|
||||||
|
||
|
Home > Access security software |
Related keywords: security, access, Security, Access, access control, ms access, remote access, computer security, internet security, microsoft access |
|
|
421. | Active Network Monitor 2.01 (ntutility.com) | ||
Active Network Monitor is a tool for the day-to-day monitoring of computers in the network. Active Network Monitor runs under Windows NT/2000/XP and allows Systems Administrators to gather information from all the computers (even from the Windows 9x/Me computers) in the network without installing server-side | |||
Updated: 9, 2005 | Rating: 0 | Author: Ashot Oganesyan | Size: 1947 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
422. | Active Kill Disk - Hard Drive Eraser 2.0 (killdisk.com) | ||
KillDisk is a quality security application that destroys data permanently from any computer that can be started using a DOS floppy disk. Access to the drive's data is made on the physical level via the Basic Input-Output Subsystem (BIOS), bypassing the operating systems logical drive structure organization. Regardless of the operating system, file systems or type of | |||
Updated: 9, 2005 | Rating: 985 | Author: LSoft Technologies Inc. | Size: 252 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
423. | Active NTFS Reader for DOS 1.0.2 (ntfs.com) | ||
Reader is a data recovery tool that provides read access to NTFS drives from MS DOS environment. The FREEWARE utility supports long filenames, compressed and fragmented files. You can preview files on NTFS and copy them from NTFS to FAT volumes or network drives. NTFS Reader is a data recovery tool | |||
Updated: 9, 2005 | Rating: 521 | Author: Active Data Recovery Software | Size: 788 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
424. | Advanced Hide Folders 4.6 (hide-folders.biz) | ||
hide folders and files on your computer. The hidden files cannot be accessed unless the folders are unlocked with a password from within the program. You can simple drag and drop folders from Windows or add files by mask (e.g hide all .jpg files). In addition, as an added security measure, you | |||
Updated: 9, 2005 | Rating: 81 | Author: Otto Schulz | Size: 258 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
425. | Advanced NT Security Explorer 2.0 (elcomsoft.com) | ||
NT Security Explorer (ANTExp) is an application for Microsoft Windows NT, Windows 2000 and Windows XP system administrators for finding holes in system security. It analyses user password hashes, and tries to recover plain-text passwords. If it's possible to recover the password in a reasonable time, the password should be considered to be insecure. Some users like simple | |||
Updated: 9, 2005 | Rating: 475 | Author: Vladimir Katalov | Size: 1417 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
426. | Advanced Windows Password Recovery 3.5 (elcomsoft.com) | ||
to VPN (Virtual Private Network) connections, passwords and access rights to shared resources. Other information that could be recovered by AWPR is LSA Secrets; the program also allows to run any programs in other user's context, show password histrory hashes, read password hashes from SAM and SYSTEM files, perform brute-force and dictionary attacks on Windows 9x PWL files | |||
Updated: 9, 2005 | Rating: 7398 | Author: Vladimir Katalov | Size: 1839 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
427. | AIM Keys 3.10.9522 (aimsoft.com) | ||
track your activities and store them for future reference. NEW! Security options. Now you may secure every facet of AIM Keys interface from macros to the entire application. Encrypt your sensitive macros such as passwords to prevent others from using or viewing them. NEW! Expanded Macro Wizard | |||
Updated: 9, 2005 | Rating: 209 | Author: Randy Smith | Size: 2799 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
428. | Akala EXE Lock 3.20 (zero2000software.com) | ||
you're not the only one who has access to your computer then I'd bet that there are certain programs and files you don't want others accessing. There are a multitude of options on how to go about doing this. There are encryption programs, programs that restrict access to portions of your | |||
Updated: 9, 2005 | Rating: 158 | Author: Zero Lee | Size: 1152 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
429. | #1 Key logger 2.0 (allthesoft.com) | ||
invisibly. It logs keystrokes, user names, passwords, path names, access times, windows titles, BOTH sides of a CHAT conversation for most popular chat software, AOL content and visited websites. It logs keystrokes, user names, passwords, path names, access times, windows titles, BOTH sides of a CHAT conversation for most popular chat software, AOL content and visited | |||
Updated: 9, 2005 | Rating: 215 | Author: Herry Kevin | Size: 1048 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
430. | Password Lock Transparent Screensaver Utility 1.10 (e-motional.com) | ||
protect access to your computer, while monitoring programs that are running in the background. Perfect for system administrators, retail stores running computer demos, or any user of email, instant messaging or live stock quotes. Relax in the knowledge that your computer is secure. Password protect access to your computer, while monitoring programs that are running in | |||
Updated: 9, 2005 | Rating: 0 | Author: Sandra Buckingham | Size: 418 kb | Shareware Go to category: Desktop > Similar programs | |||
|
Home > Access security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|