|
||||||
|
||
|
Home > Privacy control software |
Related keywords: privacy, control, access control, parental control, Control, remote control, internet privacy, Privacy, version control, online privacy |
|
|
91. | PC Optimizer 1.00 (aidsoft.com) | ||
keep your PC running smooth and error free. It has following tools: Privacy Protector protects your privacy by removing all the unwanted traces in your system. System cleaner removes junk and obsolete files from your system. Manage AutoRun Programs lets you control which program | |||
Updated: 9, 2005 | Rating: 0 | Author: Shrishail Rana | Size: 178700 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
92. | ProBot 2.5.0 (nethunter.cc) | ||
an embedded Web server called Remote Web Console, which allows to control and configure the software remotely. Surveillance log files may be delivered to any remote computer automatically, by E-mail or FTP. ProBot is a passive surveillance utility which also provides live monitoring functionality. When online, administrators can see logged on users' desktops (live screenshots) | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
93. | ProBot SE 2.3.0 (nethunter.cc) | ||
what a keylogger could be ? SE is an advanced version of it's ProBot predcessor. SE (Special or Stealth Edition) is a totally invisible program and is packed with all of ProBot features as well. ProBot SE remains undetected even under the most prying eye. Unlike similar tools, ProBot SE makes it very easy to browse through activity logs. Its Control Panel organizes the | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
94. | Access Administrator 4.14 (getfreefile.com) | ||
protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user "Admin" has | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
95. | SafeLogon 2.0 (gemiscorp.com) | ||
is a multi-user and password-based access control utility that enhances and complements the Windows built-in logon and authentication system. In other words, SafeLogon allows you to protect your system at home and office from unauthorized access. SafeLogon is fully configurable and allows its Administrator to: - Restrict access to Windows to certain users, optionally controlling | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 2291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
96. | SafeSystem 2006 (gemiscorp.com) | ||
renamed or removed. - Restrict access to some or all applets in Control Panel, thus preventing users from changing your system configuration (e.g., Display and Date/Time settings). - Prevent users from running or installing unauthorized programs from floppy disk, CD-ROM and DVD-ROM drives. - Prevent users from copying programs or other files to floppy disks and external or removable | |||
Updated: 2, 2006 | Rating: 0 | Author: GemiScorp | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
97. | ScreenLock 9.0 (screenlock.com) | ||
easy, yet secure access to your computer while denying other's attempts to access your computer. Keep children, intruders and unwanted visitors from using the Internet or your | |||
Updated: 8, 2004 | Rating: 0 | Author: Gregory Nelson | Size: 1977 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
98. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
99. | Security Administrator 10.14 (softheap.com) | ||
you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your desktop. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, etc. You can disable your boot keys, context menus, DOS windows, Registry editing, and network access. Hide your desktop icons | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
100. | Shred XP 2.00.10 (aidsoft.com) | ||
government and industry-proven shredding methods, Shred XP returns control to you by securely deleting current files, previously 'deleted' files, the recycle bin, drive free space, file tips, names, dates, sizes, and starting sectors as well as securely removing Internet trails including Internet | |||
Updated: 9, 2005 | Rating: 16 | Author: Gale-Force Software | Size: 3063 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Privacy control software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|