Advertisements
 
 
  You'll find a complete list of Access Control software at Download Center WaySofts See all products in this category.   You can download free or buy online them.
psychology mysql color client

Access Control

PREVIOUS     NEXT

SSL-Explorer Community Edition  SSL-Explorer Community Edition

 SSL-Explorer is the world's first open-source, browser-based SSL VPN solution. This unique remote access solution provides users and businesses alike with a means of securely accessing network resources from outside the network perimeter using only a standard web browser. Users can now be granted access to their files, intranet applications and email from virtually any location with an internet connection. Using SSL-Explorer you can quickly and simply provide full extranet access to key strategic business partners and external consultants. Similarly, your network support staff are also now free to remotely manage servers, routers and other network hardware securely using industry standard encryption technologies to protect key information assets. No client side software needs to be installed on your users systems and maintenance is centralised and simple. SSL-Explorer relies on the ubiquitous Java web technology and hence requires just a standard web browser to take advantage of full r...

ClockLock  ClockLock

 A Windows service which continually checks whether the logged in user is authorized to use the computer at this time. If not, then it forces the user to logoff and remains locked until the unrestricted interval begins. Can be used by parents to control the time their children spend on the computer. It makes sure the computer is not used excessively....

1st Network Admin  1st Network Admin

 1st Network Admin offers a comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to almost every corner of Windows for all PC workstations you have in your network, apply executable patches to them remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer connected to a TCP/IP-based network or Internet. 1st Network Admin is very useful for Internet cafes, public-access terminals, libraries, large corporations, schools and for other applications where you have to deal with lots of stand-alone PC workstations to be secured and constantly maintained. Once you install and configure the remote client service application on all your remote computers, you do not need to physically attend those computers anymore. You just change security settings and apply executable patches form only your administrator's computer from almost everywhere where your corporate network is accessi...

Easy Desktop Keeper  Easy Desktop Keeper

 Easy Desktop Keeper gives you the ability to save, restore, manage and lock your desktop layout including files and folders located on your desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout, every time you reboot your PC, the program will restore your desktop icons and bring them back to their original positions as well as return your old wallpaper and screen saver to the background. You can create an unlimited number of desktop layouts for different purposes such as gaming, working, surfing the Internet as well as provide different users with their own desktops. Simply place your icons wherever you want them on your desktop, select desired wallpaper and screen saver, double click program's tray icon and click the Save button to create a new desktop layout file. If your icons ever get moved or deleted by any user or after entering the safe mode or changing the screen resolution, just open the program and click the Load bu...

File Access Scheduler  File Access Scheduler

 Protect your files from being executed, viewed, changed and deleted with File Access Scheduler. This software will automatically enable a chosen protection based on currently logged-in user, current time and the schedule you specify. By using this software it is quite easy to disable Internet access, certain games and other software applications during certain periods of time (working hours, for example). You can allow using different sets of applications in different time windows for different users to ensure that only business applications are used by employees or kids during working hours and the games are played only at leisure. It means that you can easily limit gaming and chatting activities to a certain extent set and enforced by you....

XemiComputers DeskTop Pack Software  XemiComputers DeskTop Pack Software

 Active Desktop Calendar is unique PIM that shows valuable data directly on desktop. Audio Notes Recorder records voice notes or simply any sound coming through your sound card. Active Desktop Wallpaper keeps your desktop always looking fresh....

DeviceLock  DeviceLock

 DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the week. DeviceLock enhances access control for Windows System Administrators and helps control removable disk usage. It can protect network and local computers against viruses, trojans and other malicious programs often injected from removable disks. Network administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside....
 Advertisements

Secure Folder Hider  Secure Folder Hider

 A quick and easy way to protect sensitive information on your computer from children, employers, and anyone else who uses your computer, including hackers! This software will hide your sensitive files so that they cant be seen or accessed. Files stay hidden even if you turn on "View Hidden Files". Even links in your recent documents menu wont be able to find your hidden files! For extra security, use a password to prevent anyone from accessing your files. You can run this software in stealth mode so that no one knows its there, and hide or show your sensitive files using hotkeys. There has never been an easier way to keep private files REALLY private. Version 1.2 fixes a bug that would sometimes prevent a folder from being hidden/shown. Add as many folders to the program as you want for quick hiding Hide or Show individual folders or all folders at once Prevents all file access, even from the command prompt, and even from hackers Folders are removed from Windows Explorer entirely Files...

