|
||||||
|
||
|
Home > Deny access software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access, last access |
|
|
161. | DriveCryptPlusPack 1.0c (securstar.de) | ||
at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a FIPS-approved symmetric encryption algorithm that may be used by U.S.Government organizations(and others) to | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
162. | AlphaBrowser 1.3 (mailnavigator.com) | ||
The possibility of creating projects allows fast access to the most often used files, it is necessary only to indicate the file names or directories.For html files it is possible of view, edit, and preview the file (before saving the changes). The program was initially written with the purpose of embedding it in any program shell (for example in FAR or Windows | |||
Updated: 9, 2005 | Rating: 82 | Author: Dmitry Gorbachevsky | Size: 765 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
163. | AnswerMyPhone 2.7 (pppindia.com) | ||
calls in real time and stores them as wave files for voicemail access. You can either play recorded messages your multimedia speaker or access them by calling your phone remotely from anywhere in the world with a custom PIN number. Features: Automatic detection of voice modem/telephony device during first install. Replace greeting with your own custom recorded greeting. Set | |||
Updated: 9, 2005 | Rating: 357 | Author: Parameshwar Babu | Size: 1190 kb | Shareware Go to category: Communications > Telephony Similar programs | |||
164. | Chaperone 4.0 (css-software.com) | ||
is the ultimate access control utility for both the home and office. Packed with features it is based on the premise that there are users who shouldn't have complete access to the computer all the time. Using advanced scheduling techniques completely control of how and when the computer is used is easily obtained. Most common methods of controlling what programs can be | |||
Updated: 9, 2005 | Rating: 16 | Author: Kevin Whynot | Size: 2395 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
165. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
Center is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual component of several Control Panel applets, including Display, Network | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
166. | Access Denied 3.40 (johnru.com) | ||
setup of colored text for requesting passwords, possibility use Access Denied usernames as Windows logon names and other pleasant additions including hidden measures that can stop hackers/crackers. Screen Guard sub-system can save message events from anyone, even unauthorized persons but still protect desktop. Users can change their passwords only if during installation you | |||
Updated: 9, 2005 | Rating: 58 | Author: Ivan Mayrakov | Size: 536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
167. | Active Multiwallpaper Changer 3.0.0 (multiwallpaper.com) | ||
Tired of boring desktop wallpaper? Want to try something new? Want to have an adjustable calendar highlighting holidays, birthdays and other important dates on your desktop? Want to download new high-quality wallpapers from the Internet? Then Active Multiwallpaper Changer is for you! Using Active | |||
Updated: 9, 2005 | Rating: 0 | Author: Nextriver Software | Size: 2617 kb | Shareware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
168. | Active Kill Disk - Hard Drive Eraser 2.0 (killdisk.com) | ||
from any computer that can be started using a DOS floppy disk. Access to the drive's data is made on the physical level via the Basic Input-Output Subsystem (BIOS), bypassing the operating systems logical drive structure organization. Regardless of the operating system, file systems or type of machine, this utility can destroy all data on all storage devices. Thus it does not | |||
Updated: 9, 2005 | Rating: 985 | Author: LSoft Technologies Inc. | Size: 252 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
169. | Webcam Saver 1.2 (whimsoft.com) | ||
the library of transition effects. This means that you will have access to over 40 stunning transition effects that will make your computer an instant hit among co-workers or family member. You can try the program absolutely FREE! The cost of registration is only $19.95. So don't wait, download your copy right now! Would you like to be in London one minute and in New York the next | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Brylin | Size: 1943 kb | Shareware Go to category: Desktop > Similar programs | |||
170. | NameSaver 1.1 (onwijs.com) | ||
NameSaver is based on the EuroSaver code. Instead of the new currency of the EC it displays names or other bits of text waving over your desktop. It was made as a present for a group of children, with their names as default. (I have changed that default list.) Instead of names you can also enter other types You can enter up to a 1000 names or quotes, pick the font you want to use, have your desktop as background or pick the blue sky or an image of your choice and more | |||
Updated: 9, 2005 | Rating: 42 | Author: Remco de Korte | Size: 190 kb | Freeware Go to category: Desktop > Similar programs | |||
|
Home > Deny access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|