Softlock. VCDŽ stops almost all known methods used to make illegal copies from the original VCD, as well as the extraction of video tracks to video files using ripping programs.
The most common ways used to pirate and redistribute the VCD:
ˇ Distributing the video files (*.DAT) that exist on the VCD.
ˇ Copying all of the VCD to a new blank CD-R using CD Copier software or hardware.
ˇ Ripping the video tracks.
See also: Softlock.VCD, Softlock, VCD Protection, Software Copyright, Laser Protection
Program Lock Pro 2.09
Lock and unlock any program on your pc, including IE, Outlook, AOL, AIM, and more. You can even lock your control panel with one button click. Other features include the ability to choose your own message to display if anyone attempts to run one of your locked programs, and also includes password protection so only you can unlock the program when you are ready to use it. Allows the entire PC to remain active and running.
See also: access, locking, protection, password, prevent, prevent access, secure, program lock, pc lock, program protect, lockup, lock, security
AVIRA Removal Tool for Windows 2.0.1
AVIRA Removal Tool for Windows v 2.0.1 is a free, easy-to-use disinfection tool, specifically designed to remove a series of security threats from your system, such as Worm.Sober.J/P/Y and W32.Stanit.A
Repairing function: it fixes infected files, only if not severely damaged by the malware's actions.
Simple operation: you simply have to unpack it and then start it by double click.
See also: virus removal, virus scanner, free tool, free, antivirus software, virus, antivirus, trojan horse, virus protection, virus scan, anti virus, phishing, computer security, internet security
Icon Lock-iT XP 3.3
Icon Lock-iT XP, strong file encryption and security for Windows XP, 2000, NT Desktop files. Portable data storage security for iPod and flash drives. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Self-decrypting option lets you send/distribute encrypted files for on-the-go security. Accompanied by Security Suite for increased password security. Configurable user accounts let you decide who can lock files
See also: Lock-it, locking, secure, encryption, lock, password generator, flash drive XP, ipod security, privacy, protection, file, protect, password, 256 bit, ipod, Encryption, desktop
Alkonost ContraCopy 3.00
Alkonost ContraCopy is a professional software system, that can create diskettes for a copy protected software distribution, using an ordinary 1.44 MB floppy drive.
No other hardware or software can make correct copies of ContraCopy diskettes.
Applications protected by ContraCopy run under Windows 95/98/Me/NT/2k/2003/XP.
See also: programming, Delphi, VB.NET, Builder, anti-piracy, security, protection, distribution, diskette, disk, key, authoring
Yet Another Laser Game 1.01
The objective in Yet Another Laser Game (YALG) is simple: Guide your laser through mazes, by placing your mirrors correctly. Unfortunatly, there are all kinds of objects in your way: - Teleporters - Explosives - Color-doors - More objects You are only supplied with a limited amount of mirrors (splitters, prisms, color changing etc). Features: - 50 challenging maps, from easy to hard - Great graphics - Nice background music - Ingame map editor
See also: persistentrealities, deflector, joling, almar, puzzle, maze, mirrors, game, Laser, YALG
Image.InfoCards Viewer 2.1
Use IIC Viewer to access all types of information and meta-data previously embedded in pictures using Image.InfoCards (IIC) technology. Image.InfoCards is 100% transparent to applications. You can embed your memos, data cards, copyright information and even your business card! Organize your collection, build databases, promote your work. Just imagine the endless possibilities. Your images can have their own memory!
See also: share images, scanned images, digital camera, image database, image organization, picture subject, business card, embed data, data exchange, copyright info, image description, meta-data, copyright protection, image licensing
MAGIA HTMLProtector 3.0
See also: web images protection, right mouse click supression, html protecter, html protector, html protection, html encryption, webpage code protection, html view supression, website protection, webpage code protection
Are your data safe? SecuKEEPER strongly lock and secure files and folders with all-in-one encryption,which designing four protection method(hide/lock/encrypt/private coffer) and various security level.Password Generator and Password Manager highly integrated into the all feature module. The PG can generate the strong password automatically.The PM allows you to access required password in a second without remembering. Now, new v2.7 released!
See also: hide folder, hide file, encryption disk, encryption tool, lock file, encryption protect, lock folder, folder lock, encryption file, keeper, secure, password protect, data protection, data security, file encryption, data safe, file lock, encrypt, decrypt, keep
Deskman SE 6.0
Deskman SE allows you to tightly secure desktops and lock computers, and it's suited for both home users and administrators. Combining different options, you can easily achieve the desired level of security. Deskman SE is the most advanced, yet accessible, desktop security manager for Windows 2000/XP/2003.
See also: system restrictions, start menu replacement, desktop lock, desktop security, system protection, desktop protection
AbuseShield will pick up where the Anti-Virus and Firewall fail.
