|
||||||
|
||
|
Home > Access security software |
Related keywords: security, access, Security, Access, access control, ms access, remote access, computer security, internet security, microsoft access |
|
|
421. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
PC Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
422. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
can remotely monitor children's PC activity using this software. A security service could monitor employee's PC activity from any Internet host in the world to prevent industrial espionage. For local Intranet networks a system administrator can monitor correctness of user's PC activity and restore activity history in any case of problems. Government, law enforcement and investigative | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
423. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
PC Activity Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
424. | PC PhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
425. | PCWash 3.2 (pcwash.com) | ||
Simply, safely and securely erase the secrets your computer is keeping about you, eliminate evidence of your online surfing activities, delete sensitive data, cover your tracks and regain your personal privacy with PCWash. PCWash erases/deletes index.dat, internet history, cookies, auto complete, erases/deletes index.dat, internet history, cookies, and more. Easy to use and customize to clean only what you want. Automatic scheduler included | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Wroblewski | Size: 3134 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
426. | PDF-Security 1.0 (cadkas.de) | ||
PDF files against unauthorized access and encrypt them! The program limits the access to PDF documents. You decide if a PDF file can be printed in th Acrobat Reader or if somebody may copy or edit the text. You can deside if the user have to enter a password in order to view the file. It is also possible to decrypt PDF files. If they are protected by a password you have to | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian A.D. Kassler | Size: 387 kb | Demo Go to category: System Utilities > Other Similar programs | |||
427. | PestPatrol 3.0 (safersite.com) | ||
biggest threats to your network security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens, you could lose passwords, customer data, intellectual property - even your | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
428. | PowerKey 2.0 (gals1.chat.ru) | ||
PowerKey is an advanced encryption toolkit with many unique features which you won't come across in other products of such a kind available online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
429. | Privacy For Windows 3.2c (aidsoft.com) | ||
password protection for Windows 95 or 98, eliminating unauthorized access. The password is encoded for extra protection.This program miminizes to the system tray for quick loading if you need to walk away from your computer. It also lets you know if there is an unauthorizedlogin attempt. You have the option to use your own backgrounds. With a quick doubleclick of the padlock in the | |||
Updated: 9, 2005 | Rating: 0 | Author: Nathan Hunt | Size: 1979 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
430. | Privacy Master 3.9 (webroot.com) | ||
many people have access to your computer? Do you know who they are? Hackers, visitors, co-workers, family members? The reality is most computers are accessible to multiple users making it difficult, if not impossible, to secure your personal and sensitive information. Privacy Master creates a safe haven within your computer where everything you choose is encrypted and hidden from | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Access security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|