|
||||||
|
||
|
Home > Access security software |
Related keywords: security, access, Security, Access, access control, ms access, remote access, computer security, internet security, microsoft access |
|
|
371. | E-Service Center Manager (ESCM) - Server 2.3 (alarit.com) | ||
We can customize reports for our clients. ESCM also have strong security features, allowing assignment of proper Users to Groups accessing only to certain features of application. Also ESCM if fully language-customizable, so one can translate it quickly to his native language. ESCM was written using Microsoft Visual Basic 6.0, Microsoft SQL Server 7.0 (works under SQL | |||
Updated: 9, 2005 | Rating: 0 | Author: Claus Wagner | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
372. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your private files and e-mail messages, and all your other sensitive documents can easily fall into the wrong hands. East-Tec FormatSecure 2005, in | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
373. | EldoS KeyLord 4.0 (eldos.org) | ||
in secure encrypted file. Integration with Internet Explorer makes access to web sites | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
374. | EldoS PKI Tools 1.2 (eldos.org) | ||
seamlessly integrates into Windows Explorer to provide easy access to file manipulation functions. It lets you perform both simple file operations such as pack files into ZIP archive, send files by e-mail, securely delete files and advanced security operations such as signing and encryption of files and folders. All operations are performed in a couple of clicks, e.g. you | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
375. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
EIM products require installations on every computer, causing major access, privacy and compatibility problems. (Additional costs range from $49 to $179 per license = Thousands.) E.M. can monitor thousands of computers from just one computer, one installation, one license; 3) Technical Complexity- Employee Monitoring is simple, anyone can install and operate it; 4) Incomplete | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
376. | Find Protected 2.0 (aks-labs.com) | ||
on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT administrators can do a deep inspection of employees' files to enforce an | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
377. | Enforcer 6.2 (posum.com) | ||
provides security for systems that are accessible to many people and require a consistent configuration and a consistent, limited selection of services such as public displays or computer labs. It is also great for limiting users to the webpages you approve such as on a VPN or for childproofing individual systems. It is easy to configure and requires little to no modifications to | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1566 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
378. | EXEsafe 2 (members.aol.com) | ||
It uses the highly secure blowfish encryption algorithm for extra security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When the protected program is run, the EXEsafe lock will process all the information, and decide | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
379. | File Monster 2.6.7 (nstarsolutions.com) | ||
information in those files something you want just anyone to have access to? # When you leave your office at night, just who has access to your computer? # Do you trust that neighbor that comes over to your house to use or fix your computer? How about your roommate? # Do you trust the people | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
380. | FileWrangler 5.30 (cursorarts.net) | ||
view and run programs and documents without extracting, etc.); - Security options to hide file types, folders and drives from file manager users, as well as to prevent access to various file management functions; - Wipe, normal delete, and recycle file deletion options; - Encrypt and decrypt | |||
Updated: 9, 2005 | Rating: 16 | Author: CursorArts Company | Size: 2893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Access security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|