Password Protected Lock 2.92
Password Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time and provides an informative message that you can edit as you like. You can have the program power down your monitor.
See also: screen saver, protect privacy, password protection, security computer lock, secure PC, restrict access
EmailObserver is a unique email monitoring software and surveillance tool created for a wide range of users either for ordinary home users or businessmen, corporations etc. With its help you can know the exact contents of email messages sent by your children, spouse or employees. After installation on the monitored computer it will invisibly copy all outgoing emails.
See also: smtp, invisible, redirector, stealth, interceptor, observer, spy, protection, security, mail, monitoring, email
Text2PDF Pilot 1.40
Text2PDF Pilot converts RTF and text documents into PDF files. The program supports different PDF security options, password protection mode (using 40-bit and 128-bit encryption keys), fonts embedding, and different compression modes. Using batch conversion mode, you can convert several documents simultaneously. Command line support is also featured. The program is easy to use and has Explorer-like interface.
See also: security, protection, password, rtf, text, convert, pdf
Web Image Protector 1.0
Web Image Protector protects your images on your Web page from unauthorized cloning or Internet theft. It divides your Web image, including BMP, GIF and JPEG format, into pieces and generates HTML code that displays the whole image, thereby it prevents users from saving the image by right clicking and selecting "Save Image...". It also disables screen capture and page printing so that users have no ways to copy your images.
See also: jpg, jpeg, gif, bmp, slice image, divide, cut, protect web site image, protect web image, copyright, intellectual property protection
CubeSecurity is a complex solution that is designed to prevent an unauthorized using of text and graphical elements (in other words "grabbing") from your web-pages (hyper-text pages). If you need to protect your content from copying or any other form of unauthorized using - this product is the ideal solution for you!
See also: encoding, encryption, protection, grabbing, HTML
Quick Mpeg 3.3
Quick Mpeg is a media player and screensaver for MPEG and AVI files.
It supports password protection, individual movie volume control and
multiple playlists. This program is fast, powerful and easy to use.
See also: avi mpeg screensaver media player mpg password protection security
Password Security Guard 1.0
Password Security Guard is a simple yet powerful program, check out some of the features below.Features: * Saves all your usernames, passwords and the locations they are used at * You only have to remember one password instead of hundreds * All information is encrypted and secure * Copy your username or password with the click of a button * Quick links takes you directly to the website where your password is used
See also: password protection, protect passwords, password program, password security, passwords
Protea AntiVirus Tools, ClamAV version 1.08.00
Protea AntiVirus Tools for Lotus Notes/Domino automatically scans and cleans the message
body, attached files, rich text fields and OLE objects in Domino mail, keeps Domino bases
See also: blocking hostile code, email protection, email virus protection, content security, clam-av, clamav, clam, avast, anti free virus, anti software virus, virus, antivirus for domino, anti-virus, antivirus, anti virus, Lotus Notes/Domino, domino lotus note, domino lotus, domino, notes, lotus, server virus protection, virus security solution, virus scan, check, mail, nsf, base, utilitis
Exe Password 2004
Exe Password allows you to protect any EXE-file with its own password. In doing so, this password is stored directly in the EXE-file. It is extremely easy to add any password to a file: Just select the desired file on the desktop/in the start menu or in Explorer, choose the context menu (right mouse click), select password protection, enter password ? finished. From now on a password must be entered when the EXE-file is started.
See also: Lock, Internet, Explorer, Add Password, File Protection, Protect File, Exe Password, Protection, Password, Security
abylon LOGON 5.5
With abylon LOGON offers abylonsoft a simple and flexible possibility of the Logon at your computer (Only Windows NT, 2000, XP). You can register any certificate smartcard, an USB-Token (e. g. Aladdin eToken) or alternatively also an 'EC MoneyCard' (with chip) and 'Health Insurance Cards'. After insert your 'EC MoneyCard' or 'Health Insurance Card' into the smartcard READER, the Logon occurs completely automatically.
