Control Access


Advertisement

Wenovo USB Disks Access Manager  v.1.0

Wenovo USB Disks Access Manager is a handy utility designed to help you to easily control access to removable drives. There are three options to choose, access to read and write, read only and does not detect the USB disks. A freeware tool for user or ...

Net Control 2  v.10.0



Monitor student computers in real time, help students remotely, share teacher's screen, control access to Internet, applications and devices; prepare and send quizzes, make polls, chat, send messages, receive help requests, log events, these ...





Advertisement

Children Control

Allows you to control access to PC, Internet sites, programs and system functions. A choise 1 for parents who don't want wheir children play for hours in games, navigate on bad sites, launch unallowed programs or crash an operating system. You can also ...

Windows Security Officer  v.7.5.5.56

Windows Security Officer enables you to protect and totally control access to your personal computer. It offers administrative support for controlling which users are allowed to access your computer and the level of access each user may have. You can ...

Internet Administrator for Microsoft ISA Server

The "Internet Administrator for Microsoft ISA Server" is an integrated solution which allows to control and manage internet access and provides:
- all-round internet monitoring;
- incoming traffic, time and bandwidth control;
- access control ...

Outlook Express Privacy  v.2.394

Outlook Express Privacy lets you control access to Outlook Express and its email message database. When you enable protection, the program disables access to the message database and address book files. As a result, when you open Outlook Express or Windows ...

SysUtils Device Manager

Once SysUtils Device Manager is installed, administrators can control access to floppies, CDROMs, and other devices. Also SysUtils Device Manager can protect network and local computers against viruses, trojan horses, and other malicious programs often ...

Instant Metering  v.3 1

The SoftwareKey Metering System helps you manage and control access to applications, log application usage, and report on application usage throughout an enterprise. You can quickly define and enforce which applications users are allowed to run both inside ...

Leaf  v.1.6.5.3

This program allows you to create your own secure private networks with your family and friends and control access to it. Members of the network can share not only files and folders, but also all kinds of networked applications and devices. You can share ...

LittleGuard  v.1 2


Control access with littleGuard. With littleGuard activated your mouse is de-active and also 98% of your key board keys will not work.
It does not provide complete protecton however. ctrl ,Alt, Del will end the program.
Windows 'start' ...

ImageAuthenticator  v.1.0

With this program you can control access to your image files using asp.net authentication or your own custom authentication. Images within a ASP.NET application are not access protected. Image Authenticator integrates with WINDOWS, FORMS, PASSPORT or ...

SmartCVS  v.7. 1. 2005

Its main purpose is to manage a number of related files in a directory structure, to control access in a multi-user environment and to track changes to the files and directories. Typical areas of application are software projects, documentation projects ...

Evertz CaptionWare  v.1.0

CaptionWare is an easy to use application, designed to simplify the encoding of XDS (V-Chip, TSID, CGMS-A, Program ID, etc), and to deliver a common control access point for Evertz 8000 and 9000 Closed Caption products.
CaptionWare also addresses ...

DeviceShield  v.3 3

Deviceshield acts as firewall that works on the INSIDE to control access to ALL Removable Media Devices. It protects your data from inside security breaches by removeable media devices such as USB memory sticks, CD/DVD drives, Firewire etc. DeviceShield ...

SmartCVS Professional  v.7.1.6

Its main purpose is to manage a number of related les in a directory structure, to control access in a multi-user environment and to track changes to the les and directories. Typical areas of software are program projects, documentation projects or website ...

Pages : 1 | 2 >
Newest Reviews