AbuseShield closes this open window by proactivly shielding your system from malware such as viruses before they harm your system.Most malware fighting applications such as virus scanners look for known patterns and need to be updated with recent definitions to detect. The open window metafor also applies to security breaches in Windows while waiting for an update from Microsoft.
See also: protection, scan, block processes, blocker, worms, malware, firewall, trojan, virus, adware, spyware, Antivirus, security, privacy
ShadowStor? ShadowServer? provides high availability for servers so that downtime and the associated costs are minimized. ShadowServer provides a full system recovery in as fast as it takes to reboot. ShadowServer is your first line of defense, reducing the time and cost required to re-install the operating system, restore from an image or recover from a tape. Avoid web server defacement, security leaks and other issues that threaten servers.
See also: disaster prevention, protection, recovery, internet tools, internet, privacy, spyware, disaster recovery, server recovery, server security, server protection, intrusion, snapshot, system utilities, virtual, virtual server
Monitor your system and stop unwanted software. Watchman is now the tool of choice for protecting your system in a reliable way. With a simple interface, Watchman delivers file protection, application usage logging, and access control management. Simple and productive: Stops unwanted applications, Protects system settings, Protects documents from tampering, Monitors application usage, Sends security alerts by e-mail, and much more.
See also: stop software, desktop monitor, desktop security, software monitor, application monitor, file lock, document protection, protect files
MyOdd Desktop Application 2.10
MyOdd is a desktop application that allows you to take control of your desktop and processes currently running on your system.
You can 'show' applications that are running on your system and decide if you want to stop them or at least see what they are doing.
With MyOdd Desktop management software you can hide applications at the click of a button, or even hide groups of applications using a different set of keys.
See also: Security log, Hot key, Hotkey, Desktop management, Windows protection, Windows logs
1 Firewall 1.1
1 Firewall is the no. 1 firewall system for your Windows computer, that can monitor your network activity, block and alert you about unathorized publishers, protect your privacy! 1Firewall lets you be in control of everything happening in your network. You can view a logging activity list, and can decide for yourself if you want to deny access to a certain user, by filtering them according to a defined user access rule.
See also: Security, Protection, Performance, Enhancement, Safety
.Net Decompiler that decompiles /disassembles .Net assemblies from MSIL (MS Intermediate Language) binary format to well-formed and optimized source code (6 languages: MSIL, C#, VB.NET, Delphi.Net J# and managed C++).
See also: decompiler, obfuscator. .net, .net decompiler, .net obfuscator, decompiler .net, obfuscator .net, source code, csharp, vb.net, disassembler, anakrino, .net reverse engineer, ilcode, il-code, msil, decompile dll, c# decompiler, c# decompile, protection
VersyPDF.Delphi is a library for create / modify PDF documents on the fly. VersyPDF.Delphi is a high-quality, industry-strength PDF library meeting requirements of the most demanding and diverse applications. Using VersyPDF.Delphi you can write stand-alone and reliable commercial applications that can read, write, and edit PDF documents.
See also: Delphi, PDF, library, create, modify, protection, jbig2, linearization
swc encrypt 1
SWC Encrypt is designed for those who develop Flash .swc components and want to delivery them in security. SWC Encrypt used encryption technologies that can help user to prevent from the most popular decompiler tools on the market. SWC Encrypt provides high security and protection for your SWC Files. It is very hard to reveal .swc codes from a movie if you use encrypted .swc component in your flash work.
See also: protect swc, protec flash component, flash component, encrypt swc, encrypt flash, component protection, flash component download
Advanced Drive Protector 2.0
Password-protect, hide and lock your local, network, Floppy, CD/DVD and USB drives. Disable the AutoRun feature for selected drives to prevent unauthorized software installations and virus penetration from the removable media. Ensure both security and privacy by protecting drives with sensitive information. Protect the program with a password to prevent unauthorized uninstallation and modification of security settings for regular PC users.
See also: drives, drive, protector, hide, lock, protect, protection, disable, password, autorun, network, usb, local, floppy, disk
CI Video Converter Max 18.104.22.168
Video Converter Max is an easy to use tool to convert your video files to various video formats. The program features are: 1)Easy-to-use design. 2)Support the most popular video formats. 3)Preview the input video files before converting. 4)Automatic generation for output file names. 5)Variety range of encoders and decoders.
See also: Video, Converter, Max, formats, 4X Video, American Laser Games Video, AMV, Apple Animation, Apple Graphics, Apple MJPEG-B, Apple QuickDraw, Apple Video, Asus v1, Asus v2, ATI VCR1, ATI VCR2, Autodesk RLE, AVID DNxHD, AVS video, Bethsoft VID, KMVC