Advertisements
 
 
  You'll find a complete list of Access Control software at Download Center WaySofts See all products in this category.   You can download free or buy online them.
word religion data recovery svcd

Access Control

PREVIOUS     NEXT

Outlook Express Protector  Outlook Express Protector

 Outlook Express Protector is designed for controlling access to Outlook Express and its e-mail and address data bases. It does not encrypt protected files and folders, however no programs can get access to them when the program is active. When you try to start Outlook Express or open Address Book, the program requests you to enter a password to grant access. If a user does not enter a valid password or cancels the authentication dialog box, Outlook Express or Address Book will not be opened and the data files will not be accessible for any third-party applications. This means that if Outlook Express Protector is active, nobody can steal or spoil your data you have in your Outlook Express....

TermiNET - Personal Firewall  TermiNET - Personal Firewall

 TermiNET combines power and advanced features with a remarkably easy-to-use interface. With TermiNET, you'll have...

TravelPrintTSE  TravelPrintTSE

 Targeted to the Microsoft-centric enterprise, the TravelPrintTSE technology is the ultimate companion to Windows Terminal Services in Windows 2000 Server and Windows Server 2003. In addition, the TravelPrintTSE native support for the RDP protocol to access applications allows customers to preserve their investment in Microsoft IT infrastructure. With the TravelPrintTSE Universal Printer, organizations of any size can now eliminate the time and expense associated with managing printer drivers within the Microsoft Terminal Server environment. When the administrator generates the user connection Client on the user USB key the physical serial number of the device is used to protect any misuse of this program. If some one with ill intentions copied the program on another USB key or his own disk drive this program will not operate. Also, everything is located on the USB key, nothing is installed on the guest client workstation and all session traces are deleted from the hard disk drive when ...

My Simple Desktop Home Edition  My Simple Desktop Home Edition

 My Simple Desktop (MSD) is a desktop security tool that permits you to restrict computer use while allowing access to selected resources. MSD is designed for all kinds of users and environments. That's why three different editions are available: Home Edition, School Edition and Office Edition. MSD is a powerful, yet easy-to-use security solution that permits administrators to protect desktops the way they need, and make sure users have a simple way of accessing permitted resources. - Stop students/workers/family members from messing with desktop settings and wasting time. - Decide which programs are available to users. Make it easy to run them. - Limit access to desktop icons, Taskbar, the Start Menu, drives, keys... - Control the amount of time your family spends in front of the computer. - MSD has been designed for simplicity. You don't need to be an expert....

LandlordBG.com Secure Deletion  LandlordBG.com Secure Deletion

 www.LandlordBG.com presents Secure File Deletion. Paranoia dictates that sometimes when we want a file deleted, we want it to stay deleted so that no one can remove our hard disks and find any magnetic remnents of files we have created and later deleted. Our government insists that three rewrites of the file are sufficient to destroy the image. SecureDelete assumes the government standard is false and that it takes more to accomplish a total erasure of the file. SecureDelete rewrites the file 100 times, saves it to disk each time, and finally deletes it. If this file can be accessed it should contain only chr(126) as readable characters. The original file is now forever erased and a disk reader will find only ~ characters on disk where the file used to be. If you have a need to securely delete a file, SecureDelete will do it for you. Check www.landlordbg.com for updates....

KeyboardLocker  KeyboardLocker

 Disables the keyboard, leaving the mouse active. An exit phrase must be entered before the keyboard is reactivated. Can be used to secure dedicated servers, or to show a DVD to a small child without them destroying your computer! Once KeyboardLocker is enabled, you can ONLY use the keyboard to type in the Exit Phrase. You can use the mouse to start your DVD movie playing. You can also copy the short cut for KeyboardLocker into the StartUp folder so that your computer is automatically locked when it boots up! Use KeyboardLocker... - to secure dedicated servers (such as university print servers) - to prevent both USB and PS/2 keyboard input on Internet and Photo kiosks - to protect running processes when the keyboard is cleaned by janitors - to stop keyboard input when desktop macros are running - in a home user environment, e.g. to show a DVD to a small child without them destroying your computer. There are several ways you can start KeyboardLocker:   "c:Program FilesKeyboardLockerKeybo...

