Automatically Lock Computer


Advertisement

TTrayShutdown  v.1.0

tTrayShutdown can quickly shutdown your computer from your system tray. Fast shutdown (Shutdown, Restart, Log Off, Stand By, Hibernate, Lock Computer) from the system tray. Turn off monitor, Abort a system shutdown.

Lock My Computer  v.10.0

Lock My Computer is a powerful desktop security solution for personal or publicly accessible computers running the Windows 2000/XP/Server 2003 Operating Systems. It disallows unauthorized changes to various settings of the Windows system, such as Control ...





Advertisement

Computer door lock access software  v.1.0

No programming or additional hardware required ! * Can control door lock access via the product Bridge IP (Symcod) * Support: RFID reader, Proximity reader, Biometric reader, Barcode reader, KeyPad OCZ * Very easy to use - one screen, one minute set-up ...

Eusing Maze Lock  v.3.2

Locking your screen prevents other people from accessing your computer while you are away from it. There are several applications able to help you lock your computer. However, few of these applications are comparable to Eusing Maze Lock.

Eusing ...

Lock and Unlock Your PC With USB Drive Software  v.7.0

This software offers a solution to users who want to lock their computer using a USB device as a physical key instead of a password. Each USB device has a unique identity and with this software it can be used as a key. Simply insert a flash drive into ...

Lock My PC Free Edition  v.4.9.5

Lock My PC Free Edition is a good and free alternative to standard Win+L Windows lock. The program lets you to lock your computer with a password while you leave it unattended. It blocks keyboard, mouse and screen. Lock My PC Free Edition comes with a ...

Chris PC-Lock  v.3.50

Chris PC-Lock is a useful Windows application with keyboard locking functions. Now you can enjoy your spare time without any worry that somebody unauthorized will access your computer. More than that, you can ensure that your work remains unaltered and ...

Lock and Unlock Your PC With USB Drive  v.1.0

Use a physical USB device to lock your computer instead of a password. Because each USB device is different, you can see your thumb-drive as a unique car key. Insert a flash drive into your computer, start this software, then remove the USB and the PC ...

The Lock

Provides user audit, access, Internet and system security for any computer running Windows 2000, 2003, XP, and Vista. User security is group based and Meets requirements outlined in NISPOM, Chapter 8, as well as Sarbanes-Oxley and HIPPA. Stand-alone, ...

PC Lock  v.1.01

com

Features
- Lock screen when mobile is out of range
- Or sleep when mobile is out of range (on-battery)
- Unlock when mobile is in-range
- Or unlock when mobile is in-range & PC key-press detected
- Secure with password ...

XUS PC Lock  v.3. 1. 1959

XUS PC Lock offers a new and fun way for you to lock your computer. Before using XUS PC Lock, you have to define your lock pattern. The next time you will see the lock screen, You trace your mouse in the pattern you drew before and your computer will ...

TopLang Computer Sweeper  v.1 1

Computer Sweeper can scan your disks for junk files and erase found junk files easily. your computer contains a lot of temporary and obsolete files, these junk files waste your disk space and slow down the speed of your computer. By using Computer Sweeper, ...

Bluetooth Proximity Lock  v.1.5.0

When you walk away from the computer the device is disconnected and the computer is locked after timeout. It is possible to run a single application together with the lock. This application may be your favorite script dismounting network drives, erasing ...

Blue Lock  v.1 91

For example, if you register your Bluetooth mobile phone with the program but then move away from your desk, the program will detect your phone is out of range and automatically lock your system, requiring the password to be entered to reactivate the ...

The Lock XP  v.5.06.0102

Provides user audit, access, Internet and system security. User security is group based and meets requirements outlined in NISPOM, Chapter 8, as well as Sarbanes-Oxley and HIPPA. Standalone or multi-system network use is supported. Restrict access to ...

Pages : < 1 | 2
Newest Reviews