|
||||||
|
||
|
Home > Lock desktop software |
Related keywords: desktop, lock, Desktop, desktop utility, desktop enhancements, desktop publishing, desktop decoration, desktop management, active desktop, desktop tools |
|
|
41. | 1st Security Administrator Pro 10.14 (softheap.com) | ||
and to protect your privacy stopping others from tampering with your desktop. Deny access to Control Panel and its applets, disable interruption boot keys securing boot, context menus, DOS, Registry editing, Internet and Network access. Hide desktop icons, individual drives, Start Menu items | |||
Updated: 2, 2006 | Rating: 222 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
42. | 1st Security Agent 6.14 (softheap.com) | ||
profile folders to each user, providing each with their own custom Desktop, Start Menu, Favorites, My Documents, etc. Additionally, you can: disable Start Menu items, hide local and network drives, disable the DOS prompt, boot keys, real DOS mode, Registry editing, taskbar, task manager, and network | |||
Updated: 2, 2006 | Rating: 42 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
43. | 1st Security Agent Pro 6.14 (softheap.com) | ||
profile folders to each user, providing each with their own custom Desktop, Start Menu, Favorites, My Documents, etc. Disable Start Menu items, hide local and network drives, disable the DOS prompt, boot keys, DOS mode, Registry editing, taskbar, task manager, and network access, hide desktop | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
44. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
editing and network access. You have got an ability to hide your desktop icons, individual drives, Start menu items and the taskbar features, it enables you to stop others from tampering with your desktop. If you set up the special list of allowed applications nobody will run unwanted programs. The powerful feature "User Working Time" allows you to limit working time for your | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
45. | 2002 CD Eject 2.5 (fomine.com) | ||
It allows you to open and close the CD ROM door by using a hotkey, desktop shortcut, or via an icon in your system tray. It will automatically close the door within a couple of seconds if you have chosen the action "Get CD". The program creates a separate icon in your system tray for each CD ROM drive, so you can control any drive door by clicking on the appropriate icon. Features | |||
Updated: 9, 2005 | Rating: 359 | Author: Vitali Fomine | Size: 639 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
46. | StrongDisk Pro 2.9 (strongdisk.de) | ||
of emergency all protected disks can be instantly dismounted, thus, locking access to the data. Some Applications * All documents, tables and databases can be stored on protected disks. * You can install your e-mail client application on protected disk, thus, protecting all messages stored on your | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
47. | Access Denied 3.40 (johnru.com) | ||
requests username and password or simple password upon boot-up and locks desktop by one mouse click. It can't be bypassed on Windows 95/98/ME. All unwanted people are kept out to your PC. Very flexible use: multi-user support(up to 450 users), password encryption, integration with your | |||
Updated: 9, 2005 | Rating: 58 | Author: Ivan Mayrakov | Size: 536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
48. | Access Lock 2.83 (softheap.com) | ||
Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
49. | Access Manager for Windows 6.14 (softstack.com) | ||
of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific | |||
Updated: 2, 2006 | Rating: 55 | Author: IM Soft | Size: 913 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
50. | Access Lock 2.83 (getfreefile.com) | ||
Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Lock desktop software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|