|
||||||
|
||
|
Home > Security computer lock software |
Related keywords: security, computer, lock, Security, computer security, internet security, computer game, security software, Computer, information security |
|
|
51. | MoRUN.net Sticker 5.0 (morun.com) | ||
you an easy way to keep all information you have to remember on the computer desktop. This is a great tool to organize information, make to-do lists or just write down imformation using sticky notes. Friendly user interface lets you start using the program within minutes. You'll be amazed at how easy and quickly you can create desktop sticky notes. MoRUN.net Sticky Notes software is | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
52. | RegDesk 4.0 4.0 (easytools.com) | ||
answer to a lock and key? RegDesk 4.0 provides computer security of the highest order, securing opted devices and areas of Desktop and Windows programs. Put together a foolproof desktop security system, which controls access to vital areas of Windows. It provides a facility for hiding of selected drive letters, setting virtual memory, display | |||
Updated: 9, 2005 | Rating: 0 | Author: VenkataRangan TNC | Size: 530432 kb | Shareware Go to category: Development > Other Similar programs | |||
53. | StrongDisk Pro 2.9 (strongdisk.de) | ||
of emergency all protected disks can be instantly dismounted, thus, locking access to the data. Some Applications * All documents, tables and databases can be stored on protected disks. * You can install your e-mail client application on protected disk, thus, protecting all messages stored on your | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
54. | SecurDesk! 5.32 (cursorarts.com) | ||
you are responsible for multiple computers in a corporate office, or just need a way to keep novice users from tampering with the system settings, SecurDesk! offers many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide confusing and irrelevant items from selected users, to simplify training | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
55. | Security Folder 2.0 (security-folder.com) | ||
days computers are everywhere. Reliable and tireless machines replace human beings at dull routine tasks in almost every area. Each day we tend to rely more and more on electronics as storage media and information processing and distribution systems. A decade ago, our puny hard drives contained hardly a couple of thousands of files. Today, our massive hard drives contain dozens and | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 515 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
56. | KidsWatch Time Control 2.1 (kidswatch.com) | ||
Time Control™ is one of America's leading Parental Control Software packages that allows you to limit and control the time your children spend on the computer, access the Internet or play games. Time Control™ helps you block unwanted software from being downloaded, prevents overuse and helps you to balance your child's day. With KidsWatch Time Control™ you will | |||
Updated: 9, 2005 | Rating: 39 | Author: Larry Zarou | Size: 3155 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
57. | LockEXE 2.0 (mazepath.com) | ||
you choose will only work with your password! Protect your computer and your privacy with LockEXE. Keep your children from browsing the internet without your permission! You can either browse for the program you want to lock, or simply drag it to the select box! Nothing could be easier! Set the password and click Lock. The program will no longer run without | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 145 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
58. | PalmTree 3.5 (clickok.co.uk) | ||
protect, lock and hide folders or directories and their subdirectories and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption | |||
Updated: 9, 2005 | Rating: 42 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
59. | AlertMobile Pro 4.0.1 (softsecurity.com) | ||
is a special software for computer security incidents response. It monitors all attempts of unauthorized computer activity, sends SMS alerts to mobile device, receives and handles response commands. Features: - Recording of user logon name, date, time and computer name - Monitoring of active tasks list - Handling of critical programs list | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 593 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
60. | Internet Access Scheduler 2.0 (winutility.com) | ||
based protocols (HTTP, FTP, SMTP, POP3, Telnet, etc.) on a local computer, depending on the time of day and day of the week. You can also set allowed/denied TCP/UDP ports and IP addresses for incoming and outgoing connections. Internet Access Scheduler is completely transparent to users and only authorised users are allowed to set rules. Internet Access Scheduler (IAS) is a firewall | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 784 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > Security computer lock software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|