|
||||||
|
||
|
Home > Computer control software software |
Related keywords: software, Software, control, computer, access control, parental control, RAD Software, free software, spy software, Control |
|
|
311. | StormWindow 95 4.55 (cetussoft.com) | ||
and degrees of protections to the desktop and system of a Windows 95 computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows 95 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1457 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
312. | StormWindow 98 5.14 (cetussoft.com) | ||
and degrees of protections to the desktop and system of a Windows 98 computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows 98 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
313. | StormWindow Me 6.02 (cetussoft.com) | ||
and degrees of protections to the desktop and system of a Windows Me computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows Me computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu | |||
Updated: 9, 2005 | Rating: 16 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
314. | StormWindow NT 2.14 (cetussoft.com) | ||
and degrees of protections to the desktop and system of a Windows NT computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows NT computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1283 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
315. | Surf Spy 2.10 (bysoft.se) | ||
Spy is an invisible tool that monitors the Internet activity on your computer. It captures the link (URL) of every visited web site and stores it to a password protected encrypted file. For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
316. | System LifeGuard 2.0 (neobytesolutions.com) | ||
condition. Every time you use the internet or run programs on your computer - unwanted files and procedures are stored on your hard-disc.Regular computer use accumulates old material that begins to slow down the operation of your hardware and software. So just like your car needs a | |||
Updated: 9, 2005 | Rating: 0 | Author: NeoByte Solutions | Size: 3273 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
317. | System Monitor 1.4.1 (rundegren.com) | ||
Monitor is designed to monitor Microsoft Windows computers on a network. It can monitor the usage of CPU, Memory, Disk Drives and Network Adapters and notify you when a certain resource exceeds a certain value. You can set it up to log events and create usage reports to databases located anywhere on your network. You can also search remote computers for files, folders or | |||
Updated: 2, 2006 | Rating: 0 | Author: -- -- | Size: 860 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
318. | System Protector 1.9 (aidsoft.com) | ||
of the program options are:Customize your Control-PanelCustomize Display PropertiesHide/customize Network settingsCustomize Start MenuHide all drives in Control Panel (A:\, C:\, D:\)Customize your Video AdapterCustomize your Active DesctopChange Computer Owner InformationChange Windows Installation PathCustomize your Internet ExplorerRestrict registry autostarts Disable | |||
Updated: 9, 2005 | Rating: 0 | Author: Dimitar Terziev | Size: 1 kb | Demo Go to category: System Utilities > Other Similar programs | |||
319. | TK ChildLock! 1.0 (competent-software.com) | ||
ChildLock! you can limit an user's log on or log off times. Define when users can log on to your PC. If a specified user is already logged on your system on a non-logon-time, it is possible to log him off automatically. I.e. parents can control their children, so that they cannot be logged on to the computer after 7 p.m. So the parents can be sure their children don't | |||
Updated: 9, 2005 | Rating: 0 | Author: Timo Kosiol | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
320. | TuneUp Utilities 2006 (tune-up.com) | ||
TuneUp Uninstall Manager. Optimize the performance of your computer With the new 1-Click Maintenance, frequent maintenance tasks such as cleaning the hard disk and the registry can be completed with a single mouse click or even automatically on a scheduled basis. TuneUp System Optimizer optimizes your system and internet settings and provides you with valuable information on | |||
Updated: 2, 2006 | Rating: 831 | Size: 8888 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
|
Home > Computer control software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|