|
||||||
|
||
|
Home > Access security software |
Related keywords: security, access, Security, Access, access control, ms access, remote access, computer security, internet security, microsoft access |
|
|
491. | Tweak Manager 2.12 (winguides.com) | ||
using Live Update Take complete control of your Windows system with access to hundreds of powerful tweaks and hidden registry | |||
Updated: 9, 2005 | Rating: 0 | Author: WinGuides Software | Size: 1721 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
492. | Tweaki/FileName Pro Bundle 1.2 (jermar.com) | ||
computer run and boot faster, secure your computer from unauthorized access, tweak Microsoft Office and Internet Explorer, prevent access to web sites, stop downloading of files from the Internet, manage your Internet Explorer Favorites and add productivity enhancements like forcing Windows | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Rawdon | Size: 5802 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
493. | Tweaking Toolbox XP 1.60 (tweakingtoolbox.com) | ||
Prevent others from changing your settings, increase Windows security. Lock down Control Panel applets, Internet Explorer options, even choose which applications can or can't be run on the computer. You can change Windows XP system performance, by selecting to keep the Windows XP core system in memory, and not paged to disk (advisable only if you have 512MB RAM or more). You | |||
Updated: 9, 2005 | Rating: 0 | Author: Arie Slob | Size: 953 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
494. | Ultimate Spy Personal 1.5 (raheel.yi.org) | ||
A sophisticated keyboard spying tool for personal | |||
Updated: 9, 2005 | Rating: 0 | Author: Raheel Hameed | Size: 1156 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
495. | Universal Shield 4.0 (everstrike.com) | ||
tool for your computer - hide files, folders, and drives, and set access rules using flexible security combinations for your most precious data. A unique feature of Universal Shield is the perfect combination of data hiding and encrypting. This feature is very important nowadays when everybody knows that information is money, and information security and protection is | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
496. | User Control 2005 (salfeld.com) | ||
User Control allows you to block any undesired window title or any application / EXE-file. On the Internet you can define exactly which contents shall be allowed and which not. You can also explicitly allow only authorized applications and/or Internet addresses. Block the varied Windows systems areas (such as | |||
Updated: 9, 2005 | Rating: 34 | Author: Dierk Salfeld | Size: 4027 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
497. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
ID or anti-theft labels simplifies checks and affords increased security. Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including: - Hard disk manufacturer and size - Hard disk free space - Processor type and clock speed - RAM size (MB) | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
498. | VisNetic Firewall 2.3 (deerfield.com) | ||
peace-of-mind through comprehensive intrusion protection. Security-conscious professionals running software and/or hardware Internet sharing solutions are as concerned about internal threats as they are about external threats. There is currently not a hardware firewall solution that protects companies against these threats and existing software firewall solutions are priced | |||
Updated: 2, 2006 | Rating: 0 | Author: Deerfield Com | Size: 4601 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
499. | Visual Audit Trail 2.0 (visual-audit.homeip.net) | ||
as 21 CFR Part 11. Track specific users actions. General security screening. Validating user permissions. Features Audits can be placed on ANY table in your database. Track inserts, updates and deletes. You choose the columns that will be saved in the Audit tables. All Audits automatically include the User ID and a timestamp Save before and after data | |||
Updated: 3, 2005 | Rating: 42 | Author: Ben Rosato | Size: 4992 kb | Commercial Go to category: Business > Databases & Tools Similar programs | |||
500. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
is a multi-user system, with support for concurrent users, user access rights and administrator functions, and encrypted databases. Also included is the Automatic Retention Monitorâ„¢ to control the amount of disk space allocated for recording purposes through user-defined values for maximum file age and total file size. Visual Hindsight is ideal for monitoring convenience stores | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Access security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|