|
||||||
|
||
|
Home > Access security software |
Related keywords: security, access, Security, Access, access control, ms access, remote access, computer security, internet security, microsoft access |
|
|
61. | Transparent Screen Lock PRO for WinNT/2000/XP/2003 4.50 (e-motional.com) | ||
Lock PRO while viewing programs that are running. Prevent system access via CRTL-ALT-DEL. Options to remove the pocess from the Windows Task Manager and restrict configuration menus to Administrators only in order to prevent regular users from disabling or tampering with the program. Log file tracks failed logon attempts, and can initiate shutdown/logoff. Save log file locally, to | |||
Updated: 2, 2006 | Rating: 16 | Author: Sandra Buckingham | Size: 992 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
62. | 1st Security Agent 6.14 (getfreefile.com) | ||
Security Agent is an excellent password-protected security utility to secure Windows-based computers. It works under any Windows platform and offers an administrative support for controlling which users are allowed to access your computer and the level of access each user may have. You can choose to restrict access to lots of Control Panel applet functions | |||
Updated: 2, 2006 | Rating: 214 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
63. | ABC Security Protector 5.23 (getfreefile.com) | ||
nice free security utility enables you to protect your PC by disabling some features like: use of the MS-DOS command prompt in Windows and real mode DOS applications from within the Windows shell, and disable function keys on boot up like the F5, F6 and F8 keys. The program is very useful if you want to disable the lowlevel access to your system. It's easy to use, excellent | |||
Updated: 2, 2006 | Rating: 39 | Author: Ixis Ltd | Size: 563 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
64. | SecureWord 1.5 (secureword.com) | ||
We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
65. | Security Administrator 10.14 (softheap.com) | ||
access to your PC with Security Administrator. This password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your desktop. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, etc. You can | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
66. | Security Administrator 10.14 (getfreefile.com) | ||
access to your PC with Security Administrator. This password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your desktop. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, etc. You can | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
67. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
that it is statistically impossible for an unauthorized person to access the encrypted data. SIT 2000 is so simple to use. SIT 2000 is designed to meet the growing security and privacy needs of all computer users. The software combines ease of use with state of the art technology to ensure total security with a zero learning curve and maximum convenience. The program is | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
68. | Folder Security Personal 3.5 (y0ys.com) | ||
Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only ,preventing modification or deletion by other users or programs. The program can also lock Floppy, CDrom, USB sticks, and other removable drives or make them read-only. It works with drive of all of FAT/FAT32/NTFS formats. This | |||
Updated: 2, 2006 | Rating: 666 | Author: Y0YS Software | Size: 803 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
69. | SafeSystem 2006 (gemiscorp.com) | ||
allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. It can make your files and folders completely invisible, inaccessible or simply read-only and prevent the change of configuration and the accidental (or even intentional) system files deletion or alteration, so your PC | |||
Updated: 2, 2006 | Rating: 0 | Author: GemiScorp | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
70. | Registrar Registry Manager 4.03 (resplendence.com) | ||
a great tool for cleaning your registry from unwanted entries. Security editors allow you to set registry key access permissions, auditing and ownership. It offers multi-level undo so all registry changes can be individually undone. The program comes in an attractive explorer-style interface which is highly customizable. Registrar Registry Manager is a complete registry | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Terhell | Size: 2239 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
|
Home > Access security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|