|
||||||
|
||
|
Home > Restrict access software |
Related keywords: access, Access, access control, restrict, ms access, remote access, microsoft access, MS Access, Microsoft Access, last access |
|
|
391. | Tweak Genie 6.0.1 (tweakgenie.com) | ||
functionality to password protect the application so that you can restrict its use. See what this program offers: the original Tweak Genie ™ Pro - unlike other tweaking utilities, Tweak Genie ™ Pro bundles more than 1000 different utilities in one: it was developed to combine both tweaking and optimizing features to increase the speed of your All Windows® and XP system | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 620 kb | Freeware Go to category: System Utilities > System Maintenance Similar programs | |||
392. | Tweak Manager 2.12 (winguides.com) | ||
using Live Update Take complete control of your Windows system with access to hundreds of powerful tweaks and hidden registry | |||
Updated: 9, 2005 | Rating: 0 | Author: WinGuides Software | Size: 1721 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
393. | Universal Plug-and-Play Tester 1.0 (Build 6.5) (noeld.com) | ||
Universal Plug-and-Play Tester is an experimental tool which lists all the available Internet Gateway Devices (IGDs) compatible with the Universal Plug-and-Play protocol. As soon as the program starts, it searches for available devices. You can enumerate the devices again at any time by clicking the Discover As soon as the program starts, it searches for available devices | |||
Updated: 9, 2005 | Rating: 0 | Author: Noel DANJOU | Size: 87 kb | Freeware Go to category: Network & Internet > Network Monitoring Similar programs | |||
394. | Universal Shield 4.0 (everstrike.com) | ||
tool for your computer - hide files, folders, and drives, and set access rules using flexible security combinations for your most precious data. A unique feature of Universal Shield is the perfect combination of data hiding and encrypting. This feature is very important nowadays when everybody knows that information is money, and information security and protection is very important | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
395. | User Control 2005 (salfeld.com) | ||
User Control allows you to block any undesired window title or any application / EXE-file. On the Internet you can define exactly which contents shall be allowed and which not. You can also explicitly allow only authorized applications and/or Internet addresses. Block the varied Windows systems areas (such as | |||
Updated: 9, 2005 | Rating: 34 | Author: Dierk Salfeld | Size: 4027 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
396. | User Finder 2.2.44 (compulsionsoftware.com) | ||
User Finder scans your network computers to provide details of which user is logged onto which computer throughout your network. Finding users on your network just became easier. Why should you choose User Finder? No longer do you need psychic powers to find which computer a user is logged onto. Finding users on your network just became easier | |||
Updated: 3, 2005 | Rating: 48 | Author: Adrian Wallis | Size: 4203 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
397. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
RAM size, operating systems. All information is collected in a Access database for easy integration with pre-existing software. Monitors your networked computers and reports hardware & software changes. The software is a valuable tool for ensuring that you have total control of where computers are located, their levels of performance and the hard/software | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
398. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
is a multi-user system, with support for concurrent users, user access rights and administrator functions, and encrypted databases. Also included is the Automatic Retention Monitorâ„¢ to control the amount of disk space allocated for recording purposes through user-defined values for maximum file age and total file size. Visual Hindsight is ideal for monitoring convenience stores | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
399. | Vypress Chat 2.1 (vypress.com) | ||
a dedicated server to support discussions, and all users have equal access to the application's tools and functions. Vypress Chat enables individuals to instantly communicate about joint projects, and managers can send instantaneous memos to individuals, departments, or the entire company. Vypress Chat works with both TCP/IP and IPX/SPX network protocols. You get an interface | |||
Updated: 9, 2005 | Rating: 132 | Author: VyPRESS Research , LLC | Size: 2075 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
400. | W2kTotalPowerWhere 1.0.2 (tryware.dk) | ||
this problem. Important: This is not a hackers tool to gain more access. It only reports, what Your IT-sysadm already has given You, and Your colleguages. Many IT-sysadms will answer, that this problem is solved with AD-policy, but it can't. More and more programs upgrades themselves while | |||
Updated: 9, 2005 | Rating: 0 | Author: Jorgen Malmgren | Size: 631 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
|
Home > Restrict access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|