Exe Wrapper 2.176
( 553soft.com ) Exe Wrapper allows you to protect any Exe-file with its own password from non-authorized execution. And it can modify the main icon of the .exe file. Exe Wrapper can change the main icon of executable file. Exe Wrapper can also bind special argument to an Exe-file.If you don't want to go on wrapping the exe-file, you can unwrap the exe file to original exe-file with this software. [ www.533soft.com ]
See also: lock exe, protect executable file, exe password, chang exe main icon, bind argument
Exe Guarder 1.842
Protects Exe-file with its own password from non-authorized execution or copy. Add a little more size (about 2k bytes); Custom the password-box notice; Keep the original file icon unchanged.Identify the computer intellectually; Show the password in special time. Can not get original exe file without password; Operate easily; Absolutely safe; Launch with high speed, all operations are in memory; Encrypt all size exe file, from k bytes to M bytes.
See also: encrypte exe file, decrypte exe file, encrypte pe file, add password to exe, lock exe file, protect exe file, protect executable file, lock exe, protect executable file, exe password, chang exe main icon
Exe Guarder 4.1330
With Exe Guarder you can converter normal exe-file to shareware.
Once the executable is protected by exe guarder, you may copy it to another computer as it will stay protected. So you can publish it as shareware (also known as trialware or demoware), which give user a trial period for evaluation.
If you only want to add a password to a program, Exe Guarder is also the best choice because of its high security strength. Exe Guarder can also com
See also: encrypte exe file, decrypte exe file, encrypte pe file, add password to exe, lock exe file, protect exe file, protect executable file, lock exe, protect executable file, exe password, chang exe main icon, bind argument
Excelsior JET for Linux 4.0
Excelsior JET is a complete solution for acceleration, protection and deployment of your Java(tm) applications, certified Java Compatible on a number of Microsoft Windows and Linux (IA-32) platforms.
Excelsior JET Optimizer converts your application's classes and jars into a highly optimized native executable.
Excelsior JET Runtime is a complete JVM that works with both Java classes and the executables produced by the Optimizer.
See also: deploy, obfuscator, obfuscate, protect, performance, accelerate, optimize, JVM, ahead-of-time, native, compiler, executable, binary, java, install
This ASP component creates zip files from files on the server allowing them to be saved or streamed to the browser. Zip files can be split to form spanned archives to allow smaller files to be downloaded. The component also allows the control of binary file downloads. Some file utility functions are included as well as an access code generator. Free trial available.
See also: http, activex, code, access, verify, protect, password, file, download, create, archive, compress, zip, asp
Universal Shield 4.0
Universal Shield 4.0 is the ultimate protection tool for your computer - hide files, folders, and drives, and set access rules using the most flexible security combinations for your precious data. Encryption is processed with the help of nine algorithms. The new version also contains a wizard, which includes an option of restricting personal folders and settings, as well as files/folders/ drives protection, a hiding expert, and a data encryption
See also: protecting folders, protecting files, folder lock, security folder, protect drives, password protect folders, password protect folder, protect files, protect folder, protect folders, hide drives, hide files, hide folder, hide folders, encryption, drives, folders, files, locking, lock, protecting, hiding, protect, hide, lock files, lock folders, folder locker, file locker, secure folder, hiding files, locking folder
Exe Password 2004
Exe Password allows you to protect any EXE-file with its own password. In doing so, this password is stored directly in the EXE-file. It is extremely easy to add any password to a file: Just select the desired file on the desktop/in the start menu or in Explorer, choose the context menu (right mouse click), select password protection, enter password ? finished. From now on a password must be entered when the EXE-file is started.
See also: Lock, Internet, Explorer, Add Password, File Protection, Protect File, Exe Password, Protection, Password, Security
Security Desktop Tool 22.214.171.124
Security Desktop is a security utility that allows you to restrict access to Windows important resources. This utility limits kids time they spend in internet and playing games. It provides folders and files protection.
See also: security, desktop, file, protect, folder, access, restriction, password, administrator, lock, limit, time
Invisible Private Folder 126.96.36.199
The Invisible Private Folder can help you keep your files protected from kids, friends and co-workers. It allows you to add any folders to the virtual invisible private folder. It enables you to block and hide any file or folder you do not want to be accessible to others. There are two user modes: only single user may have got the invisible private folder (the administrator) OR each user can lock and manage his own invisible private folder.
See also: restrict, administrator, password, crypto, encryption, security, access, directory, protect, privacy, protector, file, hide, invisible, folder, private, lock
Folder Security Personal 4.0.289
Folder Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only, preventing modification or deletion by other users or programs. It can restrict access to Floppy, CDRom, USB sticks, and other removable drives by locking them or making them read-only.Version 4.0 comes with proactive spyware defender, and is able to block installation of spyware and adware.