Website Blocker  Website Blocker

 Website Blocker has the ability to block or allow access to selected websites preventing the user from accessing unauthorized websites and wasting company time doing things they shouldn't be doing....
 Advertisements

Comvigo Internet Filter and Firewall Pro  Comvigo Internet Filter and Firewall Pro

 Comvigo Internet Filter and Firewall Software - Messenger Blocker, P2P Blocker, Internet Filter, IM Firewall, P2P Firewall, Internet Content Filtering. Are your employees chatting on instant messenger and surfing the web all day? Are your children on MySpace or MSN Messenger when they should be doing homework? Is Spyware transmitting your identity over the internet, unknown to you? IM Lock 2008 is a powerful instant message blocking, P2P blocker, internet content filtering, Internet Monitor, and TCP Firewall software for Business, Education, and Home use. Protect Your Computers, Save Time, Save Money, Protect Your Personal Information, Protect Your Identity. Free Trial, 30 Day Money Back Guarantee IM Lock 2008 is used by thousands of Businesses, Universities, and Homes in over 70 Countries. Get Control! IM Lock 2008 prevents unwanted instant messaging and web surfing. IM Lock blocks instant messaging, Block MSN Messenger, Block P2P, streaming media, selected web browsing, and more. IM ...

Hide Secret Files  Hide Secret Files

 Hide Secret Files is a security product based on an unequalled data hiding method. As a result of many years research within our company, this product hides and safely protects from erasure your private information. Would you be happy to find your priceless financial plans, your personal ideas or projects, your private photos or movies fallen in unwanted hands, altered or erased? Hide Secret Files is the ultimate tool allowing you to have exclusive secured access to sensitive information based on a password. No one except you, who know the password, will be able to access the secured data. Not even your own operating system will have permission to alter the information. The latest, and one of the most annoying secondary product of nowadays Internet evolution, the spy-ware activity, is absolutely inoffensive against the protection guaranteed by Hide Secret Files The hidden data won’t be visible even for your own OS so the Safe Mode booting or moving the hard drive in another PC won’t ma...

ZIP Pointer  ZIP Pointer

 ZIP Pointer will lookup USA and Canada towns by ZIP, postal code or name and show them on a North American map. This helps you to check customer information, verify postal addresses, and reduce credit card fraud. Using the program is simple. Just enter a ZIP Code, and the program will give you the matching city, state, latitude, and longitude....

Arts and Entertainment CHMOD Calculator  Arts and Entertainment CHMOD Calculator

 Free download of arts and entertainment, photography, astrology, humanities, humor, movies, music, performing arts, philosphy, poetry, CHMOD calculator, security & privacy, access control, encryption tools, CHMOD....

Detective  Detective

 Detective is Omniquad's solution for organizations and individuals who are concerned about how and for what their computer systems were used. It examines computer activity BACKWARDS, detects illicit content and then displays a detailed log for inspection describing what illicit material was stored, when and where. In addition to the existing extensive vocabulary set, user input is also supported. This option makes it more versatile and gives you more control. Detective is an invaluable management tool for System Administrators and indeed all concerned users who are worried about the activities on and contents of the systems they manage or are responsible for. In addition to being a wonderful way to protect your privacy and delete traces of confidential information, the latest version also allows you to restore the original last access date of a file after analysis making the use of this program truly unobtrusive....

IM Lock Professional  IM Lock Professional

 IM Lock is a powerful desktop internet policy software for employers and parents. IM Lock blocks Instant Messengers, P2P Filesharing, Streaming Media Applications, Onling Gaming, Chat Rooms, Blogs, Browsers, and more....

SiteKiosk  SiteKiosk

 This feature-packed package is designed for public access stations and turns any PC into a kiosk. Users can only access sites, applications, and settings you approve through a shell you design. You can command SiteKiosk and extend its functionality via scripts, objects, and ActiveX controls, or simply configure it with wizards. Wizards let you assign individual access rights and export profiles to new users. On start-up, SiteKiosk replaces the current system shell with its own. You determine start and search pages, screensavers, applications to run, e-mail, downloads, surfing, keyboard, and even touch-screen control. You can schedule to reboot and shut down to maintain your terminal. The SiteCash plug-in lets you charge customers, using all kinds of payment devices. The software uses Internet Explorer as its basis but presents a much simplified interface that even the novice user will understand. Some of the features included: Multiple-window support, multilanguage support, automatic d...

