cd lock, Software Lock and Key, g lock, lock file, file lock |
|
|
41. | Cipherlok 2.1 (softlok.com) | ||
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
42. | 2002 CD Eject 2.5 (fomine.com) | ||
open and close CD ROM, open or close a door when Windows shuts down, lock CD drive door, you can create icon on Desktop for eject, close, Get CD actions. The latest version features full support for Windows XP. 2002 CD Eject is a utility that manages your CD ROM drive doors. It allows you to open and close the CD ROM door by using a hotkey, desktop shortcut, or via an icon | |||
Updated: 9, 2005 | Rating: 359 | Author: Vitali Fomine | Size: 639 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
43. | Akala EXE Lock 3.20 (zero2000software.com) | ||
the general idea. A novel approach to the problem lies in Akala EXE Lock. Akala EXE Lock password protects any program currently residing on your hard drive. An attempt to run a program that's locked down will result in a dialoge box launching asking for the password. Failure | |||
Updated: 9, 2005 | Rating: 158 | Author: Zero Lee | Size: 1152 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
44. | DEANLT for AutoCAD LT 6.0 (pendean.com) | ||
package includes the Main Menu file which contains expanded Pull Down Menu routines; all symbols required by the new routines; a whole collection of new toolbars and fonts we have collected and written over the years; an HTML based Help file that is hyperlinked to give you instant and direct access; redefined quick commands list giving you access to almost every command and | |||
Updated: 9, 2005 | Rating: 0 | Author: Dean Saadallah | Size: 1600 kb | Demo Go to category: Graphic Apps > CAD Similar programs | |||
45. | VShell 2.2.4 (promaxum.com) | ||
a multi-homed machine, control which NIC VShell listens on to better lock down access to the server. - VShell includes vsh (command-line shell utility), vcp (command-line file transfer utility), and vkeygen (public/private key generator utility). - Jail shell. Two configuration options | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 3703 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
46. | Without A Trace Surf Guard 5.91 (tekeffect.com) | ||
with a powerful pop up stopper and robust encryption tools that will lock down any file or | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 4027 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
47. | Secure Browser 1.72 (tropsoft.com) | ||
and specified URLs. Secure Browser has many security features like locking down or controlling other browsers and the ability to make itself the only allowed application. The administrator can also lock Secure Browser so none of the settings can be touched or the application exited. With even the ability to start with windows, you create your own series of personal | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 570 kb | Demo Go to category: Network & Internet > Browsers Similar programs | |||
48. | Omniquad Personal Firewall 1.1 (omniquad.com) | ||
network / dial up/ ASDL and cable modem connections b. Global lock immediately shuts down all net access c. Define & enforce trusted zones d. Alerts for denied network connection attempts e. Real-time network activity indicators f. 3-level program control intercepting connection attempts by any program on your computer g. Automatic lock shuts | |||
Updated: 9, 2005 | Rating: 42 | Author: Daniel Sobstel | Size: 4126 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
49. | MyPadlock 1.4 (pages.prodigy.net) | ||
Encryption keys are not random - you choose the keys to lock your information and you can change the keys as often as necessary. Keys are not saved in the secured information. If fact, your keys are not on your computer at all. They're in your head or wherever you wrote them down. If you received the following message in your inbox or as an instant message from a | |||
Updated: 9, 2005 | Rating: 0 | Author: Don Kreuzberg | Size: 3264 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
50. | Mailbox Filter 3.0.15 (triumviratetechnologies.com) | ||
include Banned List, Keyword list, Authorized list and Attachment locking with script and image reference removal for enhanced virus protection. Automatic Private Key feature provides lock down email security. No digital codes or subscriptions required. Wild card support for fine tuning of Authorized, Keyword and Banned List. Allows filtering of sub-domains, mailbox | |||
Updated: 9, 2005 | Rating: 0 | Author: Bobby Rodnocker | Size: 6174 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
|
Home > Lock down software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|