|
||||||
|
||
|
Home > Access security software |
Related keywords: security, access, Security, Access, access control, ms access, remote access, computer security, internet security, microsoft access |
|
|
281. | Stealth Keyboard Interceptor for Win NT/2000/XP 6.0.1 (softsecurity.com) | ||
Stealth Keyboard Interceptor for Windows NT/2000/ XP (SKIn2000) is a monitoring program which allows to intercept all keystrokes, mouse clicks, captions of active windows, static text and other. It has a unique set of features that makes SKIn2000 the powerful program, suitable for perfect monitoring of user's | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation | Size: 467 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
282. | StormWindow 2000 3.02 (cetussoft.com) | ||
system of a Windows 2000 computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows 2000 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1285 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
283. | StormWindow 95 4.55 (cetussoft.com) | ||
and system of a Windows 95 computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows 95 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1457 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
284. | StormWindow 98 5.14 (cetussoft.com) | ||
and system of a Windows 98 computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows 98 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
285. | StormWindow Me 6.02 (cetussoft.com) | ||
and system of a Windows Me computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows Me computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of | |||
Updated: 9, 2005 | Rating: 16 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
286. | StormWindow NT 2.14 (cetussoft.com) | ||
and system of a Windows NT computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows NT computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1283 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
287. | StormWindow XP 7.01 (cetussoft.com) | ||
and system of a Windows XP computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows XP computer. StormWindow security schemes may be imported from and exported to other computers. StormWindow protections would probably be most useful to a teacher | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1375 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
288. | Sure Delete 4.1.9 (concentric.net) | ||
its gone. Another feature is the ability of the user to choose speed/security ratio. If you have a lot of time on your hands you could use the most secure but also the most time consuming type of wiping. However if you are short on time, and all you need is to prevent half educated snoops from recovering your data then you don't need as much security and you can set Sure | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael L | Size: 427 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
289. | System Protector 1.9 (aidsoft.com) | ||
and fontsFind and delete all cookies on your computerRestrict the access to a directory. It`s recommended to use this option with "Disable Command Prompt" and "Disable Registry Editor" options.Free screen-lock program is included. Some of the program options are:Customize your Control-PanelCustomize | |||
Updated: 9, 2005 | Rating: 0 | Author: Dimitar Terziev | Size: 1 kb | Demo Go to category: System Utilities > Other Similar programs | |||
290. | System Shield 2.1c (iolo.com) | ||
the file can be instantly undeleted and viewed by anyone who has access to your computer. Obviously, this poses a very significant security problem, and individual PC users who do not wish their data to be accessible after deletion are not the only ones that are subject to this predicament. Businesses, schools, government agencies, and military institutions that frequently | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Access security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|