|
||||||
|
||
|
Home > Security software |
|
|
871. | Lockout Desktop Security 1.1.652 (dynamicdesigns.co.uk) | ||
Desktop Security software brings you many ways to secure and lock your desktop. You can define different sets of permissions and restrictions for specific users and groups, control access to certain applications, restrict when your PC can be used, restrict CD usage, log Internet usage, and log attempts at restricted activities. Note: This is a 30-day trial. After 30 | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Wilkinson | Size: 2857 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
872. | Logbook 1.7 (home.t-online.de) | ||
===================================== Logbook fьr Windows 9x/ME Version 1.7 ===================================== Functions: ---------- Registration of working hours on PC including time of boot up, shut down, standby and user change. Resistant to manipulations. Detailed reports and totals of | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 34 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
873. | Love You Not 1.10 (pcshareware.com) | ||
file types. Love You Not! also will increase the default Internet security zone setting used by Windows from "Internet" zone to "restricted sites" zone. This feature provides extra protection from ActiveX controls, keeping them from opening without the user's permission. Microsoft Office macro virus protection: There are over 2,000 identified, catalogued and named Microsoft Office | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Kapusta | Size: 870 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
874. | MacPhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
875. | Magic Folders XP 04.04.2 (pc-magic.com) | ||
Magic Folders makes any folder you choose and all the files in that folder completely invisible to others, even on the network! Your invisible folders and files can't be deleted, viewed, modified, or run. For all practical purposes they don't exist. Use Magic Folders to protect your finances, taxes, and | |||
Updated: 9, 2005 | Rating: 243 | Author: Scott Chaney | Size: 649 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
876. | MagicTweak 3.20 (magictweak.com) | ||
setting (from Start Menu,Desktop,IE skin,System Icon to System Security) that just doesn't seem to be there. With the ability to cutomize almost any aspect of Windows, you can become a Windows expert almost instantly! MagicTweak is a special Tweaking software designed to optimize and personalize Windows XP/2000/Me/9X | |||
Updated: 2, 2006 | Rating: 195 | Author: Albert Hoffmann | Size: 1666 kb | Shareware Go to category: Games & Entertainment > Tools & Editors Similar programs | |||
877. | Masker 7.0.6 (softpuls.com) | ||
Hide files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files without changing the exterior impression | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
878. | Masking Password Generator Pro 3.0 (accusolve.biz) | ||
easy to memorize. Define a mask that incorporates your company security policy and generate passwords as often as you need without any more worry about password policy compliance. The program can reside in the Windows system tray, with a hot-key and default mask defined so that passwords can be generated and copied to the clipboard from within any application. Never before has a | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Peckham | Size: 3205 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
879. | MicroLocked 1.6.3 (jcmatt.com) | ||
is a small, easy to setup, security program that locks your computer while leaving the display visible. Once locked your system can not be accessed until the unlock password is entered. Your system screen saver can be used normally or set to activate when your machine locks. Desktop icons and taskbar can be optionally hidden while locked. Ideal for personal or business use and | |||
Updated: 2, 2006 | Rating: 0 | Author: James Matt | Size: 1630 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
880. | ArchiDoc (3035) (canteco.net) | ||
in paper and electronic files, from one easy screen. Sofisticated Security; Easy-to-install;Version Control;Team work;Office integration;Multy Language interface;Auditing and reporting. As well as (for Oracle product line) Instant back-up; Internet-type access Desktop XML version of the complete ORACLE based document management system, that gives any size enterprise the ability to | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleks Kamyshan | Size: 3991 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
|
Home > Security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|