Averatec Remote Acess Control Access

Windows Security Officer  v.7.5.5.56

It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources. If a user's time limit has been set and ...

AdRem sfConsole

Encrypted, directory- and Web-enabled remote and local access to the NetWare console; role-based access rights management; emergency connection and file transfer; user activity auditing; ability to open multiple server and program screens at a time; low ...

Internet Administrator for Microsoft ISA Server

The "Internet Administrator for Microsoft ISA Server" is an integrated solution which allows to control and manage internet access and provides:
- all-round internet monitoring;
- incoming traffic, time and bandwidth control;
- access control ...

PCRemote  v.7.0

Designed to be flexible and inexpensive, PC Remote lets you access another computer across a network, on the Internet, on the computer serial ports, or through a modem connection. Now you have multiple ways to access the data you need. PC Remote is the ...

Gate-and-Way RAS  v.2 2

Password protected remote connections to access the LAN and all the Gate-and-Way services.
Imagine "being" at the office while at home, away on business or on vacation.

Other modules included on the Gate-and-Way Package are:

- MAIL: ...

Outlook Express Privacy  v.2.394

Outlook Express Privacy lets you control access to Outlook Express and its email message database. When you enable protection, the program disables access to the message database and address book files. As a result, when you open Outlook Express or Windows ...

SmartCVS Professional  v.7.1.6

Its main purpose is to manage a number of related les in a directory structure, to control access in a multi-user environment and to track changes to the les and directories. Typical areas of software are program projects, documentation projects or website ...

VisualCron  v.8.2.0

Remote, secure control across the Internet. Define jobs with tasks that start processes, copy files, execute remote scripts and send keystrokes. "Conditions" controls internal flow of tasks based on errors, last task result, if a file exists or contains ...

SysUtils Device Manager

SysUtils Device Manager the removable device access control solution. Once SysUtils Device Manager is installed, administrators can control access to floppies, CDROMs, and other devices. Also SysUtils Device Manager can protect network and local computers ...

Sony Image Data Suite  v.3. 2. 2000

Sony Image Data Suite consists of three applications: Image Data Convertor SR, Image Data Lightbox SR and Remote Camera Control. The most interesting application is Image Data Convertor SR that enables the processing of raw files (RAW file is an original ...

Instant Metering  v.3 1

The SoftwareKey Metering System helps you manage and control access to applications, log application usage, and report on application usage throughout an enterprise. You can quickly define and enforce which applications users are allowed to run both inside ...

Leaf  v.1.6.5.3

This program allows you to create your own secure private networks with your family and friends and control access to it. Members of the network can share not only files and folders, but also all kinds of networked applications and devices. You can share ...

LittleGuard  v.1 2


Control access with littleGuard. With littleGuard activated your mouse is de-active and also 98% of your key board keys will not work.
It does not provide complete protecton however. ctrl ,Alt, Del will end the program.
Windows 'start' ...

ImageAuthenticator  v.1.0

With this program you can control access to your image files using asp.net authentication or your own custom authentication. Images within a ASP.NET application are not access protected. Image Authenticator integrates with WINDOWS, FORMS, PASSPORT or ...

SmartCVS  v.7. 1. 2005

Its main purpose is to manage a number of related files in a directory structure, to control access in a multi-user environment and to track changes to the files and directories. Typical areas of application are software projects, documentation projects ...

Pages : < 1 | 2

Newest Reviews