|
||||||
|
||
|
Home > Access security software |
Related keywords: security, access, Security, Access, access control, ms access, remote access, computer security, internet security, microsoft access |
|
|
381. | Logbook 1.7 (home.t-online.de) | ||
===================================== Logbook fьr Windows 9x/ME Version 1.7 ===================================== Functions: ---------- Registration of working hours on PC including time of boot up, shut down, standby and user change. Resistant to manipulations. Detailed reports and totals of | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 34 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
382. | MacPhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
383. | Magic Folders XP 04.04.2 (pc-magic.com) | ||
enter your password and you'll instantly have complete and normal access to all your folders and the files within. There's no need to un-hide each file or folder individually. And Magic Folders is totally transparent. No one need know your invisible folders/files even exist. If you wish you can establish 5 different accounts so everyone using your computer can create their own | |||
Updated: 9, 2005 | Rating: 243 | Author: Scott Chaney | Size: 649 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
384. | Masker 7.0.6 (softpuls.com) | ||
the monitor. Only you, using your password, are allowed to obtain access to the hidden files. http://www.softpuls.com/masker/ Hide any files and have them automatically encrypted! MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files without changing the exterior | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
385. | MicroLocked 1.6.3 (jcmatt.com) | ||
is a small, easy to setup, security program that locks your computer while leaving the display visible. Once locked your system can not be accessed until the unlock password is entered. Your system screen saver can be used normally or set to activate when your machine locks. Desktop icons and taskbar can be optionally hidden while locked. Ideal for personal or business | |||
Updated: 2, 2006 | Rating: 0 | Author: James Matt | Size: 1630 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
386. | ArchiDoc (3035) (canteco.net) | ||
gives any size enterprise the ability to quickly find, share and access all document types both scanned in paper and electronic files, from one easy screen. Sofisticated Security; Easy-to-install;Version Control;Team work;Office integration;Multy Language interface;Auditing and reporting. As well as (for Oracle product line) Instant back-up; Internet-type access | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleks Kamyshan | Size: 3991 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
387. | Kickstart 1.02 (westfaro.com) | ||
that inserts rows into a particular database as well as handling security, audit trails and locking. If you want to use that stored procedure as a standard template then you can do it manually, cutting, pasting, editing and testing or you can use Kickstart to do the tedious work for you in a few simple steps. Start Kickstart and point it the database you want to work with. Load your | |||
Updated: 9, 2005 | Rating: 298 | Size: 7069 kb | Commercial Go to category: Development > Other Similar programs | |||
388. | Wondercam 1.01 (intranet.wonderlabs.info) | ||
. The application is automatically configured. Mobility: Access to the realtime images from any device. Connection can be done by means of HTML, WAP 1.0/2.0, i-mode, XHTML, MIDP 1.0. Security:Access to the images by means of authentication in the system Robustness. Text insertion. Note: Directx8.1 or higher required. Direkeep an eyectly from your | |||
Updated: 3, 2005 | Rating: 0 | Author: Wonderlabs | Size: 3593 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
389. | Auto ShutDown XP Professional 2003 (gillit.com) | ||
time you use it. Lots of other functions and features such as Security, Quick Shutdown using the ASD XP t The most advanced Auto ShutDown application on the market. Functions include Schedules, Conditional shutdown, Security, Prevent PC Restarts, Quick Shutdown, Remote systems shutdown, user guide and lots | |||
Updated: 9, 2005 | Rating: 145 | Author: R Gill | Size: 1353 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
390. | ECS (Event Control System) 2.3.14 (OmnipotenceSoftware.com) | ||
ECS, as it supports a browser-based user-interface (which may be accessed from any desired Internet connection or WAP-enabled phone/PDA). "Lite" version is $90 and "Complete" version is $340. All-purpose/object-oriented automation for residential, commercial, and industrial environments. Extremely powerful, yet elegantly simple. Automated tasks may be implemented via simple | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Gilmore | Size: 12000 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
|
Home > Access security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|