Program Lock Pro 2.09
Lock and unlock any program on your pc, including IE, Outlook, AOL, AIM, and more. You can even lock your control panel with one button click. Other features include the ability to choose your own message to display if anyone attempts to run one of your locked programs, and also includes password protection so only you can unlock the program when you are ready to use it. Allows the entire PC to remain active and running.
See also: access, locking, protection, password, prevent, prevent access, secure, program lock, pc lock, program protect, lockup, lock, security
AVIRA Removal Tool for Windows 2.0.1
AVIRA Removal Tool for Windows v 2.0.1 is a free, easy-to-use disinfection tool, specifically designed to remove a series of security threats from your system, such as Worm.Sober.J/P/Y and W32.Stanit.A
Repairing function: it fixes infected files, only if not severely damaged by the malware's actions.
Simple operation: you simply have to unpack it and then start it by double click.
See also: virus removal, virus scanner, free tool, free, antivirus software, virus, antivirus, trojan horse, virus protection, virus scan, anti virus, phishing, computer security, internet security
Icon Lock-iT XP 3.3
Icon Lock-iT XP, strong file encryption and security for Windows XP, 2000, NT Desktop files. Portable data storage security for iPod and flash drives. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Self-decrypting option lets you send/distribute encrypted files for on-the-go security. Accompanied by Security Suite for increased password security. Configurable user accounts let you decide who can lock files
See also: Lock-it, locking, secure, encryption, lock, password generator, flash drive XP, ipod security, privacy, protection, file, protect, password, 256 bit, ipod, Encryption, desktop
Alkonost ContraCopy 3.00
Alkonost ContraCopy is a professional software system, that can create diskettes for a copy protected software distribution, using an ordinary 1.44 MB floppy drive.
No other hardware or software can make correct copies of ContraCopy diskettes.
Applications protected by ContraCopy run under Windows 95/98/Me/NT/2k/2003/XP.
See also: programming, Delphi, VB.NET, Builder, anti-piracy, security, protection, distribution, diskette, disk, key, authoring
Image.InfoCards Viewer 2.1
Use IIC Viewer to access all types of information and meta-data previously embedded in pictures using Image.InfoCards (IIC) technology. Image.InfoCards is 100% transparent to applications. You can embed your memos, data cards, copyright information and even your business card! Organize your collection, build databases, promote your work. Just imagine the endless possibilities. Your images can have their own memory!
See also: share images, scanned images, digital camera, image database, image organization, picture subject, business card, embed data, data exchange, copyright info, image description, meta-data, copyright protection, image licensing
MAGIA HTMLProtector 3.0
See also: web images protection, right mouse click supression, html protecter, html protector, html protection, html encryption, webpage code protection, html view supression, website protection, webpage code protection
Are your data safe? SecuKEEPER strongly lock and secure files and folders with all-in-one encryption,which designing four protection method(hide/lock/encrypt/private coffer) and various security level.Password Generator and Password Manager highly integrated into the all feature module. The PG can generate the strong password automatically.The PM allows you to access required password in a second without remembering. Now, new v2.7 released!
See also: hide folder, hide file, encryption disk, encryption tool, lock file, encryption protect, lock folder, folder lock, encryption file, keeper, secure, password protect, data protection, data security, file encryption, data safe, file lock, encrypt, decrypt, keep
Deskman SE 6.0
Deskman SE allows you to tightly secure desktops and lock computers, and it's suited for both home users and administrators. Combining different options, you can easily achieve the desired level of security. Deskman SE is the most advanced, yet accessible, desktop security manager for Windows 2000/XP/2003.
See also: system restrictions, start menu replacement, desktop lock, desktop security, system protection, desktop protection
AbuseShield will pick up where the Anti-Virus and Firewall fail.
AbuseShield closes this open window by proactivly shielding your system from malware such as viruses before they harm your system.Most malware fighting applications such as virus scanners look for known patterns and need to be updated with recent definitions to detect. The open window metafor also applies to security breaches in Windows while waiting for an update from Microsoft.
See also: protection, scan, block processes, blocker, worms, malware, firewall, trojan, virus, adware, spyware, Antivirus, security, privacy
ShadowStor? ShadowServer? provides high availability for servers so that downtime and the associated costs are minimized. ShadowServer provides a full system recovery in as fast as it takes to reboot. ShadowServer is your first line of defense, reducing the time and cost required to re-install the operating system, restore from an image or recover from a tape. Avoid web server defacement, security leaks and other issues that threaten servers.
