Protection of your system from external attacks and unauthorized access. Such activities involve deletion of system files, unauthorized altering the contents of user documents, etc. It prevents unauthorized access to user data (documents, address books, registry data, etc.) and protects them against loss or damage.
IBE Palm SafeHold is designed to secure your personal information on your Palm. Personal Information Management: you can store and encrypt your personal information, other people can never access the data.
Protection of your system from external attacks and unauthorized access. Such activities involve deletion of system files, unauthorized altering the contents of user documents, etc. It prevents unauthorized access to user data (documents, address books, registry data, etc.) and protects them against loss or damage.
126. Gatekeeper
Do you want to be able to put out trial versions of your software with out fear that people will find a way to continue to use it without paying for it? DetailsDownload trial (Demo: 142 KB) Buy now ($109.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Stratus Software Inc
127. ActOnce BX
ActOnce BX is specialize for people need to launches a number of program with custom control the thread priority, timer, run once, startup. DetailsBuy now ($15.00) Find similar
Platform: Windows 2000, Windows XP, Windows ME, Windows Server 2003, .NET Framework 1.0( SP2 )/1.1/Microsoft Data Access Components 2.7(MDAC)
Vendor: LAU HAN CHING
1,001 Essential Turkish Idioms is the first and only book of its kind for English-speaking Turkish-language learners -- and represents the crème de la crème of our multimedia Turkish-idioms encyclopedia on CD (and online). These are the idioms you'll hear and see wherever you go, whoever you meet, whatever you read -- in the language of the people not of the textbooks!
DetailsBuy now ($11.95) Find similar
Platform: Book supplement for LPT CD
Vendor: four country computing
Protection of your system from external attacks and unauthorized access. Such activities involve deletion of system files, unauthorized altering the contents of user documents, etc. It prevents unauthorized access to user data (documents, address books, registry data, etc.) and protects them against loss or damage.