|
||||||
|
||
|
Home > Keyed access software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access, last access |
|
|
101. | Advanced Security Administrator 10.14 (getfreefile.com) | ||
your computer and restrict access to Internet with Security Administrator. This nice password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
102. | Advanced Security Administrator 10.14 (softheap.com) | ||
your computer and restrict access to Internet with Security Administrator. This nice password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
103. | AcuteFinder 1.3 (hugmot.is) | ||
use, but corporate users have 15 days to evaluate. Free trial-key on request. AcuteFinder finds duplicate files on your computer. You can then delete or move the files to an archive directory, saving a lot of disk space. Fast and easy way to clean up your disks. Great tool for network administrators. Free | |||
Updated: 2, 2006 | Rating: 149 | Author: Ingolfur Tryggvason | Size: 2504 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
104. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
of information theft crimes are conducted without having network access to target machine. Most of us prefer not to turn computer off while we are away for coffee or going to the lavatory or have to attend a meeting in a conference room next door. That is the point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at your | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
105. | Active Keys 2.31 (softarium.com) | ||
new software which in turn uses multiple menus, icons and buttons to access its features. It is fairly easy to control one application behavior but what if there are five or twenty of them? Aren't you missing your favorite remote controller? Wouldn't it be great to use one controller to manipulate all | |||
Updated: 2, 2006 | Rating: 613 | Author: Softarium.com Softarium.com | Size: 1628 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
106. | Active Key Logger 3.0 (winsoul.com) | ||
Key Logger this is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Key Logger on your computer, it will allow you to make program settings for tracking activities on your computer. If you enable "Run Active Key Logger when windows start" then the program will run | |||
Updated: 2, 2006 | Rating: 242 | Author: Alex Atushev | Size: 703 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
107. | Access Lock 2.83 (getfreefile.com) | ||
Access Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
108. | Access Lock 2.83 (softheap.com) | ||
Access Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
109. | Access Manager for Windows 6.14 (softstack.com) | ||
Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys | |||
Updated: 2, 2006 | Rating: 55 | Author: IM Soft | Size: 913 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
110. | Access Administrator 4.14 (softheap.com) | ||
and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Keyed access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|