See also: disaster prevention, protection, recovery, internet tools, internet, privacy, spyware, disaster recovery, server recovery, server security, server protection, intrusion, snapshot, system utilities, virtual, virtual server
Monitor your system and stop unwanted software. Watchman is now the tool of choice for protecting your system in a reliable way. With a simple interface, Watchman delivers file protection, application usage logging, and access control management. Simple and productive: Stops unwanted applications, Protects system settings, Protects documents from tampering, Monitors application usage, Sends security alerts by e-mail, and much more.
See also: stop software, desktop monitor, desktop security, software monitor, application monitor, file lock, document protection, protect files
MyOdd Desktop Application 2.10
MyOdd is a desktop application that allows you to take control of your desktop and processes currently running on your system.
You can 'show' applications that are running on your system and decide if you want to stop them or at least see what they are doing.
With MyOdd Desktop management software you can hide applications at the click of a button, or even hide groups of applications using a different set of keys.
See also: Security log, Hot key, Hotkey, Desktop management, Windows protection, Windows logs
1 Firewall 1.1
1 Firewall is the no. 1 firewall system for your Windows computer, that can monitor your network activity, block and alert you about unathorized publishers, protect your privacy! 1Firewall lets you be in control of everything happening in your network. You can view a logging activity list, and can decide for yourself if you want to deny access to a certain user, by filtering them according to a defined user access rule.
See also: Security, Protection, Performance, Enhancement, Safety
.Net Decompiler that decompiles /disassembles .Net assemblies from MSIL (MS Intermediate Language) binary format to well-formed and optimized source code (6 languages: MSIL, C#, VB.NET, Delphi.Net J# and managed C++).
See also: decompiler, obfuscator. .net, .net decompiler, .net obfuscator, decompiler .net, obfuscator .net, source code, csharp, vb.net, disassembler, anakrino, .net reverse engineer, ilcode, il-code, msil, decompile dll, c# decompiler, c# decompile, protection
VersyPDF.Delphi is a library for create / modify PDF documents on the fly. VersyPDF.Delphi is a high-quality, industry-strength PDF library meeting requirements of the most demanding and diverse applications. Using VersyPDF.Delphi you can write stand-alone and reliable commercial applications that can read, write, and edit PDF documents.
See also: Delphi, PDF, library, create, modify, protection, jbig2, linearization
SYSTEM GATE 1.1
SYSTEM GATE allows you to decide what programs you want to run on your computer and what programs to block. SYSTEM GATEŽ allows you easily create from a list of currently running programs, a " software blacklist " a list of programs you do not want your child to run without your permission. SYSTEM GATE, unlike Windows Task Manager, will provide you more details on what particular programs are running on your computer.
See also: block MSN, block e-mule, block e-donkey, block chat, block games, disable instant messaging, software blacklist, child safety, children safety, software for parents, child, children, child protection, children protection, time restriction, computer control, parent control, system gate, ez off, systemgate, ezoff, .net
Registry Cleaner 1.0
Registry Cleaner is an advanced registry cleaner for Windows that can safely clean and repair problems with your registry in a few simple mouse clicks! Easily fix problems with the Windows registry that are a common cause of crashes and error messages.
See also: Security, Protection, Performance, Enhancement, Safety
Tax Secrets of the Rich 1.0
Learn the tax savings and wealth building strategies used by the rich at http://www.freetaxstrategies.com and take advantage of numerous tax deductions and other asset protection strategies You can reduce your tax bill by thousands of dollars every year. Stop giving your money to Uncle Sam and put it back in your pocket where it belongs. This guide shows you how to reduce your taxable income, protect yourself from lawsuits, and build wealth.
See also: Tax Deductions, Tax Savings Calculator, Tax Reduction, Asset Protection, Lower Taxes
Manco .NET Licensing System 220.127.116.11
Manco .NET Licensing System is powerful licensing and copy protection tools for .NET Windows Forms, WPF, and ASP.NET applications, controls and components. Protection library is available for .NET Framework 1.1, 2.0, 3.0 and .NET Compact Framework 2.0. It uses very flexible licensing schema with following main features: Strong encryption, Time/Usage Limited Evaluation, Flexible license content, Encrypt code and data, Source Code Integration.
See also: .net, licensing, copy, protection, license, encryption, VB.NET
Easy Hide Files 3.06
Easy Hide Files allows hiding files and folders from viewing, accessing and searching completely, so that only you know that those files or folders exist. No matter how particular computer (over local network, from internet or directly) is accessed, those folders stay invisible and safe.
See also: stealth mode, hide files, hide taskbar items, hide taskbar, hide windows, boss, key, hidden, stealth mode, hide files, all folders, password protection, hide folders, sensitive folders, hidden files, best way, hide, folders