See also: read-only, Hijack, password, control, lock, folder, file, protect, hide, drive, access
Easy File and Folder Watcher 1.0
This software make it easy to watch all file and folder activity on your local (or network) computer, for security or file management.
See also: Manage, file, folder, utilities, security, spy, watch, watching, protect, content, activity
MSI to EXE Setup Creator 188.8.131.52
Setup creator application make .exe installation package using .NET framework (.msi) installer files.Converter program can convert .MSI (Windows installer) format into EXE setup and provides facility to save created executable files to your specified location in hard disk. .NET framework (.MSI) to exe setup package generator utility is an efficient tool to make executable files. EXE installation package builder tool convert MSI into exe setup.
See also: .NET framework, MSI, setup, converter, create, executable, files, convert, Microsoft, installation, package, make, .exe file, format, build, .msi to EXE, download, visual, studio, wizard, generator, creator
MSI to EXE Conversion Software 184.108.40.206
MSI installer to exe installation package creator software provides one click facility to generate your own executable setup from MSI (windows installer) file without need of any technical support. Program takes very less time in conversion process of .msi file into .exe extension installer format. Create exe setup package using .NET framework and safely saves all generated executable setup file in a safe location of hard drive.
See also: MSI, setup, EXE, conversion, converts, Microsoft, .NET, framework, installer, exe, extension, package, generator, build, create, executable, format, generate, installation, converter, file, application
USB Data Leakage Protection Software 220.127.116.11
Data theft protection tool for USB drive prevent you from unofficial data transfer through USB mass storage media. Monitoring software alerts by playing sound when any pen / thumb drive is connected at any machine in local area network. Surveillance tool facilitate administrator to block or change different access permission of USB port and log connected USB disk information with machine domain name, IP, storage capacity, manufacture details etc.
See also: steal, LAN, network, leakage, analyze, theft, protect, USB, record, permission, security, device, block, log, folders, move, data, traffic, display, view, protection, file, monitor, port, transfer, store, information, storage
Flash player,Convert Flash files to Executable file,The executables have a beautiful shape of ellipse or rectangle, Convert Flash files to wallpaper,Convert a whole dirctory of Flash files to Executable files or wallpaper
See also: Flash player, Convert Flash files to Executable file
Enigma Virtual Box 1.30
Enigma Virtual Box is a file system virtualization software that allows to embed multiple files that your application is using into single executable, keep same file workalibity without having embeded files on the disk. Enigma Virtual Box supports any kind of files, Dynamic Link Libraries (*.dll), ActiveX/COM (*.dll, *.ocx), Video/Music (*.avi, *.mp3), Text (*.txt, *doc) and so on. It does not extract temporary files on the disk
See also: embed, bundle, single executable, single file, portable
Alligator Data Guard 1.1.060
Alligator Data Guard is a tool for protecting your confidential information, using AES algorithm with 256-bit key and Haval 256-bit Hash Message Authentication Code (HMAC) to simultaneously verify the data integrity and the authenticity for better security. You can encrypt all your data (file, folder, disk). It is also possible to combine folders and disks into one crypto-file. The encryption process is faster than other encryption software.
See also: encryption software, protect data, encrypt file, encrypt folder, encrypt disk, encrypt data, AES-256 bit key, Haval HMAC 256, best encryption tool, best encryption program, fastest encryption tool, fastest encryption software, best security
KaKa Folder Protector 5.73
KaKa Folder Protector is a powerful and easy-to-use program for protecting your data.It can lock,hide and encrypt any folder including flash disk and removable hard disk.1.Fast and Simple:With one-click protection and unprotection. Instant protection and unprotection2.Strong protection technology:Using 256-bit Blowfish Encryption that can effectively encrypt and lock all your files.
See also: Foder Encryption, File Encryption, Flash Disk Encryption, Encryption Software, Password Protect, Encrypt files, Encrypt Folder, Folder Protector
Repair Inaccessible BKF File 5.4.1
How to repair inaccessible BKF file is the big question mark for everyone who are in front to corruption problems because it can be the big loss of their organization if they lose their valuable files due to some issues.
See also: repair inaccessible bkf file, how to protect bkf corruption, global Backup Solution, bkf repair tool, bkf recovery software, repair bkf files, extract bkf files
Glary Utilities 18.104.22.1682
Glary Utilities offers numerous powerful and easy-to-use system tools and utilities to fix, speed up, maintain and protect your PC. It allows you to clean common system junk files, as well as invalid registry entries and Internet traces. Furthermore, Glary Utilities includes powerful functions such as disk analysis,software uninstaller,startup manager,memory optimizer,system info, duplicate files finder,secure file deletion and more.
See also: Glary Utilities, Glarysoft, Utilities, registry cleaner, registry repair, clean registry, internet privacy, tracks eraser, duplicate file finder, find duplicate files, disk cleaner, cleaner software, repair, improve, fix, remove, protect, configure, tune, speed up