|
||||||
|
||
|
Home > Password list software |
Related keywords: password, list, mailing list, Password, password manager, password protection, password recovery, password generator, to do list, password keeper |
|
|
51. | D_back 1.60.3 (svap.pp.ru) | ||
stack) for any kind of your data. The management of of the file list is simple and flexible. Included and excluded files are specified separately, wildcards (* ?) are allowed in all paths and file names. The program is ideal for automatic unattended backing up. The software distribution kit contains command-line backup utility and backup scheduler which allow you to organize | |||
Updated: 2, 2006 | Rating: 0 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
52. | Broken Cross Disk Manager 3.81 (broken-cross.com) | ||
thumbnail or other information, to identify them more easily. Add password-protection to protect items in your database. To search for files, you can open multiple search dialogs with options for date, size and categories. The fast search function supports as well wildcards. Once you found a file, you can open or copy it directly from within the program. The program can | |||
Updated: 2, 2006 | Rating: 0 | Author: Kevin Fucik | Size: 893 kb | Shareware Similar programs | |||
53. | Broken Cross Disk Manager 3.81 (bcdm.broken-cross.com) | ||
thumbnail or other information, to identify them more easily. Add password-protection to protect items in your database. To search for files, you can open multiple search dialogs with options for date, size and categories. The fast search function supports as well wildcards. Once you found a file, you can open or copy it directly from within the program. The program can | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin Fucik | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
54. | BlazingTools Perfect Keylogger Lite 1.15 (blazingtools.com) | ||
computer? Some applications of the keylogger: - Monitor children’s activity for parents - Monitor what programs opened and when - Recall what you wrote some time ago - Special purposes Features: - Invisible in Task Manager List - Logging texts typed in every application (including passwords and other hidden texts) - Log file is encrypted and can be protected with a | |||
Updated: 2, 2006 | Rating: 75 | Author: BlazingTools Software | Size: 172 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
55. | BackToZIP 7.10 (OnlineTimer.de) | ||
individual files, creating self-extracting archives and provides password protection of archive files. This makes BackToZip the ideal tool for everyone who wants to backup data quick and hassle-free. Inspite of the simple usability, BackToZip offers even more powerful functionality: - Creation of Backup Profiles - Scheduled backups with Windows Scheduled Tasks - Control via Command | |||
Updated: 2, 2006 | Rating: 0 | Author: Mathias Gerlach | Size: 3217 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
56. | Auto Backup 2.4.3.873 (han-soft.biz) | ||
to original or new location. Auto backup Integrated compression and password. You can create self-restore archive. Flexible backup date and time are specified to backup automatically. You can start backup and restore manually at any convenient time. It can work as a Windows NT/2000/XP service too, you can backup your data without being properly logged into your computer. Features | |||
Updated: 2, 2006 | Rating: 0 | Author: JING YU HAN | Size: 1816 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
57. | Anti-keylogger 7.1.1 (anti-keyloggers.com) | ||
of very different operation principles. Due to the Anti-keylogger's protection spy software will not be able to record and steal your sensitive information, passwords, logins, PIN (Personal Identification Number) etc. Anti-keylogger works transparently for the user and silently, asking the user no questions thus excluding user's probability of error when making a | |||
Updated: 2, 2006 | Rating: 107 | Author: Raytown Corporation LLC | Size: 2979 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
58. | Anti-keylogger 7.1.1 (anti-keyloggers.com) | ||
of very different operation principles. Due to the Anti-keylogger's protection spy software will not be able to record and steal your sensitive information, passwords, logins, PIN (Personal Identification Number) etc. Anti-keylogger works transparently for the user and silently, asking the user no questions thus excluding user's probability of error when making a | |||
Updated: 2, 2006 | Rating: 82 | Author: Raytown Corporation LLC | Size: 2979 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
59. | Access Administrator 4.14 (softheap.com) | ||
protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user "Admin" has | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
60. | Access Administrator Pro 4.14 (getfreefile.com) | ||
to predefined schedules. It means that each user has his own list of allowed and disallowed files and folders within certain time periods. The program does not modify your media: in protecting your files, it just uses a high-reliability VXD driver working at Windows kernel level. This guarantees that Access Administrator Pro will never lose your data. Controls access to files and | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Password list software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|