ID Folder Protector  ID Folder Protector

 ID Folder Protector is a very easy to use program, designed to help you maintain the privacy of your personal data. It locks, hides, encrypts and protects from viruses, Trojans and spyware, files and folders you wish to keep for your viewing only. Main Features: - Locks private folders - Encrypts selected files - Hides files extremely well - Erases PC tracks - Manages the bandwidth for an application Detailed features: - ID Folder Protector is a high performance locking program, keeping your personal files out of reach from any third party. - Locks an indefinite number of files and folders. It keeps them away from other users, preserving them safe from being altered or deleted. - Hides the main application from the tray, taskbar and desktop, from start and context menu, quick launch and even from add/remove programs in the control panel. You can select or unselect this option from inside the program only. - Encrypts selected files so that the content is then modified and impossible to ...

1st Security Administrator  1st Security Administrator

 Protect PC, restrict access to Windows applications and password-protect boot with 1st Security Administrator. This is the best password-protected security utility to apply access restrictions to PC, and to protect your privacy stopping others from tampering with your desktop. Deny access to Control Panel and its applets, disable interruption boot keys securing boot, context menus, DOS, Registry editing, Internet and Network access. Hide desktop icons, individual drives, Start Menu items, taskbar, task manager, tray icons. Apply password protection to Windows and restrict users to running applications. Control Internet Usage, spy on PC users. Security restrictions can be applied universally or to specific PC users. 1st Security Administrator is very simple and easy-to-use as well as very functional and useful....

Email Spy Monitor 2007  Email Spy Monitor 2007

 Have you ever wondered what your spouse, kids or employees have been doing on the computer and Internet? Is your spouse engaging in online sexual conversation while you are asleep? Are your kids taking secret chat conversations with an adult stranger? Are your employees emailing your business secret to your competitors? If you DO worry about these issues, you need a spy software. Email Spy Monitor spy software secretly monitors and records all emails opened in popular email clients, such as Microsoft Outlook 2000/XP/2003/2007, Microsoft Outlook Express 5/6, Windows Vista WinMail and IncrediMail. The re-check merchanism can ensure you get the whole super-large emails, and prevent you from getting the same message repeatedly. You can show all messages in Email Spy Monitor directly, export these messages to HTML files in a directory for later analysis, or send a report to your custom email address or FTP server. Everything will be recorded without being detected. It is especially useful f...

PC Control  PC Control

 PC Control allows the system administrator (aka, Parent) to establish access controls for each username. For each day of the week, the administrator sets access times, as well as the total length of time available for use. The program is based upon a "set and forget" philosophy. Setting controls requires <1 min per user. Once set, the administrator can forget. The program requires no ongoing actions to operate. There are no daily authorizations, tokens, or other actions. The program does not control access to the Internet or system resources. It does not block access to any specific web site of program. It does work well with other parental control programs that provide these functions. The program works whether the user is on the Internet or not....

HidesFiles  HidesFiles

 The program allows making your personal files invisible to file managers and search software, thus protecting your data from unauthorized access. No matter how you access the computer drives - directly from Windows Explorer, over a local network or Internet, the hidden folders remain invisible. Moreover, the program can be used to hide files on removable media: floppy disks, flash drives and transfer them from one computer to another. The HidesFiles employs a unique technology that does not require installing drivers or services, unlike other similar software. This simplifies installation and usage (no need for Administrator rights) and protects your files in case somebody uninstalls services or drivers receiving access to the hidden files. FAT, FAT32 and NTFS file systems are supported. The HidesFiles program can be uninstalled from the PC and all hidden files will remain hidden. The program is protected by a startup password, so no one except you can view the list of hidden files. Th...

Disk Drive Administrator  Disk Drive Administrator

 Hide, lock and protect your local, network, Floppy and USB drives, and disable the AutoRun feature for them using this fabulously designed software. Functionality and simplicity is put in every corner of the program; intuitively understandable user interface gives you an ability to start using the program right out of the box without learning anything. All you need to do is to click on the checkboxes located within the group boxes representing individual drives. Another great feature you can use lets you disable the AutoRun feature based on drive types. This means you can disable, for instance, only all USB drives, regardless of the drive letters that can be associated with them. The program lets you protect itself from an unauthorized access by assigning a password that can be requested on each program start....

 

 

Pages : 1 2 3 4 5 6 7 8 9 10 Next >>