Local Security Policies


Advertisement

Lock My Computer  v.10.0

It disallows unauthorized changes to various settings of the Windows system, such as Control Panel, Desktop, Local Security Policies, Outlook Express account settings, and many more others. It can disable access to local hard disks, Floppy, CDROM, and ...

SecureOff  v.3.0.1

Remove NSF Enforce a consistent Access Control List across all replicas of this database settings
SecureOff removes local security from NSF files (Lotus Notes databases). Simple - saves you heaps of time. No more running around trying to find the ...





Advertisement

DiskInternals NTFS Reader

While saving, it ignores file security policies. It means that it is possible to access absolutely any file on a NTFS disk from Windows 9x. The program can create and open images of NTFS disks. NTFS Reader is FREE. http://www.DiskInternals.com ...

TunnelEx  v.2.4.1.1133

TunnelEx is a software designed to redirect data removing all the obstacles that can be thrown in its way, bypass firewalls and any restrictions imposed by the local security policy. All these sophisticated functions are of particular interest for IT-programmers, ...

Novell Privileged User Manager  v.2. 3. 2000


Centrally manage security policies from a single point. The intuitive drag-and-drop interface makes it easy to create rules instead of relying on manual scripting.

Screen Guard  v.2.0

This software is intended for personal computer protection and provides different security policies for different users. It offers three kinds of password protection, user-specific access to operational elements such as display and system setting, auto-terminating ...

NetWrix Group Policy Reporter SCOM Pack  v.1.017.0

Group Policy auditing is an essential process in providing enterprise security for all organizations relying on Group Policy infrastructure, because even small unwanted changes to security policies can impose major security and compliance risks for an ...

System Maid  v.2.1

Registry stores all kinds of information, such as wallpaper and fonts, hardware configuration data, security policies, user preferences (etc.). Damaged Registry means a "brain"-damaged system. Registry errors slow down your computer, prevent programs ...

Netwrix Change Notifier for Windows Server  v.4.023.449

Netwrix Change Notifier for Windows Server is a free tool for automated auditing and documentation of all changes made to server configurations, including installed software and hardware, local security settings, and registry settings. The tool monitors ...

Folder Security Professional  v.3.0.0.190

Folder Security Professional allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only, preventing modification or deletion by other users or programs. The program can lock local ...

Nsauditor Network Security Auditor  v.3.0.3

Nsauditor Network Security Auditor is an advanced network security scanner for auditing and monitoring network computers for possible vulnerabilities. The software checks the network using all potential methods that a cyber attacker might use to attack ...

Agnitum Outpost Security Suite Pro  v.7.5.1

Powerful malware prevention and web control tools deliver comprehensive PC security for individuals and families. New Outpost 7.5 - Performance Edition is designed to make your Internet surfing as safe as possible without impacting system speed. The ...

V3 Internet Security  v.8.0.5.8

0 provides functions for data security by restricting access to system resources. It also helps to prevent unwanted programs or malicious security threats installed in your system by configuring more advanced protection settings.

The basic ...

DEKSI USB Security  v.2.8

DEKSI USB Security allows you to block unauthorized USB devices from any PC or your entire network. DEKSI USB Security will prevent unauthorized USB devices from being connected to your computer. DEKSI USB Security blocks unauthorized USB devices such ...

USB Security Enterprise  v.1 9

USB Security runs completely in background, invisible and undetectable to PC users. No pop-up windows and warning messages unless explicitly configured. Running unnoticed, USB Security logs all attempts to connect authorized and disallowed USB devices, ...

Pages : 1 | 2 >
Newest Reviews