|
||||||
|
||
|
Home > Access security software |
Related keywords: security, access, Security, Access, access control, ms access, remote access, computer security, internet security, microsoft access |
|
|
331. | DriveCryptPlusPack 1.0c (securstar.de) | ||
at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a FIPS-approved symmetric encryption algorithm that may be used by U.S.Government organizations(and others) to | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
332. | E-Service Center Manager (ESCM) - Server 2.3 (alarit.com) | ||
We can customize reports for our clients. ESCM also have strong security features, allowing assignment of proper Users to Groups accessing only to certain features of application. Also ESCM if fully language-customizable, so one can translate it quickly to his native language. ESCM was written using Microsoft Visual Basic 6.0, Microsoft SQL Server 7.0 (works under SQL | |||
Updated: 9, 2005 | Rating: 0 | Author: Claus Wagner | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
333. | East-Tec File Shredder 1.0 (east-tec.com) | ||
contents on your hard disk, easy to be recovered by anyone that has access to your computer. East-Tec File Shredder securely destroys (shreds) sensitive and private files beyond recovery. Simply drag and drop files to the shredder icon on your desktop, or select the files you want to destroy directly | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
334. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your private files and e-mail messages, and all your other sensitive documents can easily fall into the wrong hands. East-Tec FormatSecure 2005, in | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
335. | Easy File Protector 4.14 (softstack.com) | ||
File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
336. | EldoS KeyLord 4.0 (eldos.org) | ||
in secure encrypted file. Integration with Internet Explorer makes access to web sites | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
337. | EldoS PKI Tools 1.2 (eldos.org) | ||
seamlessly integrates into Windows Explorer to provide easy access to file manipulation functions. It lets you perform both simple file operations such as pack files into ZIP archive, send files by e-mail, securely delete files and advanced security operations such as signing and encryption of files and folders. All operations are performed in a couple of clicks, e.g. you | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
338. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
EIM products require installations on every computer, causing major access, privacy and compatibility problems. (Additional costs range from $49 to $179 per license = Thousands.) E.M. can monitor thousands of computers from just one computer, one installation, one license; 3) Technical Complexity- Employee Monitoring is simple, anyone can install and operate it; 4) Incomplete | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
339. | Find Protected 2.0 (aks-labs.com) | ||
on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT administrators can do a deep inspection of employees' files to enforce an | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
340. | Enforcer 6.2 (posum.com) | ||
provides security for systems that are accessible to many people and require a consistent configuration and a consistent, limited selection of services such as public displays or computer labs. It is also great for limiting users to the webpages you approve such as on a VPN or for childproofing individual systems. It is easy to configure and requires little to no modifications to | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1566 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Access security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|