Advertisements
 
 
  You'll find a complete list of Access Control software at Download Center WaySofts See all products in this category.   You can download free or buy online them.
generator mp4 print gpl

Access Control

PREVIOUS     NEXT

SpyPal MSN Messenger Spy 2007  SpyPal MSN Messenger Spy 2007

 SpyPal MSN Messenger Spy software can secretly record all MSN Messenger, Windows Live Messenger and Windows Messenger's incoming and outgoing chat text messages. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. The re-check merchanism can ensure you get the whole super-large messages, and prevent you from getting the same message repeatedly. You can show all messages in SpyPal MSN Messenger Spy software directly, export these messages to HTML files in a directory for later analysis, or send a report to a pre-set email address / ftp. Everything will be recorded without being detected. It is especially useful for administrators or parents, who need to know what their employees or kids are care and talking about with others. Use your hotkey to unhide it from complete stealth mode and protect the program access by password. Uninstall it easily from the program interface. You can download SpyPal MSN Messenger Sp...

Lobby Track - Employee Tracking Software  Lobby Track - Employee Tracking Software

 Lobby Track Employee Tracking Software is a new secure tracking, access control, and visitor management software system. This innovative new technology allows organizations to track employees and equipment with detailed activity logs by individual or groups, provides access control in conjunction with entry systems and provides visitor management functionality, including data entry, badge design, and badge printing. Unique to this system is the capability to directly interface with the customers existing database in real-time. The Lobby Track Employee Tracking Software Advantage Verification Images and other visitor information is displayed at check-in with Lobby Track Employee Tracking Software. Photo IDs can be scanned and automatically added to the database. Visitors can be verified, logged and badges printed quickly and reliably. Alerts and Messages Alerts and messages can be set to appear at the time of check-in. Instructions are provided to the attendant regarding the course of a...

Security Desktop Tool  Security Desktop Tool

 Security Desktop is a security utility that allows you to restrict access to Windows important resources. This utility limits kids time they spend in internet and playing games. It has got a number of options to customize the viewing and usage of a users Windows settings. Including hiding the desktop and start menu items, restrictions on the Active Desktop and much more. Also it provides folders and files protection. Security restrictions can be applied universally or just to specific users because Security Desktop Tool has got the multiuser intuitional interface....

Process Audit Free Edition  Process Audit Free Edition

 -Monitors Process Execution on local & remote machine -Prevents unauthorized application startup on local & remote machine -Logs activities Text Based log file -Detailed System Log -Real time process monitoring -Automated process termination...

WinGuard Pro 2008  WinGuard Pro 2008

 Protect yourself from unauthorized access to your computer. Secure your computer by password protecting (locking) your Windows applications, programs and EXE files for Free. Plus encryption for your files, folders and drives - direct from Windows Explorer. Extra features allow you to disable Task Keys, Software Installation, Internet Explorer, Mozilla FireFox, Downloading Files, Zip and Self Extracting Files and the Boot Keys (F8). Feature Overview... 1 Lock Programs, Applications, EXE Files with a Password 2 Encrypt Files, Folders and Entire Drives 3 NEW Lock any file, folder and file extension with a password 4 NEW Disable changing of Desktop Wallpaper 5 NEW Tweaks section 6 Lock Windows at Boot and the Boot Keys (F8) 7 Password Protect Windows Explorer 8 Password Protect your Web Browser, inc. Internet Explorer and Mozilla FireFox etc 7 Disable Software Installation and Downloads to Help Prevent Unknown Virus Attacts 8 Disable Zip and Self Extracting Files...

Hide My Drives  Hide My Drives

 Hide My Drives allows user to hide, and protect any of your Windows PC drives. They all can be protected: USB, Network, Floppy, DVD, CD, local drives. Access to this utility can be protected by password. There is an feature included that enable you to disable the autorun feature for any of your drive of for a group of drives at once (fr example: all USB drives, or all CD drives...). The administrator account is required to run this program. The hidden drive will not be visible from any application, therefore the file stored on those hidden drives are safe from tampering. The probram's User Interface is extremely easy to use, and is represented with a single screen. All that has to be done is to check the drived to be protected and save your changes by clickinf "Save" button. Protect your files securily with Hide My Drives....

