Home Contact Sitemap

N5 Net Software Repository

Your one-stop for all your software needs.

Search N5 Net Software Repository:

Search Files



Only Freeware

Sponsor:

Browse:

Areas Of Interest

Authors Area

Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.

Dark Files 6.2.1.1

Security & Privacy :: Access Control

Screenshot:

(Click to Enlarge)

Dark Files can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms : 2000/XP/Seven . Dark Files can work with Network folders and fully supports protection of removable media (such as floppies, CD Roms, DVD, ZIP and some SCSI and RAID drives) on all platforms. This easy-to-use program allows you to protect your files and folders (including subdirectories) in various ways. You can hide them or prevent others from deleting, renaming, executing, or modifying your files in any way. The Wildcard feature allows you to specify which files you want to protect (for example, all EXE or DLL files). The file system protection works independently of the program , so if you even close the program the file protection will still work. Built-in support for multiple user interface allows you to use Dark Files without any change on multi user systems. You can define own settings for each user separately or just define settings for the "Guests group" . If your computer is configured for using by multiple users you can define the list of protected folders separately for each user. If some user has not got own settings the program will apply settings of the "Guests group" to that user. If you are looking for a solid file protection program, look no further.

Specifications:

Version: 6.2.1.1
Author: 1st Security Software Center

License: Shareware
File Size: 4 MB
Last Virus Scan: 2025-11-20
Downloads: 173
Views: 114
Price: $9.95

Installer: Install and Uninstall
Released: 5-20-2014

Recent Changes:
new functions and features

Tags:
security protection protect folder folders files windows password control


Download

download

Buy Now | Visit Home Page

Runs on:

WinXP, WinVista, WinVista x64, Win7 x32, Win7 x64, Windows 8

Requirements:

no special

 

Similar Products:

MYUSBONLY FREE 2007 2.0

Security & Privacy :: Covert Surveillance
img Lock the Bad Guys out of your USB ports with MyUSBOnly; Block Untrusted USB Memory Stick Activity in Office. Prevent data theft by blocking all but your trusted USB storage devices. Stop your files from walking away on thumb drives, mp3 players, flash cards and portable USB hard drives. Secretly log all USB connect, disconnect and files/folders copied, modified, deleted activity. This version is not time-limited!
Windows | Freeware
Read More

MYUSBONLY 9.7

Security & Privacy :: Covert Surveillance
img Lock the Bad Guys out of your USB ports with MyUSBOnly; Block Untrusted USB Memory Stick Activity in Office. Prevent data theft by blocking all but your trusted USB storage devices. Stop your files from walking away on thumb drives, mp3 players, flash cards and portable USB hard drives. Secretly log all USB connect, disconnect and files/folders copied, modified, deleted activity. Multi-user discounts are available.
Windows | Shareware
Read More

WODSFTPDLL 3.8.5

Development :: Components & Libraries
img The Secure File Transfer Protocol provides secure file transfer functionality over any reliable data stream, SSH in this case. It is the standard file transfer protocol for use with the SSH2 protocol. wodSFTPdll library implements client side of this protocol which is reliable and easy to use
Windows | Shareware
Read More

WODSSHSERVER 2.5.4

Development :: Active X
img SSH Server ActiveX component (but also Telnet Server ActiveX as well) that will give you ability to easily add SSH2 (and SFTP) server capabilities to your application, as well as old TELNET server protocol. SSH protocol provides strong encryption of data, and authentication of users over insecure networks, such as Internet. Using it is really easy. Add it to your form (or create instance on the fly), use internal methods to generate pair of keys
Windows | Shareware
Read More

 

HOSTED BY N5 Networks