GiliSoft Exe Lock

GiliSoft Exe Lock 3.0

GiliSoft Exe Lock locks programs so that they cannot be run without a password
5.0  (1 vote)
1.4
5.0 (See all)

Data protection is an absolute necessity for users who want to keep their privacy. There are several ways to do so, such as encrypting files and configuring system permissions. Gilisoft EXE Lock provides another way to do so. It will lock selected executable files so that they cannot be run unless the right password is provided. Locking certain programs will protect the data that can only be opened with those applications.

The application has an intuitive interface. In order to lock an executable file, you just need to drag the file or a shortcut onto Gilisoft EXE Lock’s interface. From then on, you will need to open Gilisoft EXE Lock using the agreed password to run the protected application. The reverse process of unlocking a file is just as easy because the tool automatically recognizes locked files. Then, you can simply select the desired item and press the Unlock button. This program allows using the command line to lock, unlock and run executable files. Unfortunately, such functions are not available from the system’s contextual menu.

If you think that someone could easily remove the protection by uninstalling the tool, there is nothing to worry about, because the program can only be uninstalled by providing the password you set while installing it.

In general, Gilisoft EXE Lock is a fine application. However, you should be aware that it will only make it harder for intruders to access your data. Since it does not protect data but applications, someone can simply copy the corresponding files and open them on another computer. Another possible way is to use portable applications running from a memory stick, for instance.

Pedro Castro
Editor rating:

Review summary

Pros

  • It is easy to use.
  • It provides a different way to protect your data

Cons

  • Its functions are not available from the system's contextual menu.
  • It does not prevent data from being accessed by other means
Info updated on:

SI comments

Thank you for rating the program!
Please add a comment explaining the reasoning behind your vote.
0 comments
Your vote:

Facebook comments