|
||||||
|
||
|
Home > Network control software |
Related keywords: network, control, Network, access control, parental control, Control, remote control, network monitor, version control, network monitoring |
|
|
421. | IntelliPointer 4.0 (intellipointer.com) | ||
ergonomic device with over 50% reduction in hand movement, superior control, comfort, precision and smooth operation. IntelliPointer allows easy and precise movement of the pointer to anywhere on the computer screen with a small and slow movement of the hand. There is no need to accelerate or lift and reposition the mouse. Select up to 4 times the precision with half the hand | |||
Updated: 8, 2004 | Rating: 0 | Author: Mahmoud Razzaghi | Size: 1024 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
422. | ShixxNOTE 5.net (free-ri.hinet.hr) | ||
(LAN messanger) and a communications tool used across a local network (LAN), Internet and via e-mail. Easy to use personal info management application and powerful communication tool. It features an alarm, backup and restore function, and many other features. It is configurable and stable. It is multithread client/server network tool that lets you display notes on your | |||
Updated: 8, 2004 | Rating: 0 | Author: Ozren Sirola | Size: 585 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
423. | SecurDataStor 5.01 (encryptx.com) | ||
encryption program for Windows. Encrypt files, folders, local and networked hard drives, CD, DVD and email attachments using a simple, intuitive interface. Hide encrypted folders and share sensitive data with recipients who can view decrypted files without having the software installed. Protect your private personal and business files from spyware, snooping agents, and theft of | |||
Updated: 8, 2004 | Rating: 65 | Author: David Duncan | Size: 2673 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
424. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
ActMon can hide the logs on the monitored PC or send them via network or email. The monitoring can be opted to be invisible to the user and ActMon is protected against manipulation: The program runs completely maintenance free. Activity data is sensitive data, and ActMon prevents unauthorized access to the log files and screenshots using the strong U.S. government | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
425. | CDLock 1.4 (protect-me.com) | ||
which support auto-eject feature can be used and by whom. You can control access to any removable disks, such as CD-ROMs, optical disks, or anything else depending on the time of day and day of week. CDLock even allows controlling access to the Audio CDs so you can build secure but user-friendly environment on every workstation in the network. CDLock enhances access | |||
Updated: 8, 2004 | Rating: 16 | Author: Ashot Oganesyan | Size: 749 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
426. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
hot key access, Email logs, Monitoring and logging across your home network, LAN or the Internet in real-time with an optional add-on product HWIN, and much more. Logs may be sent to a decrypted comma delimited text file for importation into thousands of other applications for storage or further | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
427. | Logbook 1.7 (home.t-online.de) | ||
to manipulations. Detailed reports and totals of months. For self-control or children-control. After installation you can see a small clock icon in the taskbar. If you click this icon (right mouse button) you can see: - how long are you working (session duration) - detailed logbook for | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 34 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
428. | ProtectZ 1.60 (actualsecurity.com) | ||
all EXE or DLL files from rewriting. You may make all file's attributes unmodified. ProtectZ protects files and folders on local hard disk drive, network drive, character device and gives you possibility to view unauthorized access which is stored in the log file. ProtectZ enables you to permit access to protected files and folders by specified processes | |||
Updated: 8, 2004 | Rating: 723 | Author: Konstantin Evseenko | Size: 574 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
429. | encryptX SecurDataStor Premium 6.0 (encryptx.com) | ||
program for Windows. Encrypt files, folders and CD, DVD on local and networked drives; encrypt email attachments using a simple, intuitive interface. Hide encrypted folders and share sensitive data with recipients who can view decrypted files without buying encryptX software. Burn encrypted CD/DVDs directly from within the application. Enable document rights management through | |||
Updated: 8, 2004 | Rating: 107 | Author: David Duncan | Size: 490000 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
430. | WIDO Logbook 1.3 (home.t-online.de) | ||
excluded of check. More-computers report. (of interest for big network administrators) Registers number of working hours on your computer. Stores the time of boot up, shut down, standby and user change.It is resistant to manipulations and recognises the time manipulations. Makes reports group by day, week, month, quarter and | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 1519 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Network control software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|