|
1 2 3 [Next >>]
CD-DVD Lock
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any removable media, and also prevent data leak by removable media.
Hits Out: 12
Hits In: 0
Rating: 0
| Rate It |
Open In Same Window
Tray Safe
Tray Safe is Net's safest password keeping solution. In addition to a variety of encryption and hashing algorithms available, it features a unique hardware ID. It means, the program works only with your PC, protecting you from hackers! Try now!
Hits Out: 32
Hits In: 0
Rating: 0
| Rate It |
Open In Same Window
Softtanks Security Software
Our Security software will work only on Windows 95/98/ME/2000 Operating System. Our Security System will help keep your computers safe from general public as well as your friends and collegues. You just need to remember the passwords (which you can change at any time), and everything will be alright
Hits Out: 21
Hits In: 0
Rating: 0
| Rate It |
Open In Same Window
X-NetStat
X-NetStat displays information on your Internet and / or network connections in realtime. Details of each connection are shown in a list called the connection table, including remote hostnames and IP addresses, ports used, status, age, and program.
Hits Out: 30
Hits In: 0
Rating: 0
| Rate It |
Open In Same Window
Find Protected
Search for password protected files on local disks and across a network. Find Protected addresses the security problems associated with unauthorized or illegal use of confidential company information.
Hits Out: 16
Hits In: 0
Rating: 0
| Rate It |
Open In Same Window
CD-DVD Lock
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any removable media, and also prevent data leak by removable media
Hits Out: 10
Hits In: 0
Rating: 0
| Rate It |
Open In Same Window
Security Administrator
Password protect your computer and restrict access to it with Security Administrator. It enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, Internet and network access. Hide your desktop icons, individual drives, Start menu items, taskbar, apply password protection to Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer use by your kids or employees. The program also has a built-in lock screen utility to prevent PC entry with a password while you are away
Hits Out: 10
Hits In: 0
Rating: 0
| Rate It |
Open In Same Window
Access Lock
Access Lock is a system-tray security utility, which enables you to lock your PC with a password by two methods. It also prevents unauthorized access on boot, logs the attemps of breaking the lock and allows people around to leave messages while the system is locked
Hits Out: 9
Hits In: 0
Rating: 0
| Rate It |
Open In Same Window
PC LockUp
PC Lockup password-protects your PC and restricts others from being able to use it while you are away. An allowed time schedule and duration can be defined for each user to restrict access in definite hours. PC Lockup also supports monitor power save options and has some additional useful features like built-in password protected screen saver and network user validation feature for Windows logon to increase your security
Hits Out: 10
Hits In: 0
Rating: 0
| Rate It |
Open In Same Window
Access Administrator Pro
Password protect your files and folders, and restrict others from being able to start, see, change or delete them. File protection activates automatically according to the current user's identity and the timetable that is defined for it. You can keep your employees or kids off the Internet, games and the other entertainment during the working time. You can define a timetable and a list of restricted files for each user individually as you like
Hits Out: 8
Hits In: 0
Rating: 0
| Rate It |
Open In Same Window
1 2 3 [Next >>]
|
|
|