|
||||||
|
||
|
Home > Password access software |
Related keywords: password, access, Access, access control, Password, ms access, password manager, remote access, password protection, microsoft access |
|
|
371. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
and security for Windows XP, 2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or flash drive contents protected at all times. This makes it possible for professionals or | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
372. | ID_Bank 1.10.021 (rainbow-innov.co.uk) | ||
Passwords can be trouble especially on the Internet. You may have too many to remember and if you don't take care someone else will gain access to them! ID_Bank can help solve your problem. ID_Bank is a secure identity and password protection system from Rainbow Innovations. ID_Bank is ID_Bank is able to hold your personal information relating to usernames, passwords, pins, login details etc; information in a secure encrypted file | |||
Updated: 8, 2004 | Rating: 0 | Author: John Hudson | Size: 1694 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
373. | IIPwr Package 2.00 (iipwr.com) | ||
to spy on a computer you own but currently don't have direct access to? With IIPwr's KeySpy this is exactly what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
374. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
and SNMP information, open ports and much more. It can also audit password and security policies, perform HTTP/CGI server auditing, registry auditing In addition, Infiltrator also comes with 18 network utilities for footprinting, scanning, enumerating and gaining access to machines (ping sweep, whois lookups, email tracing, share scanning and more). The program can be run from | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
375. | Internet Explorer Password 3.0.189 (lastbit.com) | ||
Explorer Password is a password recovery program for IE Content Advisor. Content Advisor was initially designed as a security feature and a tool to monitor website ratings to prevent minors from accessing adult websites. Since the rating technology never became widespread, this feature is basically useless, and may effectively block the usage of Internet Explorer. If | |||
Updated: 9, 2005 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 61 kb | Demo Go to category: Security & Privacy > Password Managers Similar programs | |||
376. | Internet Explorer Password Revealer 1.3 (rixler.com) | ||
you use Internet, chances are you have over a dozen logins and passwords. Couple for e-mails, few more for online shops, one or two for a newspaper or a magazine subscription, bank accounts and so forth. Plus, there are web forms, shipping and billing addresses, credit card numbers and much, much more. Internet Explorer Password Revealer is a simple software application that | |||
Updated: 3, 2005 | Rating: 48 | Author: Felix Kosolapov | Size: 664 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
377. | IntraChat 2.0 (intrachat.com) | ||
You may protect public and private channels with your own passwords. Another benefit of IntraChat is that you can see which users are available, which ones are not, and which ones are available but do not wish to be disturbed. You can also view complete message history. IntraChat also features non-essential but convenient options, such as an option to set color of your | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey Haidukov | Size: 676 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
378. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
steganography and a library of favorite carriers locations; a password management solution that stores all your passwords securely and helps you create secure passwords, faster access to your passwords by accessing the password manager directly from the tray menu; a virtual keyboard created in order to prevent any key logger software from | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
379. | JvCrypt 1.0 (vandaveer.com) | ||
using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one step. You have the option of creating a single encrypted zip file for each file selected or combining all of your selected files to a | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
380. | Keyboard Monitor 1.7 (tropsoft.com) | ||
are pressed until turned off. Use it to ensure that your child's (or spouse's!) chat room and email activities are on the up and up. Recorded information and access to the Keyboard Monitor are safely password protected. Keyboard Monitor can be run as an invisible background process and it can be set so that it turns on automatically when the machine | |||
Updated: 9, 2005 | Rating: 76 | Author: Silvio Kuczynski | Size: 133 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
|
Home > Password access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|