|
||||||
|
||
|
Home > Protecting software |
Related keywords: protecting php code, protecting software |
|
|
791. | Enforcer 6.2 (posum.com) | ||
and corporations, big and small, around the world to effectivily protect their investment and keep their support costs low. Enforcer provides security for systems that are accessible to many people and require a consistent configuration and a consistent, limited selection of services such as public displays or computer | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1566 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
792. | Evidence Destructor 2.14 (emailarms.com) | ||
represents danger to you if it is discovered by somebody. To protect yourself, use Evidence | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
793. | Evidence Exterminator 2.14 (softstack.com) | ||
Evidence Exterminator cleans all PC usage history information. Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
794. | Evidence Killer 2005 1.0 (securedisk.netfirms.com) | ||
lists for popular applications, can recover HD space, and many more. Protect your privacy with Evidence Killer 2005 and completely eliminate sensitive data! Evidence Killer 2005 completely eliminates all hidden evidence of activites on your computer. Protect your privacy with Evidence Killer 2005 and completely eliminate sensitive | |||
Updated: 2, 2006 | Rating: 82 | Author: Solution inc | Size: 2060 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
795. | Excel Password 9.0.5351 (lastbit.com) | ||
also occur if someone who does not work with you anymore password protects your vital information that is absolutely necessary to retrieve. The program features various approaches to the password recovery problem, from straightforward brute-force attack and dictionary search, to unique Guaranteed | |||
Updated: 3, 2006 | Rating: 685 | Author: Vitas Ramanchauskas | Size: 774 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
796. | Excel Password Recovery 1.0L (intelore.com) | ||
passwords to the Microsoft Excel 2003/XP/2002/2000/97/95 documents protected with password for open. The program supports the "brute-force" attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program automatically saves password searching state and can resume an interrupted attack (after a stop, crash, etc.) Excel Password Recovery is a program to recover | |||
Updated: 9, 2005 | Rating: 242 | Author: Mr Intelore | Size: 609 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
797. | Recovery for Excel 3.0.0543 (officerecovery.com) | ||
modern file versions (Excel 2003/XP/2000/97/95/5.0). Fixes password-protected files (is password is known). Available for Windows 95/98/NT/2000/ME/XP/2003 | |||
Updated: 2, 2006 | Rating: 0 | Author: Recoveronix | Size: 951 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
798. | EXEsafe 2 (members.aol.com) | ||
timing system, username, or a combination of all three. When the protected program is run, the EXEsafe lock will process all the information, and decide whether access should be allowed. If not, a customisable message is shown, and the program will not decrypt or run. EXEsafe itself can be protected from unwanted access. Locking programs is simplified by the drag and drop | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
799. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
800. | Eyes Care 1.0 (paqtool.com) | ||
Care is designed for the computer users to protect eyes while using computers, especially for those who usually keep sitting in front of a computer for more than 1 hour. While using computers, either playing games or designing or programming, users are always "forgetting" the time. It is dangerous for us to neglect the damage to health caused by the long time sitting and staring | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor He | Size: 723 kb | Shareware Go to category: Desktop > Similar programs | |||
|
Home > Protecting software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|