IP Privacy  IP Privacy

 IP Privacy is a privacy protection tool that hides your IP address preventing your surfing habits and your internet activity over the Internet form being tracked by websites or Internet Service Providers. The solution uses anonymous proxies (gateways to the internet) routing all your Internet traffic through them. You can: - browse anonymously, check mails, participate in newsgroups using proxies form different countries at your choice - interact with websites anonymously: using proxies that allow you to post messages, game, cast votes, post on forum, use IP - based trials IP Privacy provides a good online privacy protection by cleaning all online traces that may harm or use inadvertently information on your computer: - Clear Internet History - Clear Typed URL - Clear Temporary Internet Files - Clear Cookies - Clear Auto Complete Forms History - Clear Auto complete Password History - Clear Internet Favorites IP Privacy also protects computer from the action of invasive codes: - Blocks ...

Disk Drive Security  Disk Drive Security

 Hide and lock your local, network, Floppy and USB drives as well as disable the AutoRun feature for specific drive types with this password-protected security utility. Fabulously designed, Disk Drive Security offers you both a great functionality and simplicity in a very elegant manner. The main window of the program groups the main settings by drives, and shows you all possible drive letters. If you do not want the removable media to appear and be accessible in My Computer after it is inserted, just hide and lock all the drive letters you do not normally use. Disk Drive Security can also be used to protect your local drives. For example, by hiding your system drive you can prevent your users from vandalizing your system files and saving garbage to it. The AutoRun feature can be disabled for specific drives or drive types. If you disable the AutoRun feature for drive types, you can, for example, disable the AutoRun feature for all USB drives, for all CD/DVD drives, for all RAM disks or...

Application Lock and File Encrypt  Application Lock and File Encrypt

 Password protect your programs, files and folders for free! Users can add password protection to any Windows program. Two types of file and folder protection, including encryption, provides you with all-in-one solution for protecting your computer from unauthorized access. With extra features to lock the desktop, boot keys, task keys, blocking software installations and internet access and Windows Startup....

Free Undetectable Keylogger  Free Undetectable Keylogger

 Free Undetectable Keylogger is an easy-to-use monitoring tool. It allows you to investigate everything that happens on your PC. Features: keystroke recording, passwords logging, Internet activity monitoring, hotkeys to bring up the application, logging warning option, stealth mode. The program works on all Windows systems....

SysUtils Device Manager  SysUtils Device Manager

 SysUtils Device Manager the removable device access control solution. Once SysUtils Device Manager is installed, administrators can control access to floppies, CDROMs, and other devices. Also SysUtils Device Manager can protect network and local computers against viruses, trojan horses, and other malicious programs often introduced by removable media. SysUtils Device Manager provides the flexibility to control access on a per user basis to: - External Storage Devices; - CD-ROM/DVD Drives; - Floppy Disks; - Digital Cameras. Every time the user wants to access a device, SysUtils Device Manager Agent intercepts this request at the kernel level of the operating system. SysUtils Device Manager Agent checks the user rights in the appropriate Access Control List (ACL). If the user does not have rights to access this device, an "access denied" error message is returned. SysUtils Device Manager works on any computer using Windows 2000/XP or Windows Server 2003. To install and control SysUtils...

PC-Time Manager  PC-Time Manager

 PC-Time Manager is considered a parental control software that limits computer time. If your children are spending a lot of time chatting on the internet (MSN, AOL, ICQ), or most of their time playing games, you have to set a computer time limit in order to keep them safe from computers affecting their school work and social life. PC-Time Manager plays the role of a guardian on the computer, making sure that the computer is ON only during the scheduled computer time you allow. This timed computer sessions strategy will make sure that your children have access to the computer, without it affecting their school grades. PC-Time Manager gives you the ability to share the same computer among your children by giving each child a computer time limit schedule which provides a safe and friendly environment free of kids fighting over the computer. PC-Time Manager is multi lingual as it comes in two languages: English and French, you only need to change the settings in the control panel menu to s...

