|
||||||
|
||
|
Home > Touch files software |
Related keywords: files, hide files, Files, PDF files, compare files, touch, touch typing, protect files, duplicate files, delete files |
|
|
61. | Task Commander 2.5 (resortlabs.com) | ||
well as providing one-click access to your favorite applications and files! Task Commander installs a tiny icon on your taskbar. As soon as your mouse cursor hovers over it, a menu appears containing the most popular and recently used applications that can be launched with just a click. This menu is | |||
Updated: 2, 2006 | Rating: 0 | Author: Grishin Sergey | Size: 2219 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
62. | StatWin Pro 7.1 (statwin.com) | ||
he or she logged on/off, as well as complete statistics about user's Internet activity. You can even calculate the cost of using the Net if you don't pay a fixed monthly fee. Another very popular "office" feature is printer statistics, which can answer any printer use questions - names of printed | |||
Updated: 2, 2006 | Rating: 16 | Author: Vitaly Dvorak | Size: 1320 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
63. | ABC Security Protector 5.23 (getfreefile.com) | ||
useful if you want to disable the lowlevel access to your system. It's easy to use, excellent online help is also available. Try our password and security tools, free downloads. This nice free security utility enables you to protect your PC by disabling some features like: use of the MS-DOS command | |||
Updated: 2, 2006 | Rating: 39 | Author: Ixis Ltd | Size: 563 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
64. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
65. | Folder Security Personal 3.5 (y0ys.com) | ||
Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only ,preventing modification or deletion by other users or programs. The program can also lock Floppy, CDrom, USB sticks, and other removable drives or make them read-only. It works with drive of all of FAT/FAT32/NTFS formats. This program | |||
Updated: 2, 2006 | Rating: 666 | Author: Y0YS Software | Size: 803 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
66. | FlowChart.NET 4.0.3 (mindfusion.org) | ||
make FlowChart.NET even more useful. Diagrams can be stored in files, printed on paper, exported to image files, serialized in .NET streams such as memory buffers or network sockets. The control's programming model comprises more than 500 methods, properties, and events. Full source code is available for purchase too, giving you unlimited ability to customize the | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 4943 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
67. | SafeSystem 2006 (gemiscorp.com) | ||
allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. It can make your files and folders completely invisible, inaccessible or simply read-only and prevent the change of configuration and the accidental (or even intentional) system files deletion or | |||
Updated: 2, 2006 | Rating: 0 | Author: GemiScorp | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
68. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
when computers are not being used. It compresses and encrypts backup files using a choice of encryption methods and key lengths: DES, TDES-128, AES-128, AES-192, AES-256, or Blowfish (up to 448 bit key length.) RBackup then sends backup files off-site to the RBackup Server through the Internet | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
69. | Quicknote 5.2 (jens.metz-furniere.de) | ||
this purpose, you have to run the program first, then create a new file, then type a line or two and save the file. Too many things to do in order to simply write down a thought? With Quicknote, it does not matter which programs you are currently using; whenever you want to write something down | |||
Updated: 2, 2006 | Rating: 16 | Author: Jens Müller | Size: 2086 kb | Freeware Go to category: Business > Other Similar programs | |||
70. | Access Administrator 4.14 (getfreefile.com) | ||
your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Touch files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|