ShareAlarmPro  ShareAlarmPro

 ShareAlarmPro is a network tool that allows network administrators and users to easily perform network shares monitoring. Using ShareAlarmPro you can monitor users attempting to access secured shares and confidential files, detect and log network access to shared folders, monitor security events, monitor accessed files, disconnect users from open files or deny network users access, monitor sharing permission changes. ShareAlarmPro includes an intrusion detection system based on a security events log analyzer. Security Event Log Monitor monitors the security event logs of Windows NT/2000/XP servers or workstations and notifies the user about selected events detection. This software also provides you with the ability to manage and monitor all shares on your workstation, disable or enable default administrative shares, hide your workstation on the network, view the number of the users currently connected to each shared resource on your workstation. ShareAlarmPro also lets you easily brows...
 Advertisements

Windows Security Officer  Windows Security Officer

 Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to your personal computer. It offers administrative support for controlling which users are allowed to access your computer and the level of access each user may have. You can choose to restrict access to several Control panel applet functions, including Display, Network, Passwords, Printer, and System. It's not an "all or nothing" restriction -- for example: you can ...

Advanced File Vault  Advanced File Vault

 Hide or password-protect any file instantly by clicking on it. Advanced File Vault works with all file types including pictures and movies. Once a file is locked or hidden, it is completely encrypted and none of its contents can be viewed. To lock a file or folder, simply right-click on it and select the lock option. Extremely easy to use. Online help is also available....

HSLAB Logger  HSLAB Logger

 The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and using removable media. Using this software to become possible to receive the anformation about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole. Also you can restrict access to some programs (using file tame or keyword) or to CD/DVD/Zip and other removable media. This is very useful for the rigid control over use of computer systems in business and for the parental control over children's actions. The program is NOT keylogger and does not write any keystrokes! This is a principle position. The information, collected by the program is more enough for the control over use of a computer and without recording of the user's passwords. Using this software you can: - record user's activity; - record ...

EfreeDown.com Boss Key  EfreeDown.com Boss Key

 EfreeDown.com Boss Key allow you to hide active program window immediatlly using a hot key!You can hide the browser windows,folder windows,applications windows,all your desktop icons and taskbar when your boss or anyone else you don't want to see your screens comes in.It's speed is brought to maximum to allow you react as quickly as possible to any threat that appears. You won't feel even a slight difference in the performance of your home or office computer after installing it.With a cool and user-friendly interface makes it easy for anyone to use EfreeDown.com Boss Key. Everybody should have such program for personal privacy....

GFI EndPointSecurity  GFI EndPointSecurity

 GFI EndPointSecurity lets you control entry and exit of data via portable storage devices, allowing you to prevent users from taking confidential data or introducing viruses and Trojans to your network. GFI EndPointSecurity allows you to actively manage user access to media players (including iPod and Creative Zen), USB sticks, CompactFlash, memory cards, PDAs, Blackberries, mobile phones, CDs, floppies and more. Regain control of your network with GFI EndPointSecurity! Our device control solution allows administrators to actively manage user access to: Media players, including iPod, Creative Zen and others USB sticks, CompactFlash , memory cards, CDs, floppies & other storage devices PDAs, Blackberries, mobile phones and similar communication devices Network cards, laptops and other network connections. You can define which users can use removable media centrally from Active Directory - simply by making them a member of pre-defined groups....

Protect Files Pro  Protect Files Pro

 Protect Files Pro can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms : 9.x/ME/NT/2000/XP . Protect Files Pro can work with Network folders and fully supports protection of removable media (such as floppies, CD Roms, DVD, ZIP and some SCSI and RAID drives) on all platforms. This easy-to-use program allows you to protect your files and folders (including subdirectories) in various ways. You can hide them or prevent others from deleting, renaming, executing, or modifying your files in any way. The Wildcard feature allows you to specify which files you want to protect (for example, all EXE or DLL files). The file system protection works independently of the program , so if you even close the program the file protection will still work. Built-in support for multiple use...

