|
||||||
|
||
|
Home > Internet access control software |
Related keywords: internet, control, Internet, access, Access, access control, internet explorer, parental control, Control, Internet Explorer |
|
|
211. | Password Manager XP 2.1.322 (cp-lab.com) | ||
XP is a convenient software application for storing passwords, access codes, social security and credit card numbers and other valuable information that needs protection. It will be your passwords and secrets keeper. Protect your private data with this password management utility. Program's unique features include capability to encrypt stored information with several | |||
Updated: 2, 2006 | Rating: 45 | Author: CP Lab | Size: 948 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
212. | Password Officer DeLuxe 5.0 (compelson.com) | ||
entering, storing, securing, changing, organizing, transporting and accessing. Security coupled with convenience: the strongest possible encryption, secure database of your most valued secrets, automatic logon to applications, servers, information systems, terminals and web pages, quick search | |||
Updated: 9, 2005 | Rating: 0 | Author: COMPELSON Laboratories | Size: 934 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
213. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
214. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
215. | PDF Converter Professional 2 - Maxdownload 2.0 (nct.digitalriver.com) | ||
to an e-mail message, simplifying the sharing of documents over the Internet. Users can apply watermarks & stamps to their documents, choosing from a pre-made selection or creating custom versions. Custom watermarks can be applied from other PDF files or created within the PDF Create! Assistant. PDF Create! allows users to create PDF files from practically every PC application | |||
Updated: 9, 2005 | Rating: 0 | Author: Susan Reale | Size: 16853 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
216. | Personal Antispy 1.2 (blazingtools.com) | ||
getting suspicious. You don't want others obtaining your email and internet passwords. You use personal email accounts like Hotmail and Yahoo email and don't want your employer snooping on these emails. You don't want others seeing what pictures you look online. You want to protect you and your family from identity thieves, credit card thieves, online stalkers and pedophiles | |||
Updated: 2, 2006 | Rating: 0 | Author: BlazingTools Software | Size: 327 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
217. | ProBot SE 2.3.0 (nethunter.cc) | ||
a computer. In addition to keystrokes and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
218. | Access Administrator 4.14 (getfreefile.com) | ||
protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
219. | Remote Access 1.0 (nawab.1cis.com) | ||
Access 1.0 is a cheap , powerfull , simple remote administration/monitoring tool with many advanced features like 128-bit encryption , IP Filtering , NT Security , Full control , file transfers , telnetting , remote shutdown , remote log-in/;log-off etc..and very cheap. It is a very essential tool for remote administrator working on remote locatons and also providing remote | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahamed Abdulla | Size: 2558 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
220. | Remote Administrator 2.2 (radmin.com) | ||
Administrator (Radmin) is the award-winning remote control program that is fast, reliable and secure, which enables you to work on one or more remote computers from your own computer. You see the remote computer desktop displayed either in a window or full screen on your computer monitor. All your mouse and keyboard functions are transferred to the remote computer. You work with | |||
Updated: 9, 2005 | Rating: 257 | Author: Dmitri Znosko | Size: 1855 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
|
Home > Internet access control software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|