|
||||||
|
||
|
Home > Driving software |
|
|
751. | 1st Security Administrator 10.14 (softheap.com) | ||
editing, Internet and Network access. Hide desktop icons, individual drives, Start Menu items, taskbar, task manager, tray icons. Apply password protection to Windows and restrict users to running applications. Control Internet Usage, spy on PC users. Security restrictions can be applied universally or | |||
Updated: 2, 2006 | Rating: 432 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
752. | 1st Security Administrator Pro 10.14 (softheap.com) | ||
editing, Internet and Network access. Hide desktop icons, individual drives, Start Menu items, taskbar, task manager, tray icons. Apply password protection to Windows and restrict users to running applications. Control Internet Usage, spy on PC users. Security restrictions can be applied universally or | |||
Updated: 2, 2006 | Rating: 222 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
753. | 1st Security Agent 6.14 (softheap.com) | ||
you can: disable Start Menu items, hide local and network drives, disable the DOS prompt, boot keys, real DOS mode, Registry editing, taskbar, task manager, and network access, hide desktop icons, and much more. You can apply password protection to Windows and restrict users to running specific applications only. Security restrictions can be applied universally or just to | |||
Updated: 2, 2006 | Rating: 42 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
754. | 1st Security Agent Pro 6.14 (softheap.com) | ||
My Documents, etc. Disable Start Menu items, hide local and network drives, disable the DOS prompt, boot keys, DOS mode, Registry editing, taskbar, task manager, and network access, hide desktop icons, apply password protection to Windows and restrict users to running applications. Due to support of | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
755. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
You have got an ability to hide your desktop icons, individual drives, Start menu items and the taskbar features, it enables you to stop others from tampering with your desktop. If you set up the special list of allowed applications nobody will run unwanted programs. The powerful feature "User Working Time" allows you to limit working time for your children , office colleagues | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
756. | 2002 CD Eject 2.5 (fomine.com) | ||
CD Eject is a utility that manages your CD ROM drive doors. It allows you to open and close the CD ROM door by using a hotkey, desktop shortcut, or via an icon in your system tray. It will automatically close the door within a couple of seconds if you have chosen the action "Get CD". The program creates a separate icon in your system tray for each CD ROM drive, so you can | |||
Updated: 9, 2005 | Rating: 359 | Author: Vitali Fomine | Size: 639 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
757. | 2Morrow Visual Server Monitor 1.3 (2morrow.com) | ||
This easy-to-use program monitors critical systems on your servers and diagnoses problems in real time. The visual nature of the application makes it easy to spot problem areas at a glance. You can customize your severity colors and levels, play sound files when severity levels are reached, and launch Some of the critical areas include system information, networking sub-system and CPU | |||
Updated: 9, 2005 | Rating: 0 | Author: 2Morrow Software | Size: 5019 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
758. | 2Morrow Web Server Monitor 1.2 (2morrow.com) | ||
This easy-to-use program monitors critical systems on your web servers and diagnoses problems in real time. The visual nature of the application makes it easy to spot problem areas at a glance. You can customize your severity colors and levels, play sound files when severity levels are reached, and launch Some of the critical areas include IIS Web service, ASP Service, system information, networking sub-system and CPU | |||
Updated: 9, 2005 | Rating: 0 | Author: 2Morrow Software | Size: 5019 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
759. | 4BlindMice 1.4 (InspiredCode.net) | ||
your computer screen and get the big picture? How would you like to drive your mouse full speed across the screen, knowing in real time where you are and what you're flying over? Crazy? Impossible? It's here. The Windows graphic user interface was designed with your mind's eye in mind. It's time | |||
Updated: 9, 2005 | Rating: 0 | Author: Robison Bryan | Size: 2325 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
760. | StrongDisk Pro 2.9 (strongdisk.de) | ||
your Windows system. With such disks you can work as with usual hard drive- The main difference is that all data written to the disk is encrypted "on fly", while the content of the protected disk is stored in common file with arbitrary name. In order to access existing protected disk user must enter password, which is specified during disk creation, and/or insert electronic key or | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Driving software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|