|
||||||
|
||
|
Home > Restrict server access software |
Related keywords: server, access, Access, access control, restrict, Server, web server, ms access, mail server, remote access |
|
|
51. | Access Administrator 4.14 (softheap.com) | ||
your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
52. | Access Administrator Pro 4.14 (getfreefile.com) | ||
Access Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
53. | Access Administrator Pro 4.14 (softheap.com) | ||
Access Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
54. | 1st Evidence Remover 2.14 (getfreefile.com) | ||
work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use | |||
Updated: 2, 2006 | Rating: 190 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
55. | 1st Evidence Remover 2.14 (softheap.com) | ||
work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
56. | Capturix NETWorks 3.11.156 (capturix.com) | ||
used for each port, Trace Route, Ping, command Tester, HTTP server, DNS Lookup and a worldwide WHOis client. Exploit tester and Bandwidth Log. Now It brings the Connection Watcher software. PingCheck lets you ping a list of servers and send a e-mail in case of malfunction. Now includes a Packet Sniffer for debugging operations. Capturix NETWorks is a network utility | |||
Updated: 2, 2006 | Rating: 258 | Author: Alexandre Simoes | Size: 3911 kb | Shareware Go to category: Network & Internet > Trace & Ping Tools Similar programs | |||
57. | WinaXe Windows X Server 7.2 (labf.com) | ||
X Server, Run Linux and Unix on Windows Desktop. WinaXe is the pre-eminent X Windows environment for the Windows 95, 98, 2000, NT and Windows XP platforms. It enables easy access to different operating systems. It transparently connects different operating systems and their applications together. You need not worry where these applications are physically located on your | |||
Updated: 2, 2006 | Rating: 50 | Author: LabF LabF | Size: 17114 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
58. | Web Log Explorer 3.0 (exacttrend.com) | ||
or charts trying to figure out what is going on your web site, proxy server, firewall etc. Good log analyzers create "multilevel" and cross-linked reports. For example, when you see a page views report, you can click a certain page name and see visitors who accessed this page on any day, or a list of referrers that led visitors to this page. Normally, all these reports are | |||
Updated: 2, 2006 | Rating: 0 | Author: Serge Karmanov | Size: 1289 kb | Shareware Go to category: Web Development > Log Analysers Similar programs | |||
59. | Tech-Pro POP3 Pal 1.13 (tech-pro.net) | ||
is a mail client for people on the move. It provides an easy way to access your POP3 mail from any Windows-based PC. It can also be used for mailbox maintenance - for example, to delete an unwanted large message that is blocking access to your other email. POP3 Pal lets you read and reply to | |||
Updated: 2, 2006 | Rating: 0 | Author: Julian Moss | Size: 650 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
60. | Proxifier 2.00 (proxifier.com) | ||
network applications that do not support working through proxy servers to operate through a HTTP or SOCKS proxy server or a chain of proxy servers. There are many network applications that do not support working through proxy servers and thus cannot be used from LAN or with firewalls. These can compromise corporate privacy and lead you to many other | |||
Updated: 2, 2006 | Rating: 3044 | Size: 685 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Restrict server access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|