|
||||||
|
||
|
Home > File touch software |
Related keywords: file, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE, file compare |
|
|
571. | PC Security 6.4 (tropsoft.com) | ||
your computer with the following security options: Explorer Control, File Lock, Folder Lock, System Lock, Internet Lock, Shortcut/Program Lock, Restricted System, Window Lock, intruder Detection with Alarm, Flexible and complete password protection and Drag and Drop support. A very powerful and easy to | |||
Updated: 9, 2005 | Rating: 18 | Author: Silvio Kuczynski | Size: 1100 kb | Demo Go to category: System Utilities > Other Similar programs | |||
572. | PDF reDirect 2.1 (exp-systems.com) | ||
Version 2.1 adds: a live preview of the PDF being created, PDF file size optimization, viewing style settings and compatibility with Windows Terminal Services. PDF reDirect is a fast, free, and easy-to-use PDF Creator. It has no restrictions, no watermarks, no spyware, no adware and no pop-up advertisements. Features include basic encryption, full merging, preview, and PDF | |||
Updated: 2, 2006 | Rating: 0 | Author: Michel Korwin-Szymanowski | Size: 5376 kb | Freeware Go to category: Business > Other Similar programs | |||
573. | PointCapture 1.0 (softwaresubmit.net) | ||
take you a long time to find by yourself by opening PowerPoint files one-by-one. Locate all PowerPoint slides with only certain text, numbers (or both) in them. Locate PowerPoint files that meet certain PowerPoint File Properties criteria, such as Author and create date. You can even search custom fields. Do a combined File Properties and slides search, such | |||
Updated: 9, 2005 | Rating: 0 | Author: Kalani Thielen | Size: 516 kb | Commercial Go to category: Business > Office Suites & Tools Similar programs | |||
574. | PowerKey 2.0 (gals1.chat.ru) | ||
online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
575. | ProBot SE 2.3.0 (nethunter.cc) | ||
and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer owner for the exact reconstruction of the computer usage. ProBot SE is very suitable for monitoring | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
576. | Access Administrator 4.14 (getfreefile.com) | ||
your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
577. | ProtectZ 1.60 (actualsecurity.com) | ||
enables you to restrict access to any non-virtual folders and files, to edit a lot of different system policies of Windows 95/98/Me. ProtectZ enables you to make files and folders invisible or "read-only", to make them undeletable, to forbid rename them, to make them unreadable, to forbid rewrite them or just to preserve their attributes unchanged from unauthorized | |||
Updated: 8, 2004 | Rating: 723 | Author: Konstantin Evseenko | Size: 574 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
578. | Random Password Generator-PRO 12.1 (hirtlesoftware.com) | ||
created you may then save them to a text, MS-Access, HTML and/or CSV file. CSV may be used with spreadsheet applications such as MS-Excel. A built-in MS-Access editor is provided. Therefore, MS-Access itself is not needed to create, view or edit these files. A dictionary check option will check | |||
Updated: 9, 2005 | Rating: 79 | Author: Tim Hirtle | Size: 7568 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
579. | Random Word Generator 8.1 (gammadyne.com) | ||
word construction engine, generation of many words into a file, generation of random variations of a word, generation of all possible words from a given format, and much more. Random Word Generator creates lists of random, artificial words. Other features: customizable word construction engine, generate many words into a file, generate words similar to others, generate | |||
Updated: 3, 2006 | Rating: 48 | Author: Greg Wittmeyer | Size: 2499 kb | Shareware Go to category: Education > Languages Similar programs | |||
580. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
when computers are not being used. It compresses and encrypts backup files using a choice of encryption methods and key lengths: DES, TDES-128, AES-128, AES-192, AES-256, or Blowfish (up to 448 bit key length.) RBackup then sends backup files off-site to the RBackup Server through the Internet | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > File touch software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|