Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1621)
- Business (4268)
- Communications (1275)
- Desktop (189)
- Development (614)
- Education (177)
- Games & Entertainment (714)
- Graphic Apps (690)
- Home & Hobby (107)
- Network & Internet (579)
- Security & Privacy (529)
- Servers (65)
- System Utilities (11778)
- Web Development (291)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
Dark Files 6.2.1.1
Security & Privacy :: Access Control
Dark Files can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms : 2000/XP/Seven . Dark Files can work with Network folders and fully supports protection of removable media (such as floppies, CD Roms, DVD, ZIP and some SCSI and RAID drives) on all platforms. This easy-to-use program allows you to protect your files and folders (including subdirectories) in various ways. You can hide them or prevent others from deleting, renaming, executing, or modifying your files in any way. The Wildcard feature allows you to specify which files you want to protect (for example, all EXE or DLL files). The file system protection works independently of the program , so if you even close the program the file protection will still work. Built-in support for multiple user interface allows you to use Dark Files without any change on multi user systems. You can define own settings for each user separately or just define settings for the "Guests group" . If your computer is configured for using by multiple users you can define the list of protected folders separately for each user. If some user has not got own settings the program will apply settings of the "Guests group" to that user. If you are looking for a solid file protection program, look no further.
Specifications:
Version: 6.2.1.1 |
Download
|
Similar Products:
Security & Privacy :: Covert Surveillance
Lock the Bad Guys out of your USB ports with MyUSBOnly; Block Untrusted USB Memory Stick Activity in Office. Prevent data theft by blocking all but your trusted USB storage devices. Stop your files from walking away on thumb drives, mp3 players, flash cards and portable USB hard drives. Secretly log all USB connect, disconnect and files/folders copied, modified, deleted activity. This version is not time-limited!
Windows | Freeware
Read More
Security & Privacy :: Covert Surveillance
Lock the Bad Guys out of your USB ports with MyUSBOnly; Block Untrusted USB Memory Stick Activity in Office. Prevent data theft by blocking all but your trusted USB storage devices. Stop your files from walking away on thumb drives, mp3 players, flash cards and portable USB hard drives. Secretly log all USB connect, disconnect and files/folders copied, modified, deleted activity. Multi-user discounts are available.
Windows | Shareware
Read More
Development :: Components & Libraries
The Secure File Transfer Protocol provides secure file transfer functionality over any reliable data stream, SSH in this case. It is the standard file transfer protocol for use with the SSH2 protocol. wodSFTPdll library implements client side of this protocol which is reliable and easy to use
Windows | Shareware
Read More
Development :: Active X
SSH Server ActiveX component (but also Telnet Server ActiveX as well) that will give you ability to easily add SSH2 (and SFTP) server capabilities to your application, as well as old TELNET server protocol. SSH protocol provides strong encryption of data, and authentication of users over insecure networks, such as Internet. Using it is really easy. Add it to your form (or create instance on the fly), use internal methods to generate pair of keys
Windows | Shareware
Read More




