|
||||||
|
||
|
Home > Prevent access software |
Related keywords: access, Access, access control, prevent, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access |
|
|
171. | Backupper Standard 5.1 (backupper.com) | ||
computers to avoid data loss in case of computer failure. To prevent inconsistent backups, Backupper can automatically redo backup in case some data files were changed during last backup creation. Backupper can send notifications about its operations and status, so you will be aware of any problems and will be able to resolve them in time. Backups are stored in prevalent ZIP | |||
Updated: 9, 2005 | Rating: 0 | Author: Develepers Team | Size: 1861 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
172. | Chaperone 4.0 (css-software.com) | ||
is the ultimate access control utility for both the home and office. Packed with features it is based on the premise that there are users who shouldn't have complete access to the computer all the time. Using advanced scheduling techniques completely control of how and when the computer is used is easily obtained. Most common methods of controlling what programs can be | |||
Updated: 9, 2005 | Rating: 16 | Author: Kevin Whynot | Size: 2395 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
173. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
of chat partners you may create or edit. Every chat partner can be accessed in micro-seconds using alphabet index buttons or by a powerful built-in search engine which allows you to search through key personal details just as quickly. Stop writing down on paper your secret information and stop relying | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
174. | CheckQuota 1.7 (competent-software.com) | ||
user exceeds the directory usage limit, all write processes will be prevented for them. The user can read and delete his data, but writing is not possible. So a system administrator can control and stop increase of directory size. When user deletes data, in order that the directory usage falls under | |||
Updated: 9, 2005 | Rating: 0 | Author: Timo Kosiol | Size: 2581 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
175. | 1st Files Privacy Tool 2.4 (privacywindows.com) | ||
Tool can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : 'Hidden', 'Read Only', 'Full Control'. It works with any Windows platforms : 9.x/ME/NT/2000/XP . 1st Files Privacy Tool can work with Network folders and fully supports protection of removable media (such as | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Mihailov | Size: 839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
176. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
Center is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual component of several Control Panel applets, including Display, Network | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
177. | Absolute Key Logger 2.5.283 (lastbit.com) | ||
or bad connection). In any of these or similar cases, you can access log file to restore text data you just typed. Absolute Key Logger employs unique algorithms that prevents losing text data even when unexpected critical system shutdowns happen. - find forgotten passwords and logins (just look through the log file to find what you need) - have full control of your | |||
Updated: 9, 2005 | Rating: 82 | Author: Vitas Ramanchauskas | Size: 613 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
178. | Advanced Hide Folders 4.6 (hide-folders.biz) | ||
hide folders and files on your computer. The hidden files cannot be accessed unless the folders are unlocked with a password from within the program. You can simple drag and drop folders from Windows or add files by mask (e.g hide all .jpg files). In addition, as an added security measure, you can also | |||
Updated: 9, 2005 | Rating: 81 | Author: Otto Schulz | Size: 258 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
179. | AIM Keys 3.10.9522 (aimsoft.com) | ||
application. Encrypt your sensitive macros such as passwords to prevent others from using or viewing them. NEW! Expanded Macro Wizard. Over 25 new macros can be created via the wizard, which makes adding special commands or complex macros much easier and faster. AIM Keys carries a one-of-a-kind, 30 day money-back, timesaving guarantee. AIM Keys for Windows XP/2000/NT/98/95 is | |||
Updated: 9, 2005 | Rating: 209 | Author: Randy Smith | Size: 2799 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
180. | Akala EXE Lock 3.20 (zero2000software.com) | ||
you're not the only one who has access to your computer then I'd bet that there are certain programs and files you don't want others accessing. There are a multitude of options on how to go about doing this. There are encryption programs, programs that restrict access to portions of your | |||
Updated: 9, 2005 | Rating: 158 | Author: Zero Lee | Size: 1152 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Prevent access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|