|
||||||
|
||
|
Home > Access controls software |
Related keywords: access, Access, access control, ms access, controls, remote access, microsoft access, MS Access, Microsoft Access, restrict access |
|
|
101. | Access Administrator 4.14 (getfreefile.com) | ||
protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
102. | Personal Antispy 1.2 (blazingtools.com) | ||
Personal Antispy can provide every computer with strong protection against most types of unauthorized activity monitoring software, both known and unknown. It effectively finds and removes keyloggers, trojans and other spy software. Personal Antispy is based on wide knowledge of spy software behavior and | |||
Updated: 2, 2006 | Rating: 0 | Author: BlazingTools Software | Size: 327 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
103. | NextSTART 3.41 (winstep.net) | ||
automatically read the directory structure of your Programs folder(s) and create a menu for you on the fly! In fact, thanks to NextStart's dynamic menu support, it will create as many menus as you wish based on any hard drive or directory! NextSTART features built-in task management to | |||
Updated: 2, 2006 | Rating: 0 | Author: Jorge Coelho | Size: 4405 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
104. | Lock My PC 3.4 (fspro.net) | ||
one-click system locking software that ensures no one but you can access your private data when you leave your computer unattended. Just press the hotkey on your keyboard or double-click the TaskTray icon to lock down your PC. Once that is done, only the person who knows the correct password may | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
105. | Hide Files & Folders 2.4 (softstack.com) | ||
securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access to the file or folder, otherwise not. Hide Files and Folders does not modify your media: in | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
106. | Hide & Protect any Drives 2.01 (softstack.com) | ||
or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media. Protect Hard drive, CD, DVD, floppy and flash, and deny | |||
Updated: 2, 2006 | Rating: 244 | Author: IM Soft | Size: 764 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
107. | File & Folder Protector 2.33 (softheap.com) | ||
securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access to the file or folder, otherwise not. Protect Files and Folders does not modify your media | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 740 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
108. | Evidence Destructor 2.14 (emailarms.com) | ||
if your computer is at work, your coworkers or your boss would have access to it. Most of the sources of information that may represent your sensitive information are stored on your computer unprotected, and can be recovered by people with some minimal knowlege of computers. It can even affect you when | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
109. | Evidence Exterminator 2.14 (softstack.com) | ||
Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
110. | Easy File Protector 4.14 (softstack.com) | ||
a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Access controls software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|