|
||||||
|
||
|
Home > Access security software |
Related keywords: security, access, Security, Access, access control, ms access, remote access, computer security, internet security, microsoft access |
|
|
641. | Online Services Center 2.3 (itlaurel.com) | ||
We can customize reports for our clients. OSC also have strong security features, allowing assignment of proper Users to Groups accessing only to certain features of application. Also OSC if fully language-customizable, so one can translate it quickly to his native language. OSC was written using Microsoft Visual Basic 6.0, Microsoft SQL Server 7.0 (works under SQL 2000) | |||
Updated: 8, 2004 | Rating: 0 | Author: Janice Petros | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
642. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
can remotely monitor children's PC activity using this software. A security service could monitor employee's PC activity from any Internet host in the world to prevent industrial espionage. For local Intranet networks a system administrator can monitor correctness of user's PC activity and restore activity history in any case of problems. Government, law enforcement and investigative | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
643. | ScreenLock 9.0 (screenlock.com) | ||
a program that will prevent any other person from being able to access your computer, then this is the program you need." --PCWin ScreenLock is unlocked via answering a question that you provide yourself and can change or edit at any time. For instance, you could make ScreenLock ask you "What is the meaning of life?". Your customized answer could be anything that comes to your mind | |||
Updated: 8, 2004 | Rating: 0 | Author: Gregory Nelson | Size: 1977 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
644. | Service Center Operator 2.3 (newageit.com) | ||
reports for our clients. Service Managem also have strong security features, allowing assignment of proper Users to Groups accessing only to certain features of application. Also Wor if fully language-customizable, so one can translate it quickly to his native language. It was written using Microsoft Visual Basic 6.0, Microsoft SQL Server 7.0 (works under SQL 2000) | |||
Updated: 8, 2004 | Rating: 0 | Author: Matthew Jacobson | Size: 224 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
645. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
Activity data is sensitive data, and ActMon prevents unauthorized access to the log files and screenshots using the strong U.S. government approved AES/Rijndael 256-bit encryption. The interface is comprehensive and user-friendly. It has a wizard-driven installation making it extremely easy to set up and use. The setup is password protected thereby preventing unauthorized | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
646. | Advanced Security Control 2.1 (protect-me.com) | ||
when any program can be executed and by whom. You can control access to any 32-bit software, such as games, Internet browsers, or anything else depending on the time of day and day of week. Configuration is as simple as setting up login hour restrictions. Just choose a program, define users who should be affected by the rules, and choose when to enable and disable access on | |||
Updated: 8, 2004 | Rating: 0 | Author: Ashot Oganesyan | Size: 1081 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
647. | Captain Mnemo Pro 1.4 (captainmnemo.com) | ||
how many potential threats are out there. That is why computer security becomes the major issue these days. As a solution for ever increasing data security fears many programs and services offer password protection. And to be honest, password protected environments are becoming actually secure being supported by latest technology advancements such as rock-solid encryption | |||
Updated: 8, 2004 | Rating: 116 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
648. | CDLock 1.4 (protect-me.com) | ||
support auto-eject feature can be used and by whom. You can control access to any removable disks, such as CD-ROMs, optical disks, or anything else depending on the time of day and day of week. CDLock even allows controlling access to the Audio CDs so you can build secure but user-friendly | |||
Updated: 8, 2004 | Rating: 16 | Author: Ashot Oganesyan | Size: 749 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
649. | FolderSafe 2.1 (occultsoft.com) | ||
FolderSafe is a software tool that lets you hide or restrict access to non-virtual files and folders of your choice, manage your net shares. If you want to improve security of some sensitive folders/files, FolderSafe can help. FolderSafe Features - Office XP style UI - Easier to utilize - Complete control over access to your choice - Protection from both | |||
Updated: 8, 2004 | Rating: 120 | Author: Ken Li | Size: 3066 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
650. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth mode option, hot key access, Email logs, Monitoring and logging across your home network, LAN or the Internet in real-time with an optional add-on | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Access security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|