TAG: password, computer, original, bytes, copied, encrypted, launch, exeicon, ,  exe file, password box, exe password, com exe, exeicon com, file being copied, exe password exeicon,
Best Search Category: small business software, project software, software design, software for business, software developers, inventory control software, invoicing software, erp software, manufacturing software, software inventory, inventory software, property management software, asset management software, crm software small business, software solutions
ExeIcon.com Exe Password

License / Price:
Shareware / 29.95 $
Category :
Utilities / Others
Requirements :
Publisher / Limitations:
exeicon.com /
Size / Last Updated:
566KB / 2008-03-21
TAG: password, computer, original, bytes, copied, encrypted, launch, exeicon, ,
exe file, password box, exe password, com exe, exeicon com, file being copied, exe password exeicon,
Operating System:
Win95,  Win98,  WinME,  WinNT 4.x,  Windows2000,  WinXP,  Windows2003
Download:
Download
Publisher's description - ExeIcon.com Exe Password
Rate
 
 
 
 
 
12 Ratings  
  ExeIcon.com Exe password lock exe file to protect it from non-authorized execution or copy. Add a little more size (about 2k bytes); Custom the password-box notice; Keep the original file icon unchanged.Identify the computer intellectually; Show the password in special time. Can not get original exe file without password; Operate easily; Absolutely safe; Launch with high speed, all operations are in memory; Encrypt all size exe file, from k bytes to M bytes. Exe-file encrypted will show password dialog box before launching exe-file. You are allowed to set the password caption and wrong password notice. The encrypted exe-file can distinguish your computer from others. So if you set ' Needn't password on my computer', then there will be no password needed on your computer. But when the file is copied to other computers the password-box will pop-up every time before running. This will forbid the exe-file being copied to other computers without your authorization. It also allows you to give someone a limited evaluation. For example, if you want others to launch your exe-file before 01/01/2005, the password box will not be shown before this date. But after that, the password will popup when others try to launch it. It protects your exe-file with high strength encryption. But the exe will keep it's original characters such as structure, icons, resources, sections and so on, with only a small size increased ( about 2k bytes ). You can copy your encrypted exe-file to any computer. And needn't worry about the file being copied. But do not forget your password. We can not help you if you lost your password. Certainly, if you provide the password, the exe-file can be decrypted easily. The decrypted exe-file will be the same as the original one.
 
 

Also see ...


...in Utilities

1)    DCA archiver 1.0 by Andrew Kletkin- Software Download
 New archiver with good compression and interface....

2)    Exchange Keyfinder
 Exchange Keyfinder finds your lost Exchange product key from a current installation of Exchange Server. This product is part of a suite of products that find your product key for Windows, Office, .NET studio, and all Microsoft Server products....

...in Others

1)    DebitPro
 DebitPro for Windows operating system, developed by Patrice Rozet, is a software designed for the panel's sawing up calculations. It enables you to maximize the use of panels of plywood and lumber by generating the most optimized cutting diagrams. The use of DebitPro makes the wood panel's sawing up creation easier as well as those of the various materials (glasses, metals and so on ...). It saves also a considerable amount of time and a profitability improvement by ending the panels wasting and...

2)    NT Perfect Companion
 Perfect Companion is a system utility that will help you maintain the integrity of your Registry. It's especially useful for PCs that have lots of software installed and uninstalled, as it cleans up the garbage left by many uninstallers. Registry scans are thorough and revolve around finding and removing invalid keys, and making sure that .dll and .ocx files are properly registered. An undo file is created that allows you to easily reverse the changes if a problem arises from any of the modifica...

 

 

Related tags:
Advertisement