|
||||||
|
||
|
Home > Prevent access software |
Related keywords: access, Access, access control, prevent, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access |
|
|
151. | CheckQuota 1.7 (competent-software.com) | ||
user exceeds the directory usage limit, all write processes will be prevented for them. The user can read and delete his data, but writing is not possible. So a system administrator can control and stop increase of directory size. When user deletes data, in order that the directory usage falls under | |||
Updated: 9, 2005 | Rating: 0 | Author: Timo Kosiol | Size: 2581 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
152. | ComfortAir HVAC Software 4.0 (comfortair-software.com) | ||
ComfortAir HVAC software is designed to be used by engineers, architects, contractors and energy auditors to calculate and analyse heating and air conditioning loads in all types of buildings. Input and output units can be set independently to English or Metric units. The program contains weather and other | |||
Updated: 2, 2006 | Rating: 79 | Author: Claon Rowe | Size: 1580 kb | Demo Go to category: System Utilities > Other Similar programs | |||
153. | Dark Files 3.3.1.1 (mybestsoft.com) | ||
can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms : 9.x/ME/NT/2000/XP . Dark Files can work with Network folders and fully supports protection of removable media (such as floppies, CD Roms | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
154. | DCPP 2.7 (securstar.com) | ||
at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted, validated algorithm chosen by the National Institute of Standards and Technology (NIST) and slated to be the cryptographic standard for years to come. AES-256 is a FIPS-approved symmetric encryption algorithm that may be used by U.S. Government organizations | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
155. | Desktop Lock 6.1 (toplang.com) | ||
Lock is a powerful computer security software, it locks your pc to prevent others from accessing your private documents or resources, after your computer was locked by Desktop Lock, people will not be able to access your documents, browse your computer, or use programs on your computer. Desktop Lock fully supports all Windows system, includes Windows 2000/XP/NT and | |||
Updated: 9, 2005 | Rating: 0 | Author: Cui Jiugang | Size: 604 kb | Shareware Go to category: Desktop > Other Similar programs | |||
156. | Desktop Scout 4.0 (globalpatrol.net) | ||
remotely. Beyond surveillance, Desktop Scout allows you to block access to any program, document or web site based on the current user. You can simply deny access altogether, impose a time restriction, or require a password to access anything in the secured list. The program | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
157. | Personal Desktop Spy 2.10 (spyarsenal.com) | ||
a great employee monitoring and surveillance tool that can help you prevent the misuse of corporate resources and other, more serious, incidents. The program loads on Windows startup and quietly runs in the background completely hidden from everyone but you. It uses very little resources and does not | |||
Updated: 9, 2005 | Rating: 0 | Author: Mikhail Kalinskiy | Size: 615 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
158. | Drive Health 2.0.30 (helexis.com) | ||
Resource. This tool allows you to predict possible HDD failure and prevent losing the critical data. To estimate hard disk life our program uses special S.M.A.R.T. technology that is supported by the most of hard disk manufacturers. By implementing this technology the Drive Health provides access to the hard disk drives reliability monitoring, and keeps you informed about any | |||
Updated: 9, 2005 | Rating: 45 | Author: Alexander Burlakov | Size: 465 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
159. | DriveCryptPlusPack 1.0c (securstar.de) | ||
at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a FIPS-approved symmetric encryption algorithm that may be used by U.S.Government organizations(and others) to | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
160. | DVD and CD Cover Print 3.3.0 (northcardinal.com) | ||
DVD and CD Cover Print allows you to print your CD and DVD cover art easily and accurately. This software tool allows the user to load CD or DVD cover art and print it to standard size specifications or user defined specifications. This is an easy and quick way for the user to printout DVD or CD covers that | |||
Updated: 9, 2005 | Rating: 163 | Author: North Cardinal Software | Size: 5633 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
|
Home > Prevent access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|