Restrict Usb Access


Advertisement

INet Protector  v.4.7

With iNet Protector you can restrict access to the Web and password protect Internet connection. You can restrict internet access at specified times or on demand. You can disable connection completely or limit Internet to work with allowed programs and ...

Surfblocker  v.5.2



With Surfblocker you can restrict access to the Web, block harmful content and decide what content is available to your users. You can restrict internet access at specified times or on demand. You can disable connection completely or limit ...





Advertisement

ProteMac LogonKey  v.1.1.12

LogonKey turns your USB falsh drive into a portable password manager presenting a USB security key as an authentication solution. This USB dongle device delivers you a unique access code to exclude the possibility of unauthorized leak of information.

LogonKey  v.1.1.40

LogonKey turns your USB flash drive into a portable password manager presenting a USB security key as an authentication solution. This USB dongle device delivers you a unique access code to exclude the possibility of unauthorized leak of information.

D-Link Tri-Mode Dualband AP Manager  v.1.0

D-Link TriMode Dualband AP Manager for DWL-8200AP is designed to help you easily find and manage access points. With it you can restrict the access to the network and more.

D-Link's AirPremier Wireless AG Managed Access Point provides secure ...

Advanced Folder Protector 2004  v.2.0

Advanced Folder Protector 2004 is an application designed to restrict the access to your private
folders which contains valuable information for you (such as important documents, spreadsheets and reports).
If your computer is shared among ...

Indigo Scape  v.1.0.0.503

Indigo Scape features sophisticated Internet Filtering, Content Control, Acceptable Use Policies and Reporting allowing you to Monitor, Control and Restrict Access to all resources on the Internet.Indigo Scape is an Internet Management and Security Software ...

MTime Usage Timer  v.0.2

Restrict Internet access fast and easy. mTime Usage Timer is a simple tool that restricts computer/internet access. Use this tool to restrict access to a set amount of time or a specific time of day. Block the entire computer or only internet. Created ...

MINIPORTMAPPER  v.1.0.0.0

If you want to give Internet services or restrict your access to the Internet resources, then this program is for you. If your customers have a dynamic IP address, then they can use the services for mapping a domain name (homepage homepage after which ...

Block Pdf Printing n Copying  v.1.0.1.4

If user wishes to restrict pdf access features, pdf owner password is required to set in pdf document. Pdf encryption software is easy to use and user friendly desktop application. Tool has inbuilt user documentation for instant user help support. It ...

VeryUtils DNS Web Filter  v.2.6

DNS Filter software is an Internet access control software. DNS Filter can be used to block access to websites, block harmful contents, restrict internet access and block specific websites.

Web content filtering at the DNS layer is the best ...

USB Monitoring  v.4.0.1.6

com provides technically advance USB Monitoring software to secretly observe USB drive activity on your employee and client pc user. Data doctor USB Monitoring software stops all action of pen drive insertion or removal on your personal desktop pc. USB ...

Blocking USB Ports  v.4.0.1.6

Blocking USB ports program locks all kinds of unauthorized USB devices for data security reasons such as data stealing and virus infections. USB device tracking tool facilitates to show pop-up windows or warning messages explicitly when any unauthenticated ...

UHook USB Disk Security  v.2.3.0

uHook USB Disk Security is data theft prevention product to protect your files from getting stolen or accidently leaked out of your PC through unauthorized USB storage devices like Flash Drives, External USB Hard Drives, IPODS, Cameras, Cell Phones etc.

The Lock

Provides user audit, access, Internet and system security for any computer running Windows 2000, 2003, XP, and Vista. User security is group based and Meets requirements outlined in NISPOM, Chapter 8, as well as Sarbanes-Oxley and HIPPA. Stand-alone, ...

Pages : 1 | 2 >
Newest Reviews