|
||||||
|
||
|
Home > File lock software |
Related keywords: file, lock, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
81. | IE Lock 1.02 (simpliciti.biz) | ||
Lock works right on your desktops, blocking any attempts at inappropriate browsing before they reach the network. IE Lock reduces or eliminates the need for expensive server side hardware and software solutions. IE Lock's "Allow List" ensures your employees gain access to | |||
Updated: 9, 2005 | Rating: 0 | Author: dave campbell | Size: 500 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
82. | SourceGuardian PHP Encoder 5.5 (sourceguardian.com) | ||
Main feature list: + Full Bytecode Encryption - protect your files by removing the original PHP Source Code + Fully encode and deploy for PHP5 (and PHP4) + Choice of Windows/Linux/Mac OS X encoding clients + Command line encoder available now + Encrypt to domain name + Encrypt to IP + License generator for encoded scripts + Easy to use Wizard interface and | |||
Updated: 2, 2006 | Rating: 174 | Author: Sales Department | Size: 3580 kb | Demo Go to category: Web Development > ASP & PHP Similar programs | |||
83. | Spam Trapper for Outlook 1.3.3 (brigsoft.com) | ||
messages will be lost. Additional option makes Outlook to play Mp3 files and other media files. (*) Spam Trapper does not work with Outlook Express. Spam Trapper is a multilevel spam filter for Microsoft Outlook version 2000 and later. It is a plug-in component with clear convenient | |||
Updated: 9, 2005 | Rating: 0 | Author: Rest Alex | Size: 493 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
84. | The Easy Bee 3.1.4 (theeasybee.com) | ||
design the layout of dashboard pages. The product automatically locks all agents that operate on password-protected pages, hiding the gathered content and preventing agent edition. A global password chosen by the user is used to unlock such private content. Files related to private agents are encrypted on the user disk with standard algorithms provided by Windows systems | |||
Updated: 9, 2005 | Rating: 0 | Author: Altercept | Size: 3463 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
85. | TZ Privacy Guard 3.1.0.0 (trackzapper.com) | ||
History, favorite's folders and private information: passwords, credit card numbers, social security number etc. ; can expose a lot of your private information that you would like to protect. Also, Personal interests sites, banking information, stocks you monitor on line bidding, and aucations you are tracking, your surfing habits both on and off the web. this information can be | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 4266 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
86. | VShell 2.2.4 (promaxum.com) | ||
Control Lists allow you to assign the right mix of shell access, file transfer, and application data tunneling to users and groups. Centralized server configuration, options for Kerberos via GSSAPI, end user public-key upload, and triggers for automation of routine tasks reduce hassles for busy system administrators. Integrate this strong security with your existing infrastructure | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 3703 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
87. | Watch Right 2002.0.77 (bpssoft.com) | ||
concerned parent with the ability to "keep an eye" on their child's online activities. Automatically log your child's instant messages, chatroom conversations, email messages, message board postings, and web sites they visit while online. В Watch Right is designed to work invisibly in the | |||
Updated: 2, 2006 | Rating: 0 | Author: Bradley O'Keefe | Size: 2842 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
88. | WiseTerm Telnet/Serial (32-bit) 3.1.2 (johnnypops.demon.co.uk) | ||
tab-stops; char, line, column, rectangle clear/fill functions; line locking; answerback; monitor mode; line drawing; remotely switchable emulation. Supports session logging. Includes a modem dialer and a simple phonebook. When using telnet, you can use your host file, or an edited version of your host file, as a machine directory. Includes printing, and cut and paste | |||
Updated: 2, 2006 | Rating: 48 | Author: John Popplewell | Size: 415 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
89. | Without A Trace Surf Guard 5.91 (tekeffect.com) | ||
today's society it is becoming a daily routine that employee's are being fired for surfing the internet, professors are being arrested after their hard drives are examined and/or husbands and wife's become bitter or divorced after the browser history is revealed. Our Without A Trace Surf | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 4027 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
90. | X2Net WebCompiler 3.0.0.49 (x2net.com) | ||
powerful HTML Compiler produces .exe files for distribution from groups of HTML pages. Built-in ultra fast searching, favorites and history management, page protection, passwords, kiosk mode,form processing etc. Built-in installer/uninstaller, powerful encrytion. System locking to restrict | |||
Updated: 2, 2006 | Rating: 0 | Author: X2Net Staff | Size: 4957 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
|
Home > File lock software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|