|
||||||
|
||
|
Home > Unauthorized access software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access, last access |
|
|
221. | 1st Evidence Remover 2.14 (getfreefile.com) | ||
work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use | |||
Updated: 2, 2006 | Rating: 190 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
222. | 1st TurboRun 2.0 (turborun.com) | ||
all this unnecessary. One mouse click and website or document is accessed. This is how the program works. It sits in the system tray and when you need to access any document, URL or file, you simply start entering its name. You don't have to enter the entire name - only a small part. The program immediately shows files or URL bookmarks that match the name. If there are | |||
Updated: 9, 2005 | Rating: 0 | Author: Green Parrots Software | Size: 751 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
223. | dfg ShutDown XP 3.9.1 (dfg1.netfirms.com) | ||
This program is a professional shutdown, automation, atomic time synchronizing, disk cleaning and PC protection utility - the best you can get today. dfg ShutDown XP gives you an easy and thorough time controlled and automatic way to shutdown, restart or log off your system with optional power off and | |||
Updated: 9, 2005 | Rating: 42 | Author: victoria gross | Size: 1113 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
224. | Access Administrator 4.14 (softheap.com) | ||
and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
225. | Access Denied 3.40 (johnru.com) | ||
setup of colored text for requesting passwords, possibility use Access Denied usernames as Windows logon names and other pleasant additions including hidden measures that can stop hackers/crackers. Screen Guard sub-system can save message events from anyone, even unauthorized persons but still protect desktop. Users can change their passwords only if during installation you | |||
Updated: 9, 2005 | Rating: 58 | Author: Ivan Mayrakov | Size: 536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
226. | Access Lock 2.83 (softheap.com) | ||
Access Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
227. | Access Lock 2.83 (getfreefile.com) | ||
Access Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
228. | AceBackup 2.1.3 (hello-engines.com) | ||
supports several encryption algorithms (up to 256 bit). That way no unauthorized person can access your sensitive data during backup. Archive backups can also be secured encrypted to the FTP server. The program also allows so-called AS-IS backups: These backups are created without encryption and compression and can be restored at any time even without AceBackup. Using the | |||
Updated: 9, 2005 | Rating: 53 | Author: AceBIT GmbH | Size: 5199 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
229. | Active System Locker 3.0 (sowsoft.com) | ||
handy utility that allows you to protect your personal computer from unauthorized access. You can use System Locker to restrict access to your PC. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally locks your desktop upon loading. It hides | |||
Updated: 9, 2005 | Rating: 138 | Author: Vladimir Sinitsyn | Size: 611 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
230. | active Printer 1.5 (activePrinter.com) | ||
Active Printer is a small but mighty printer utility from Palick Soft. The idea behind this ingenious tool is brilliantly simple - after installation, Active Printer icon appears in your system tray and lets you choose your active printer (the printer you are about to use) with just one mouse click. No need | |||
Updated: 9, 2005 | Rating: 55 | Author: Yuri Alexandrov | Size: 436 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
|
Home > Unauthorized access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|