See also: log off, smart card reader, apm, abylon protection manager, 2000, logon, EC card, X.509, certificate, eToken, aladdin, smart card, lock, shut down, screensaver
Folder Security 2.5.0
Folder Security is a software program designed to protect your sensitive data on internal, external and removable drives. The program supports Windows XP, NT, 2000, ME, 98, and 95 OSR2. You can install Folder Security right on your USB external or removable drive and lock/unlock folders at any computer your drive is connected to. Folder Security is very easy to use. Just click the Lock Folders button, select the folder and enter the password.
See also: folder, security, password, protect, protection, lock, hide
Professional approach to protecting, research, document and reverse engineering .Net assemblies! Spices.Net - powerful tool for .Net developers that offers obfuscation, decompilation, analytical and documentation management features. Spices.Net is plugin environment that constantly renewing new possibilities.
See also: decompiler, obfuscator. .net, .net decompiler, .net obfuscator, decompiler .net, obfuscator .net, source code, csharp, vb.net, disassembler, anakrino, .net reverse engineer, ilcode, il-code, msil, decompile dll, c# decompiler, c# decompile, protection
Investor Dictionary 9984921786
This concise and easy-to-use dictionary covers over 4000 internationally recognized investment terms and is perfect for everyone who aims to comprehend English and French financial newspapers and magazines and take into account the latest forms of investing at the level of decision taking. It is truly an indispensable aid for private investors to speak the same language as their bankers do.
See also: dictionary, glossary, sharshakov, 9984927186, Accounting, Adjustable Mortgage Loan, Adjustable Rate Loans Mortgages, Animation, Annuities, Annuity, Antivirus, ARM, Asset Management, Assessment, ATM, Banking, Bankruptcy, Best Refinance Mortgage Rate, Bill Debt Consolidation, Brokerage, Bullion, Cash Settlement, Cash Flow, Cash Loan, Check Processing, Checking Account, Coding, Commercial loan, Commodities Futures Trading, security, Consolidated Debt, Consumer Credit, Credit Advice, Credit Analysis, Credit Card, Credit Debt, Credit Insurance, Credit Line, Credit Management, Currency Trading Account, Data Acquisition, Data Clearing, Data Communications, Data Encryption, Data Exchange, Data Management, Data Processing, Data Protection, Data Recovery, Data Retrieval, Data Storage, Database Administrator, Database System, Debit Card, Debt and Loan Consolidation, Debt Collection, Debt Consolidation, Debt Consolidation Loan, Debt Management, Debt Recovery, Debt Relief, Debt Settlement, Debugger, Deposit Account, Electronic Trading System, Equities, Equity Loan, Equity Mortgage, Equity Refinance, Financial Investing, Financial Investment, Fixed Assets, Fixed Equity Loans, Fixed Rate Mortgage, Foreign Exchange Trading, Forex, Forex Investing, Forex Broker, Forex Trading, FX Trading, Insurance, Insurance Agents, Internet Security, Investing, Investment, Investments, Investor, Lawyer, Life Insurance, Loan Debt Consolidation, Military, Military Training, Money, Mortgage Loan, Mortgage Note, Mortgage Refinancing, Mortgage Refinance Rate, Mortgages, Quality Assurance, Real Estate Mortgage, Refinance Mortgage Rate, Refinancing Mortgage, Risk Management, Savings Bank Account, Second Mortgage Loan, Security, Security Policy, Security Software, Software Quality Assurance, Stock Exchange, Stock Investing, Stockbroker, Stockbrokers, Stock Trading, Stocks Trading, Tax, Technical Analysis, Trading Currency, VISA
ShadowUser provides a safe computing environment by creating a virtual twin of your PC. Place your PC in a virtual session called ShadowMode and surf the internet without a trace. Eliminate spyware, viruses and worms, adware, unwanted cookies and internet history. Instantly undo accidental or malicious changes to your PC. Eliminate changes to your PC that can corrupt your system.
See also: data protection, computer privacy, internet privacy, online privacy, anti virus software, anti virus, adware, anti spyware, spyware remover, spyware removal, spyware, disaster recovery, virtual PC, security
Personalwatchdog introduces unique features regarding privacy protection and data security: encrypt folders using the AES encryption algorithm; control your computer access at windows login or unlock; configure additional security passwords for your user account; remove safely temporary files and clean the recycle bin in an irrecoverable way; configure key sequences for protection on demand; safely remove evidence of your work at computer exit.
