|
||||||
|
||
|
Home > Price software |
Related keywords: price estimate, ISBN and Price tag, Best Price, price comparison, bond price, dollar price, intraday price moves, coin price, low price, diamond price |
|
|
561. | PowerKey 2.0 (gals1.chat.ru) | ||
PowerKey is an advanced encryption toolkit with many unique features which you won't come across in other products of such a kind available online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
562. | Privacy For Windows 3.2c (aidsoft.com) | ||
Award winning Privacy For Windows provides password protection for Windows 95 or 98, eliminating unauthorized access. The password is encoded for extra protection.This program miminizes to the system tray for quick loading if you need to walk away from your computer. It also lets you know if there is an | |||
Updated: 9, 2005 | Rating: 0 | Author: Nathan Hunt | Size: 1979 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
563. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
PrivacyKeyboard for Microsoft Windows 2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs (keyloggers) and keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
564. | Privilege Master 1.0 (shareware-promotion.com) | ||
As every IT manager knows, security is a trade-off between usability and the level of protection required. For example, to prevent users making unauthorised configuration changes to their system, users are normally given only basic security rights to their system. This is fine until the user has a legitimate | |||
Updated: 9, 2005 | Rating: 16 | Author: Blue Square Software Blue Square Software | Size: 9085 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
565. | ProBot 2.5.0 (nethunter.cc) | ||
ProBot is a powerful and effective computer monitoring solution. Primary task of this feature-packed surveillance system is user activity event interception and logging. ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
566. | ProBot SE 2.3.0 (nethunter.cc) | ||
ProBot SE is a full-featured workstation monitoring tool. It allows administrators to keep track of all activity occurring on a computer. In addition to keystrokes and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
567. | Programmer's IDE 2000 3.1 (gregorybraun.com) | ||
Programmer's IDE 2000 is a small utility that creates an integrated development environment (IDE) for C/C++ and Assembly language programs and libraries. Very useful for running MS DOS based development tools from MS Windows. You will need your own Language Compilers, Assemblers and Linkers to use this | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 460 kb | Shareware Go to category: Development > Other Similar programs | |||
568. | Protect Folder 98 3.0 (everstrike.com) | ||
Protect Folder 98 is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms, and trojans. Here is how | |||
Updated: 9, 2005 | Rating: 48 | Author: Richard Davids | Size: 772 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
569. | Quick Hide Windows 1.8.7 (cronosoft.com) | ||
Quick Hide Windows by CronoSoft is great for hiding program windows with a press of a hotkey combination. You easily bring them back with another combo. Hiding the taskbar and desktop icons is just awesome. Password protection allows you to lock QHW to prevent intruders from trying to show invisible | |||
Updated: 9, 2005 | Rating: 154 | Author: Alex Adrian | Size: 994 kb | Demo Go to category: System Utilities > Other Similar programs | |||
570. | Love You Not 1.10 (pcshareware.com) | ||
Love You Not! will intercept any request to execute all scripting file types used in email virus attacks. These include: Visual Basic scripts (.VBS, .VBE, .VB), Javascript (.JS, .JSE), Scrap objects (.SHS, .SHB), HTML application files (.HTA) and other potentially dangerous file types. Love You Not! also | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Kapusta | Size: 870 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
|
Home > Price software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|