|
||||||
|
||
|
Home > Unauthorized access software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access, last access |
|
|
301. | Security Folder 2.0 (everstrike.com) | ||
easy way to protect files and folders on local hard drive from unauthorized access. Introducing Security Folder by Everstrike Software, the unique folder data protection system intended to make your life times and times easier, while making sure your private and sensitive data are kept away from prying eyes! Security Folder represents the new generation of computer | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
302. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The security risk | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
303. | Sentry 4.09 (pcshareware.com) | ||
protection for Windows. Sentry prevents unauthorized users from accessing Windows 95/98. Think of Sentry as a personal guard or gatekeeper standing beside your PC, asking users for a password before they are allowed access to Windows 95/98 and ME. Keeps the kids and nosey coworkers from accessing Windows while you are away from your PC. Password protection for | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Kapusta | Size: 850 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
304. | seRename 1.00 (sedesk.com) | ||
File rename and management for serious, not novice, users and programmers. Written as a script and compiled! The use of JavaScript/Perl regular expressions for powerful file management are the heart of seRename and set it apart from other renaming utilities. Other operations: change case, use attributes | |||
Updated: 3, 2005 | Rating: 57 | Author: Terry Constant | Size: 3000 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
305. | SnagIt 6.2.1 (techsmith.com) | ||
right in your toolbar! SnagIt's new add-in toolbars provide quick access to the most common capture features right from within Word, PowerPoint and Explorer. Send your screenshots to multiple sources such as the clipboard, printer, email or to a file with formats including BMP, GIF, PCX, JPEG, PNG, TGA or TIF. SnagIt’s editing component, SnagIt Studio, lets you mark up your images | |||
Updated: 9, 2005 | Rating: 2068 | Author: TechSmith Corporation | Size: 13206 kb | Shareware Go to category: Graphic Apps > Screen Capture Similar programs | |||
306. | SuperRam 5.3.6.2006c (pgware.com) | ||
SuperRam is a tool for all which allows you to maintain and manage memory the right way. No modifications to your hardware are made and all adjustments and settings are done in an easy to use interface that a child could use. Most other Ram/memory modifiers promise that they work while you notice no | |||
Updated: 3, 2006 | Rating: 159 | Author: PGWARE LLC | Size: 969 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
307. | System Locker 2.40 (egtsoft.com) | ||
handy utility that allows you to protect your personal computer from unauthorized access. You can use System Locker to restrict access to your PC. It's attractive, secure, and very easy to use. It starts automatically with Windows and optionally locks your desktop upon loading. It | |||
Updated: 9, 2005 | Rating: 0 | Author: Rick Skinner | Size: 863 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
308. | Tweaki/FileName Pro Bundle 1.2 (jermar.com) | ||
make your computer run and boot faster, secure your computer from unauthorized access, tweak Microsoft Office and Internet Explorer, prevent access to web sites, stop downloading of files from the Internet, manage your Internet Explorer Favorites and add productivity enhancements like | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Rawdon | Size: 5802 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
309. | Universal Shield 4.0 (everstrike.com) | ||
tool for your computer - hide files, folders, and drives, and set access rules using flexible security combinations for your most precious data. A unique feature of Universal Shield is the perfect combination of data hiding and encrypting. This feature is very important nowadays when everybody knows that information is money, and information security and protection is very important | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
310. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
is a multi-user system, with support for concurrent users, user access rights and administrator functions, and encrypted databases. Also included is the Automatic Retention Monitorâ„¢ to control the amount of disk space allocated for recording purposes through user-defined values for maximum file age and total file size. Visual Hindsight is ideal for monitoring convenience stores | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Unauthorized access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|