|
||||||
|
||
|
Home > Protect applications software |
Related keywords: protect, applications, Protect, password protect, protect files, multimedia applications, protect folders, hide applications, protect folder, protect privacy |
|
|
41. | Image Albums (For Microsoft Access) 3.0 (jamiessoftware.tk) | ||
Microsoft Access® 2000 or above) is a presentation and storage application designed to allow you to organize and share your images on your LAN. Powerful and yet easy to use, the application has been utilized by professional photographers, genealogists, medical professionals, graphic | |||
Updated: 2, 2006 | Rating: 42 | Author: Jamie Czernik | Size: 966 kb | Demo Go to category: Graphic Apps > Other Similar programs | |||
42. | Image Albums (For Microsoft Access) 3.0 (jamiessoftware.tk) | ||
Microsoft Access® 2000 or above) is a presentation and storage application designed to allow you to organize and share your images on your LAN. Powerful and yet easy to use, the application has been utilized by professional photographers, genealogists, medical professionals, graphic | |||
Updated: 2, 2006 | Rating: 191 | Author: Jamie Czernik | Size: 966 kb | Demo Go to category: Graphic Apps > Other Similar programs | |||
43. | Automatic @Mail System 3.1 (pwp.netcabo.pt) | ||
you can automatically and easily interchange data between remotes applications or control and responds to applications requests only sending E-Mail Messages. Automatic @Mail System (AMS) is a program destined to send and receive E-Mail messages | |||
Updated: 2, 2006 | Rating: 42 | Author: JosГ© Santos | Size: 1655 kb | Shareware Similar programs | |||
44. | Spytector 1.2.8 (spytector.com) | ||
of PC users (visited websites, all the keystrokes, opened windows, applications etc.) and delivers the logs to you via Email or/and FTP. In the delivered logs are also included the Protected Storage passwords (Outlook, MSN and others) and URL history (visited websites). The keylogger is using advanced hooking and stealth techniques. Spytector is completely invisible on the | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrei Radu Poleacu | Size: 1006 kb | Shareware Similar programs | |||
45. | StaffCop 1.9.5 (staffcop.com) | ||
employee busy with: acquire screenshots, list currently running applications and open web sites.??Features:?+ All actions, including installation to user's computer, can be carried out by system administrator remotely.??+ Automatic data saving (screenshots, visited web sites, and run programs) | |||
Updated: 2, 2006 | Rating: 0 | Author: StaffCop Software | Size: 2054 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
46. | Duplicate Finder 3.0 (ashisoft.com) | ||
to be excluded from scanning altogether. + Can use wild cards. + Protects the windows and system folders. + Skips the hidden files and folder. + Show file versions and properties. + Resizable popup picture viewer. + Save search session and results for future searches. + Results can be exported in two | |||
Updated: 2, 2006 | Rating: 4849 | Author: Ishtiaq Mohammed Hussain | Size: 1898 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
47. | Visual Drawing Maker 1.14 (xpcad.net) | ||
is needed to explore, print and postil a drawing. 3.Difficulties to protect company intelligent property rights and technique secrest when providing customers with source design drawings, etc. Developed on the CAD midware technique basis, under lots of operation systems, it can be used on various CAD platforms. Presently it can support AutoCAD R14 to R2006 , IntelliCAD 3 to 5 | |||
Updated: 2, 2006 | Rating: 0 | Author: Yuan GaoFei | Size: 1883 kb | Shareware Go to category: Graphic Apps > CAD Similar programs | |||
48. | wodSSHTunnel 1.5.0.0 (weonlydo.com) | ||
add secure tunneling (based on SSH protocol) capabilities to your application. Based on your rules and definitions, it will accept local connections, encrypt it and forward to SSH server (where they will be decrypted and sent to destination host). SSH server is required for this component to work | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1317 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
49. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
50. | Tray Safe 4.3 (traysafe.com) | ||
Tray Safe password manager is a proud holder of the world's most secure password keeper title because of its unique hardware ID feature. Basically, it means that the program works only on a single PC (yours). Should someone access your PC or make a copy of your hard-drive, they won't be able to launch or hack the program. In addition, Tray Safe offers a wide choice of | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Protect applications software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|