|
||||||
|
||
|
Home > Password access software |
Related keywords: password, access, Access, access control, Password, ms access, password manager, remote access, password protection, microsoft access |
|
|
341. | Lockout Desktop Security 1.1.652 (dynamicdesigns.co.uk) | ||
and restrictions for specific users and groups, control access to certain applications, restrict when your PC can be used, restrict CD usage, log Internet usage, and log attempts at restricted activities. Note: This is a 30-day trial. After 30 days, the program will be disabled after 15 minutes of use. The full-version retail price is Ј30. Some Of | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Wilkinson | Size: 2857 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
342. | Easy Tray 3.03 (softdd.com) | ||
click. This is a time saving program which enables you to quickly access any programs or documents, open many applications at one time, open webpages, and even start your screensaver from the system tray icon. You can also open applications with documents already pre-loaded, enable or disable your | |||
Updated: 9, 2005 | Rating: 0 | Author: SoftDD Software | Size: 483 kb | Shareware Go to category: Development > Other Similar programs | |||
343. | EldoS KeyLord 4.0 (eldos.org) | ||
KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
344. | EldoS PKI Tools 1.2 (eldos.org) | ||
seamlessly integrates into Windows Explorer to provide easy access to file manipulation functions. It lets you perform both simple file operations such as pack files into ZIP archive, send files by e-mail, securely delete files and advanced security operations such as signing and encryption of files and folders. All operations are performed in a couple of clicks, e.g. you can | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
345. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
content and all emails including POP3 and I/M usernames and PASSWORDS. E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
346. | Encrypt PDF Command Line 2.1 (toppdf.com) | ||
5.0 and up) existing PDFs, set permissions, add user and owner password. For example you can encrypt a PDF without to allow to print it. The button to print the file will be disabled in Acrobat Reader application, you also can encrypt a PDF allowing the user to read it only if he know the correct password. Note, The source PDF must be an unencrypted PDF. Acrobat Reader | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 34 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
347. | Find Protected 2.0 (aks-labs.com) | ||
Protected designed to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT administrators can | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
348. | Enforcer 6.2 (posum.com) | ||
Enforcer provides security for systems that are accessible to many people and require a consistent configuration and a consistent, limited selection of services such as public displays or computer labs. It is also great for limiting users to the webpages you approve such as on a VPN or for childproofing | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1566 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
349. | EXEsafe 2 (members.aol.com) | ||
security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When the protected program is run, the EXEsafe lock will process all the information, and decide whether access should be allowed. If not, a customisable message | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
350. | EZ Password Secure 1.2 (esmarttools.com) | ||
Password Secure is a powerful tool to help you manage all your passwords and usernames, as well as the URLs and descriptions, in different groups. Further more, EZ Password Secure can store all other personal information, e.g. bank accounts. Built-in Password Generator provides custom passwords. With the 1-Click function, you can paste the | |||
Updated: 9, 2005 | Rating: 0 | Author: Yunqing Feng | Size: 628 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Password access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|