|
||||||
|
||
|
Home > Protecting software |
Related keywords: protecting php code, protecting software |
|
|
721. | Encrypt PDF Command Line 2.1 (toppdf.com) | ||
this password will restrict you based on how the PDF was password protected (printing may be disabled, for instance). Encrypt PDF software allows you to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) existing | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 34 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
722. | Find Protected 2.0 (aks-labs.com) | ||
Protected designed to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
723. | EndTask Pro 2.00.0123 (products.asynchrony.com) | ||
user to walk around and take a break. It's important to relax and protect your invaluable health! A UNIQUE pop-up blocker, task manager, System/Internet connection monitor and more! Avoid killing the pop-ups you want. Pop-ups are hidden, you can take a peek and decide whether to show them, or wait and they will be blocked after a few | |||
Updated: 9, 2005 | Rating: 16 | Author: Osama Abdel-Karim | Size: 1507 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
724. | Enforcer 6.2 (posum.com) | ||
and corporations, big and small, around the world to effectivily protect their investment and keep their support costs low. Enforcer provides security for systems that are accessible to many people and require a consistent configuration and a consistent, limited selection of services such as public displays or computer | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1566 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
725. | Excel Password Recovery 1.0L (intelore.com) | ||
passwords to the Microsoft Excel 2003/XP/2002/2000/97/95 documents protected with password for open. The program supports the "brute-force" attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program automatically saves password searching state and can resume an interrupted attack (after a stop, crash, etc.) Excel Password Recovery is a program to recover | |||
Updated: 9, 2005 | Rating: 242 | Author: Mr Intelore | Size: 609 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
726. | EXEsafe 2 (members.aol.com) | ||
timing system, username, or a combination of all three. When the protected program is run, the EXEsafe lock will process all the information, and decide whether access should be allowed. If not, a customisable message is shown, and the program will not decrypt or run. EXEsafe itself can be protected from unwanted access. Locking programs is simplified by the drag and drop | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
727. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
728. | Eyes Care 1.0 (paqtool.com) | ||
Care is designed for the computer users to protect eyes while using computers, especially for those who usually keep sitting in front of a computer for more than 1 hour. While using computers, either playing games or designing or programming, users are always "forgetting" the time. It is dangerous for us to neglect the damage to health caused by the long time sitting and staring | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor He | Size: 723 kb | Shareware Go to category: Desktop > Similar programs | |||
729. | EzCrypt+ 2.01 (kmgi.com) | ||
and your file will be converted into self-expendable password-protected file. For you, opening the file will be as easy as clicking the file and typing in your password, but for a hacker it would become an impenetrable fortress. “Encrypt and e-mail” option allows you to encrypt and send your file in one click. What’s more, EzCrypt+ incorporates compression functionality | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Konanykhin | Size: 616 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
730. | F-Secure Anti-Virus 2004 2004 (f-secure.com) | ||
combined with a fast and automated updating mechanism, your PC is protected within a few hours after a new virus has been found in the world. Easy to install and use F-Secure Anti-Virus 2004 is extremely easy to install and use (available in English, Finnish, Swedish, German, French and Italian). As the software is highly automated, you don't have to learn to use it or | |||
Updated: 9, 2005 | Rating: 34 | Author: F-Secure Corporation | Size: 6866 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
|
Home > Protecting software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|