Lock Unauthorized Access


Advertisement

WinGuard Pro Free Edition  v.6. 5. 2001

Protect yourself from unauthorized access to your computer free of charge.

Secure your computer by Password protecting your Windows applications, programs and EXE files for Free. Plus encryption for your files, folders and drives - direct from ...

Protegent PC - Complete PC Security  v.12

Protegent PC allows the user to safeguard data from unauthorized access. It prevents vital & important data to be transferred from one PC to another using Flash drive, DVD/CD writers, PCMCIA ports, Ethernet ports, Printer ports, Infrared ports. It provides ...





Advertisement

USB Devices Monitoring Software  v.2.0.1.5

Is there any way to block unauthorized access of USB drives? USB controller software is a simple and convenient way to stop unauthorized access of removable drives on Windows network. Pen drive blocker utility is fully reliable in lock out use of any ...

Encrypt and Go by WinGuard Pro  v.6 5

Protect yourself from unauthorized access to your computer free of charge.

Secure your computer by Password protecting your Windows applications, programs and EXE files for Free. Plus encryption for your files, folders and drives - direct from ...

Kaspersky KryptoStorage  v.1.0.268.0

Kaspersky KryptoStorage securely protects your personal files against unauthorized access and data theft using cutting-edge transparent encryption technology and allows deleted files to be permanently erased from your computer. Kaspersky KryptoStorage ...

Active System Locker

Use System Locker to restrict access to your computer from unauthorized access when you are away. It is fast, secure, and easy to use. System Locker offer flexible configuration options, reminder, scheduler, audit and other useful functions. It starts ...

Cryptic Disk

When a PC/laptop needs repair by specialists,meaning the PC with all the personal information should be given to a stranger,Cryptic Disk is a secure and easy solution for keeping personal files and documents protected against unauthorized access,a tool ...

Hide Secret Files

It is an easy and user-friendly tool to hide and safely protect your private information from erasure and unauthorized access.

Anonymity Shield

Anonymity Shield hides your IP address and prevents unauthorized access to your computer through the Internet. The proxies used do not provide anyone with your IP address and effectively hide any information about you and your reading interests. Additionally, ...

ShareCrypt

ShareCrypt has been designed to effectively and transparently encrypt shared network drives or folders by allowing simultaneous data access to different users and preventing unauthorized access from non-authorized people.ShareCrypt is very easy to use ...

Genie Eyes Only

Genie Eyes-Only is a professional easy-to-use security software that safeguards valuable data and prevents unauthorized access to confidential information using multiple levels of the thoroughly-tested Advanced Encryption Standard (AES) that is used by ...

CyberScrub Privacy Suite tools

Encrypts sensitive data to prevent unauthorized access. Supports MS Office. Integrated scheduler allows program to run when idle?or at set times. This product is tested with Encase forensic recovery software. A Microsoft Shareware Pick of the Week.

Data Terminator

Information Protection software provides Strong File Encryption or Military Grade Unrecoverable Termination to protect your confidential files and folders from unwanted data recovery and unauthorized access to your important business or private information.

Password Page Protection Software

It generates password protection code which is added to the top of a web page to prevent unauthorized access. The protection code is fully processed on the server and no secure information can be sent to the user until a password match is confirmed.

IS Protector  v.2.8.1

IS Protector uses Strong File Encryption EFS and Military Grade Unrecoverable Termination Algorithms to protect your confidential files and folders FROM UNWANTED DATA RECOVERY and unauthorized access to your important business or private information.

Pages : < 1 | 2
Newest Reviews