LogonExpert  LogonExpert

 LogonExpert is a Windows automatic logon tool for your home/office computer or corporate server. LogonExpert quickly and securely logs in a user by direct interaction with the WinLogon system without using the registry. LogonExpert uses a strong encryption algorithm (AES) to store login data. Powerful scheduler allowing to schedule logon/logoff to specified time, date or periodicity. Your computer can be protected even after automatic logon by the desktop being locked at startup....

ID Devices Lock  ID Devices Lock

 ID Devices Lock is a very useful program to have on your computer in order to protect your personal information and prevent unauthorized access. It allows you to prevent any data-collecting via an USB device by denying copying access. Main Features: - Denies copying access of files to any devices - Locks USB devices, CD-ROMs and Floppy disks - Protects you computer against attacks - Password protects information and data loss - Suitable for personal or business privacy Detailed features: - Prevents information loss due to USB devices that can be plugged into your computer. ID Devices Lock denies access to all plug-in devices that can carry and transmit information and data away from your PC. - Denies copying access to all USB devices, blocking CDs from being encrypted with information found on your computer, as well as Floppy disks from being written with your personal data. - Protects your computer against any outside threats or any hack attacks, working as a Windows Service at Local ...

File Security Manager  File Security Manager

 Manage file and folder permissions (access rights) in Windows XP Home like Windows XP Professional users! As far as you know, in Windows XP Home security tab of the folder properties window can not be enabled. This program solves the problem and allows you edit advanced permissions, change owner of the files, view effective permissions. Interface of the program is like XP Pro Access Control editor. The program includes even more useful feature - Security Wizard. Get the power of Win XP Pro. And... Make your Windows XP Home like windows XP Professional Now - Get File Security Manager!...

Internet Password Lock  Internet Password Lock

 Internet Password Lock is a software program for Windows 2000/XP/NT computers (does not work on Windows 95/98/Me) that allows you to password protect all access to the Internet. This includes Web surfing, Instant Messaging, and email. Parents can use Internet Password Lock to protect your children by making sure children do not use the Internet without a parent present. Businesses can use Internet Password Lock to lock out unauthorized Internet use. Once Internet Password Lock is installed, all Internet access will be blocked when Windows starts. To access the Internet, you must view the main Internet Password Lock screen by clicking on the Internet Password Lock icon on the system tray and then input a password (selected by you when you install Internet Password Lock). You can then access the Internet freely until you lock the Internet again using Internet Password Lock....

Esomo  Esomo

 Esomo is a back-end application intended for user internet access controlling. User traffic tracking is individually customized for each user. If a user exceeds the specified traffic and/or connection time, Esomo will disconnect one from the internet. At this point, the user will be able to access the free networks. Esomo consists of two software components: server and client. The server part of Esomo is implemented on FreeBSD 6.2, one of the most reliable operational systems. It includes a set of adjusted and ready-to-use services: - NAT allows you to use a single internet provider connection to ensure internet access for a whole local network; - Firewall protects users from external threats; - VPN server makes it possible to connect distant offices into a united network; - RADIUS server and the digital certificates high-security module protects Wi-Fi networks from hacker attacks by using the highest cryptographically secure standards; - DHCP servers allows a user to automatically ass...

Lobby Track Employee Attendance Software  Lobby Track Employee Attendance Software

 Lobby Track Employee Attendance Software is a new secure tracking, access control, and visitor management software system. This innovative new technology allows organizations to track employees and equipment with detailed activity logs by individual or groups, provides access control in conjunction with entry systems and provides visitor management functionality, including data entry, badge design, and badge printing. Unique to this system is the capability to directly interface with the customers existing database in real-time. The Lobby Track Employee Attendance Software Advantage Verification Images and other visitor information is displayed at check-in with Lobby Track Employee Attendance Software. Photo IDs can be scanned and automatically added to the database. Visitors can be verified, logged and badges printed quickly and reliably. Alerts and Messages Alerts and messages can be set to appear at the time of check-in. Instructions are provided to the attendant regarding the cours...

 

 

Pages : 1 2 3 4 5 6 7 8 9 10 Next >>