|
||||||
|
||
|
Home > Permissions software |
|
|
51. | Registry Explorer 1.4 (regxplor.com) | ||
through the registry. On Windows 2000, you can even edit a key's permissions, just like in regedt32. The software also lets you link to the registry from a web page. You can create "inverse reg files" that delete the selected keys or values instead of adding them. A handy little feature is the | |||
Updated: 9, 2005 | Rating: 0 | Author: Henk Devos | Size: 1370 kb | Adware Go to category: System Utilities > Registry Tools Similar programs | |||
52. | Remote Administrator 2.2 (radmin.com) | ||
from, shutdown, logoff, etc. All provided you have a login and the permissions. Radmin provides robust 128-bit strong encryption of all data streams. Radmin supports the OS-integrated NT security system with NTLMv2 support, and includes smart protection from password guessing and DoS attacks. The software is based on the TCP/IP protocol. All you need to control a computer located | |||
Updated: 9, 2005 | Rating: 257 | Author: Dmitri Znosko | Size: 1855 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
53. | encryptX SecurDataStor Premium 6.0 (encryptx.com) | ||
archive or wrapper around the protected data and stores the permissions in that wrapper. The permission-based rights management feature enables the originator of the information to specify access control rules and set an automatic expiration date for access to the data. The audit trail feature enables users to track archives of information that were shared, with whom, their | |||
Updated: 8, 2004 | Rating: 107 | Author: David Duncan | Size: 490000 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
54. | SecurDesk! 5.32 (cursorarts.net) | ||
after a specified period; limit usage days and times; expire user permissions; restrict to only a single instance of a program; and much more... See how this complete shell replacement can help you control access, maintain a common desktop across multiple machines, protect data, etc. A secure shell replacement that offers many options which may be used alone, or in conjunction | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
55. | SQL7Print 7.14.73 (starprint2000.com) | ||
SQL Server 7 schema object definitions, including dependencies and permissions, for Database Roles, Defaults, File Groups, FullText Catalogues, Log Files, Rules, Stored Procedures, System Datatypes, Tables, Transaction Logs, User Defined Datatypes, Users, Views, Backup Devices, Logins,Languages, Remote | |||
Updated: 9, 2005 | Rating: 0 | Author: Joginder Nahil | Size: 3484 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
56. | Sure Delete 4.1.9 (concentric.net) | ||
environments without worry. (NT/2000 users must have the appropriate permissions). Sure Delete is packed with features. Besides being able to wipe files Sure Delete now can wipe free drive space. So even if you forgot to delete the file via Sure Delete, you can just wipe the empty HD space, and you can be sure its gone. Another feature is the ability of the user to choose | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael L | Size: 427 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
57. | Visual Audit Trail 2.0 (visual-audit.homeip.net) | ||
users actions. General security screening. Validating user permissions. Features Audits can be placed on ANY table in your database. Track inserts, updates and deletes. You choose the columns that will be saved in the Audit tables. All Audits automatically include the User ID and a timestamp Save before and after data on update audits. Audits can be | |||
Updated: 3, 2005 | Rating: 42 | Author: Ben Rosato | Size: 4992 kb | Commercial Go to category: Business > Databases & Tools Similar programs | |||
58. | Timesheets Lite 1.1.0.9 (users.tpg.com.au) | ||
user system with user security (including password control) and permissions Centralised database allowing multiple client installations and one secure database location Uses Microsoft Access database allowing you to generate your own reports easily using Access. Full source code available for modification On going support and development Timesheets Lite is ideal for | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Nemtsas | Size: 2755 kb | Freeware Go to category: Business > Project Management Similar programs | |||
59. | DevSolutions FTP 1.0 (devsolutions.net) | ||
(MS Proxy and Netscape Proxy). Allows setting file and directory permissions on server. MTS enabled. Resumes file transfer in case of network error. Compliant with RFC 959/ 1579. Fully uses Winsock-2 optimizations for best performance Supports all standard FTP commands as well as custom FTP commands Supports multiple uploading/downloading of | |||
Updated: 2, 2006 | Rating: 0 | Author: supportTeam | Size: 1115 kb | Shareware Similar programs | |||
60. | @TheOffice Remote Office Connectivity 2.0 (attheoffice.trispen.com) | ||
instance, @TheOffice integrates with your existing Windows Domain. Permissions are checked against your normal Domain Users by default. No additional access lists to create or maintain! Trispen's @TheOffice provides Secure Remote Access and Office Connectivity by letting you virtually plug into your | |||
Updated: 9, 2005 | Rating: 0 | Author: Trispen Technologies | Size: 9193 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Permissions software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|