Mdb User Level Security


Advertisement

Ekran  v.4.4

Build your insider threat monitoring strategy: Ekran System helps companies of any size to build their strategies of mitigating user-based security risks. It is a universal user activity monitoring tool for corporate servers and desktops. Working with ...

CyberScrub® Privacy Suite™  v.4.0

Privacy Suite is a high level security application designed to help you completely eliminate sensitive information from your computer, protect your Internet privacy, and enhance system performance. Privacy Suite also functions as a wonderful clean up ...





Advertisement

Internet Access Scheduler  v.2.0

Internet Access Scheduler (IAS) is a firewall that offers user-level access controls for Windows 9x/Me. IAS enhances the standard Windows access management and once installed, administrators can assign permissions to TCP/IP connections. Internet Access ...

Advanced Office XP Password Recovery Pro  v.2 42

A program to recover lost or forgotten passwords to files/documents created in Microsoft Office applications (all versions up to Office 2002/XP): Word, Excel, Access (including user-level passwords and owner info), Project, Money, PowerPoint, Publisher, ...

PortsLock  v.1 7

PortsLock is a firewall with user-level access controls for Windows NT/2000/XP. Once PortsLock is installed, administrators can assign permissions to TCP/IP connections, just as they would in managing permissions on an NTFS partition of a hard disk. It ...

NTFS Partition Table Recovery  v.3.0.1.5

NTFS data recovery software is a high-performance and self-healing file system proprietary to Windows XP, Vista, 2003, 2000, NT & Windows ME which supports file-level security, compression and auditing. NTFS data recovery software also supports large ...

HotSpot MWC Server

Server gives WPA-PSK level security. After use it restores Access Point settings. So you can give access for hotspotters when you do not need your AP by yourself. PLEASE download or print AD-page from www.Azacco.com - HotSpot Server so your customers ...

Nanny Shutdown  v.1 2

Specifications:

-You can apply a time credit to the total computer or to each user individually. If you specify it at the user level, the first time the user is logging on, he/she will be asked to specify the personal time credit. You can stop ...

People  v.3 20

Features People has the following key functions:
Human Resource Administration
Human Resource Management
Human Resource Development

easy administration with respect to module and feature wise security
user group and ...

SaralDent Dental software  v.4.0

Saraldent provides you with the tools to run your dental practice effectively and increase productivity Its graphical user interface is easy to use and understand, minimizing staff training time. The system is flexible and designed to grow with you as ...

Kinar KeepSafe FreeMail  v.1 4

Based on patent pending Universal Digital ID (TM) technology, FreeMail provides the enterprise level security without any prior setup, use of passwords, or manual key/certificate exchange. Simply download, install and activate your existing email account ...

AtACC  v.2.8.1009

atACC is an extremely user-friendly business accounting program developed to manage the accounting and inventory of your business no matter how large or small it is. Your ignorance of accounting concepts is not at all a constraint to use atACC, as the ...

Emjysoft Sudoku  v.2.00

Emjysoft Sudoku adapt the game to the user level and play endlessly with the random number generator grid. Indeed, the software has three difficulty levels (easy, medium, hard) and a display of the solution. If you like challenges, you can limit your ...

Hide-A-Folder  v.2.6

Hide-A-Folder is a low level security application. It is used best in an environment where the security of the data is not of the utmost importance. The idea is to be able to keep your information away from prying eyes, snooping employees, or kids who ...

Hide-A-Folder X  v.2.6.1

Hide-A-Folder is a low level security application. It is used best in an environment where the security of the data is not of the utmost importance. The idea is to be able to keep your information away from prying eyes, snooping employees, or kids who ...

Pages : < 1 | 2
Newest Reviews