See also: privacy protection, data security, top-class protection, exclusive security features, on-the-flight encryption, DOD5020.22-M safe remove algorithm, AES encryption algorithm, computer access control, safe access password, remove evidence
Crisystec Sentry.365 3.0
CrisysTec Sentry takes care of all of your privacy concerns. With state of the art multiple auto stealth, only you would know CrisysTec Sentry is working in the background collecting sensitive data and destroying it LIVE while still maintaining your privacy. You can also use the advanced settings to discover powerful additional cleaning facilities. CrisystTec Sentry comes with a very attractive, XP style interface and is very simple to use.
See also: erase data, locked dll, harddrive, privacy software, gutt man, absolute data destruction, hard drive data destruction, wipe, wipeinfo, secure, killdisk, erase, erasing, wipefile, diskwipe, deletion, cleandrive, evidence eliminator, unrivaled defence, military defence, Internet Security Tools, secure, secure delete, delete, security, privacy, protection, cookies, cache, security suite, guttman, dod, industry, security companies, business security, security, commerce security, security software, private, temp files, web bug, cache, security, stop popups, pop-up killer, popup blocker, ad blocking, stop popup, eraser, clean cache, clean, delete cookie, cookie, temp files, cache, security, popup, maximum security, erase, popup ad filter, popup killer, pop-up killer, popups, stop popups, pop-up, pop-ups, guardwall.com, erase, hide, online privacy, internet privacy, free software, privacy news, privacy software, online privacy, web bug, cookies, erase, privacy, shareware, freeware, internet tools, protection
PrivacyView software encrypts all the Internet files you download including images, movies, cookies, history and temp files. Don't delete history, let PrivacyView software hide your Internet files enabling you to enjoy your private web surfing activities without interruption. Yet, PrivacyView software maintains your privacy by not allowing other users to see these Internet files.
See also: Internet, browser, privacy, encrypt, encryption, file manager, file search, online privacy, Internet privacy, Download Manager, privacy software, file privacy, file protection, privacy protection, private browsing, privacy surfing
BeInSync Pro 3.2.53
BeInSync provides a simple, all-in-one solution for accessing, sharing and protecting your digital life. Using secure private network technology, BeInSync lets you automatically sync documents, photos, videos, and music across your computers. You can share files too large for e-mail with colleagues, friends or family and access your files from anywhere. The online backup gives you peace of mind that your valuable files will never be lost.
See also: Synchronize, backup, share files, remote access, secure storage, data management, business files, personal files, protection
NovaBACKUP Server 10.1.41844
NovaBACKUP 10, NovaStor's award winning software, now incorporates local and online backup coupled with superior disk-imaging disaster recovery technology. With 5GB free online backup for 1 year, NovaBACKUP is the number one choice for simple to use, best-practice data protection. Easy setup and step-by-step wizards make this the perfect tool for you and your company, and a great data protection solution for home and small business users.
See also: novastor, backup, backup software, system utility, disaster recovery, online backup, disk imaging, data protection, dvd backup, blu ray backup, disk backup, amazon s3, ftp, tape, storage, online storage, saas, saas storage, cloud, cloud storage
Visual Studio Decompiler 6.0.02
You wrote a VB.NET application for a client a couple of years ago, but you no longer have the source code of the .NET app. All you have is the EXE deployed on the client's PC. Is there a way you can generate VB.NET source code from the EXE? Skater .NET obfuscator has been expanded with .NET assembly browser and decompiler that converts executable files (EXE/DLL) from Intermediate Language (IL, MSIL, CIL) binary format to C#/VB.NET source codes.
See also: decompile, .net, dll, assembly, application, decompiler, .NET, vb.net, dll, Visual Basic, obfuscator, obfuscation, VB.NET, .NET obfuscator, ilasm, ildasm, code security, code protection, software protection, Visual Studio