Setting User Access Level


Advertisement

Norton User Access Control  v.2008.1.0.11 Beta

Norton UAC Tool will collect user input as well as information on applications causing prompts. The data will be processed to improve the comprehensiveness and robustness of the white list, which will be updatable while running the tool online.
User ...

Algorius Net Watcher  v.2.0

Algorius Net Watcher - Software that allows you to monitor user access and files opened on your computer via the network. It should be noted that Algorius Net Watcher is a unique and universal protection for your computer from unauthorized access over ...





Advertisement

SoftPerfect File Access Monitor  v.1.0.2

SoftPerfect File Access Monitor is a multipurpose tool that monitors access to your files and keeps detailed history of who read, wrote and manipulated them. SoftPerfect File Access Monitor can be used on a file server to track network users activity, ...

Access Monitor  v.1.0

Access Monitor is a User Access Log utility designed for the Windows XP Operating Systems.

Main features:

- Records the date/time and username of users logging in/out of the computer
- Administrator can set the user access log ...

Access Notes Address Book in Outlook  v.7.0

At just $69 user Access Notes Address Book in Outlook with remarkable results by using Notes Address Book Converter software. This software helps you to Export Lotus Notes Address Book to Outlook converting all Lotus Notes contact detail like first, middle, ...

1st Security Agent Pro  v.10.0

1st Security Agent Pro is a professional password-protected system security utility to secure Windows PC and restrict access to its key features. 1st Security Agent Pro offers an administrative support for controlling access to your PC and changing user ...

APS 400 nAdministrator  v.2.0

The Client / Server architecture offers possibilities of multi-user access and usage of extending modules. The server composes of a communication service, an SQL database and a HTTP server (which is necessary only when using web extensions). The client ...

Penokio OutLynk  v.4.0

This software provides direct, live and two-way user access to desktop MS Outlook 2000-2003 via any browser (WAP, Blackberry, PocketPC, IE or Netscape). It uses 128-bit encryption on the connection and login for user security.

SQL Bandwidth Meter Log Reader  v.2.0 Beta

Customizations of the reported data by setting user defined packet size. SQL Bandwidth Meter Log Reader allows for customizations of the reported data by setting user defined packet size, the bandwidth units to display (bytes, kilobytes, etc), the capability ...

UACController  v.1.02

UACController is a simple software for those that need an easier way to manage the User Access Control settings in Vista. It allows you to enable or disable UAC totally or enable it without the administrator prompt (Quiet Mode). You can also disable the ...

Akeni Enterprise Instant Messaging LDAP

It also provides messaging policy management through the use of shared public groups and role based user access rights. All messages can be logged into flat files and databases to allow for searching and auditing.

SecrecyKeeper

SecrecyKeeper allows grouping data stored on workstations and servers by information security level and defines users that may access the information by users access level. SecrecyKeeper will help you prevent both accidental data leakage and intentional ...

SwisSQL - DBChangeManager

It also offers powerful Reporting, Auditing and a Web based client interface (with multi user access) which makes it the best fit for collaborative database development and database change management. It also offers a Free Edition with some feature restrictions ...

Crypt-o  v.2.4.180

Crypt-o is a Client/Server password manager with many advanced features like strong data encryption, customizable databases, multi-user access, flexible permissions system, form filling, portable mode and Web interface.

Crypt-o is a secure ...

Peak Limiter  v.1 53

Softly compresses single peaks exceeding a user-defined level in such a way that the result cannot be distinguished from the original by the human ear. This permits rising the main volume of the sound file considerably without causing clipping or distortion! ...

Pages : 1 | 2 >
Newest Reviews