PC Spy Monitor 2007  PC Spy Monitor 2007

 PC Spy Monitor software lets you know EXACTLY what others do on your PC while you are away. It allow you to secretly monitor and record all activities on your computer, and this is completely legal. Such monitoring is so stealthily that the user won't know its existence. PC Spy Monitor records keystrokes, windows opened, applications run, chats (Windows Live Messenger MSN Messenger, ICQ, AIM / AOL, Yahoo! Messenger, Windows Messenger and Skype), websites visted (MS Internet Explorer, Firefox, Netscape, AOL Explorer, Avant Browser, Maxthon, NetCaptor, SlimBrowser and more), clipboard activities, passwords typed, emails read (MS Outlook 97/2000/XP/2003/2007, Outlook Express, Vista WinMail and IncrediMail), documents opened and even take screen snapshots at your set interval like a surveillance camera. In Stealth Mode, PC Spy Monitor is completely invisible to computer users - No trace in Add/Remove Programs, Start menu, Applications, Windows Task Manager, and no icons, shortcuts or ...

ActiveScreenLock  ActiveScreenLock

 Computer security is one of the major concerns these days. Many of us have realized already that leaving our computers unprotected may result in data theft which in turn may affect privacy and business operation. According to multiple studies, the majority of information theft crimes are conducted without having network access to target machine. Most of us prefer not to turn computer off while we are away for coffee or going to the lavatory or have to attend a meeting in a conference room next door. That is the point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at your monitor and he has it all! Introducing Active Screen Lock, the unique security application by DMVSoft, allowing you to do whatever you want to do when you are away from the computer without having to worry a second. Active Screen Lock operates as follows: first it disables Windows system key combinations, such as Alt+F4, Ctrl+Alt+Del, Alt+Tab and WinKey and then...

Access Denied XP  Access Denied XP

 Security program that request username and password on Windows load-up and fast lock your desktop by one mouse click or keyboard shortcut. All unwanted people are getting away from your computer. It is stronger what Windows XP security. You can see and manage easily user privileges within colored list of users. Empty password users now can be fast detected to prevent unauthorized use of such accounts. Color logs allow you to take knowledge about usage of computer and detect intruder in appropriate time. Other feature is possibility to disable CTRL+ALT+DEL....

Local Account Manager  Local Account Manager

 Local Account Manager is a tool you can use to manage local users and groups. By Default Local Users and Groups MMC (Microsoft Management Console) snap-in available only on the Windows XP Professional operating system. Also you can't access and use User Rights Assignment (a part of the Security Policy interface) feature on Windows XP Home version. With Local Account Manager you do need to enable this snap-in, you can easily add, modify, delete users and groups (manage security accounts), assign user rights and privileges on Windows XP Home like within Windows XP Professional administrative tools! Local Account Manager can be used not only for creating, deleting or renaming users. You can add a user to a group, define privileges for groups or users, permit or deny to perform a security task for any account, set user password never expires or temporary disable a user. Also you can change a password for any user even if you foget the password and can't recover it. You can define that user...

Hide My Files  Hide My Files

 Hide My Files is an easy to use folder lock used to hide files and folders from unauthorized use. This file and folder lock software will allow you to easily hide your most sensitive data files and prevent anyone from seeing them. Hide files stored on this computer by using an interface that allows you to choose the files by selecting the directories in which you choose to block users from viewing. With a password protection feature, you can easily lock and unlock the folders of your choice without worrying about anyone seeing your files!...

Windows Security Tweaker  Windows Security Tweaker

 Windows Security Tweaker is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Tweaker enables you to protect and totally control access to your personal computer. It offers administrative support for controlling which users are allowed to access your computer and the level of access each user may have. You can choose to restrict access to several Control panel applet functions, including Display, Network, Passwords, Printer, and System. It's not an "all or nothing" restriction -- for example: you can ...

Access Administrator  Access Administrator

 Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user "Admin" has the full access at any time. You can define a timetable and a list of restricted files for each user individually as you like. Need to keep your children off your files and the Internet? You can define time periods for your kids when they are able to use Internet, games or the other programs. Also Access Administrator may protect files from casual or unauthorized removal. The program is reliably protected by the password. You will find the program interface very easy to negotiate. Excellent online help is ...

 

 

Pages : 1 2 3 4 5 6 7 8 9 10 Next >>