|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
Lock My PC 4.0
According to IT specialists reports, the majority of electronic data theft crimes happen due to improper protection of computer systems from the inside. Co-workers and even our spouses can easily recover any bit of information simply by looking at the screen of an unattended machine. Lock My PC acts like a guard on duty, protecting your PC from prying eyes. Try it today for FREE and actually relax!
See also: lock, computer, access, control, password, security, locker, locking, block, protect, stealth, screen, mouse, parental control, desktop
Anyplace Control 2.12
"Anyplace Control" is a remote control program that can display a screen of another computer (via internet or network) on your screen. The program allows you to use your mouse and keyboard to control the other PC remotely. You will even be able to transfer data between computers. It means that you can work on a remote computer, as if you were sitting in front of it, right from your current location.
See also: vpn, administration remote secure, anyplace control, vnc, remote desktop, helpdesk, help desk, pcanywhere, terminal server, remote access, remote computer, remote control, remote screen, remote control internet, access remote desktop, remote networking, data transfer, data exchange, transfering
Password Protected Lock 2.92
Password Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time and provides an informative message that you can edit as you like. You can have the program power down your monitor.
See also: screen saver, protect privacy, password protection, security computer lock, secure PC, restrict access
ShareAlarmPro is a network tool that allows network administrators and users easily perform a shared folders and resources monitoring. Using ShareAlarmPro you can monitor users attempting to access secured shares and confidential files, detect and log network access to shared folders, monitor security events, monitor accessed files, disconnect users from open files or deny network users access, monitor sharing permission changes.
See also: security events, security software, computer security, event log, intrusion detection, network security, free network monitor, free monitor, network monitor, monitor, monitoring, system monitor, network monitoring, network protection, network access, alert, alerting
Program Selector Pro 2000/XP 4.9
Program Selector Pro provides access control and usage management. Replaces standard Windows 2000/XP user interface (task bar, Start button, and icons) with user configurable list box of program names. Supervisor password is required to add programs to the program list box. Administrative level password is required to restore the original Windows interface. Programs can also be individually password protected. Virus protection included.
See also: password protection, access control, computer security, lock desktop
Program Selector Pro 98/ME 4.3
Program Selector Pro provides access control and usage management. Replaces standard Windows 95/98/ME user interface (task bar, Start button, and icons) with user configurable list box of program names. Supervisor level password is required to add programs to the program list box. Administrative level password is required to restore the original Windows interface. Programs can also be individually password protected. Virus protection included.
See also: password protection, access control, computer security
Quality Time solves all of those arguments about computer usage in the home. Now you can limit usage to particular times of the day, and limit individuals to an amount of time within those periods, without having to have an argument.
Quality Time also generates a simple report of computer usage for each user for the past week. Just login as the administrator, click the report button, and paste it into your word processor or spreadsheet.
See also: Computer Addiction, Scheduling, Parental Control, Argument, Computer, Share, Children, Time, Limit, Access Control
Canary Standard 2005.01.28 (11)
Discover how this monitoring program will help you monitor what your child does when using the home computer (programs run, files printed, programs installed,...), and while surfing the Internet (web sites visited, files downloaded, emails sent,...). Each order comes with a FREE report that contains more than 30 vital parenting principles that, together with Canary, will enable you to develop a more open relationship with your child.
See also: internet monitoring software, computer monitoring software, computer parental control, internet parental control, internet access monitor, internet monitoring, computer monitoring, cattle ramp software
WirelessMon 2.0 enables a person to detect and monitor Access Points (AP) on any wireless (WiFi) networks within range. The program provides substantial information including whether an AP is secure (or not) and its availability for use. A live channel usage chart helps identify potential interference problems. Users of the Professional Edition can generate signal strength coverage maps by either manually plotting points or using a GPS device.
See also: free, monitoring, testing, download, computer, laptop, performance, test, graph, channel, signal strength, access points, lan, wireless, 802.11, hot spots, Wifi
Accurate Shutdown 6.30
Accurate Shutdown is a powerfully automatic software that turns off your computer and at the user-specified time. It can turn off / reboot / logoff the computer, turn off the monitor only, disconnect from the Internet, and execute one or a group of programs. It can synchronize your PC's time to atomic clock servers in world. It has many timer options to meet the needs and requirements of all kinds of users on different occasions.
See also: auto shutdown software automatic shutdown software computer shutdown timer shutdown utility sleep timer software computer access program
Shared Monitor 1.0
Shared Monitor is an advanced shared resource monitor and logger. The program sits in your system tray and constantly monitors all the Microsoft Network connections. It allows you to monitor active connections to your resources and browse the historical data. In addition, you can generate HTML reports, set alerts on specific events (for example, when a new computer connects to your resources) and run the program automatically on Windows start.
See also: network monitoring, network monitor, network security, system monitor, computer security, security software, network protection, network access
A parental control software program, gives you complete control over your child's use of the computer: when he or she can use it for entertainment, and when for doing homework. It enables you to restrict the times when the computer can be used, and to set the times that your child may surf the Internet, play games, use particular programs, and watch movies.
See also: game control, internet schedule, pc control, computer use, computer access, schedule computer time, time control, control computer time, parental control
Children Control 1.7
Allows you to control access to PC, Internet sites, programs and system functions. A choise #1 for parents who don't want wheir children play for hours in games, navigate on bad sites, launch unallowed programs or crash an operating system.
This program can be protected by your password so nobody else can't use it.
It's VERY EASY to use so you will be amased by simplicity and functionality of this program!
See also: locker, IE Lock, lock computer, access control, program access
Personalwatchdog introduces unique features regarding privacy protection and data security: encrypt folders using the AES encryption algorithm; control your computer access at windows login or unlock; configure additional security passwords for your user account; remove safely temporary files and clean the recycle bin in an irrecoverable way; configure key sequences for protection on demand; safely remove evidence of your work at computer exit.
See also: privacy protection, data security, top-class protection, exclusive security features, on-the-flight encryption, DOD5020.22-M safe remove algorithm, AES encryption algorithm, computer access control, safe access password, remove evidence
Remote Desktop Control 1.71
Remote Desktop Control allows you to control any remote computer from another computer. Such task is no longer just for network administrators, now you can have the same control. Imagine, you can work on your office computer right from your home computer without leaving the house! You won't even have to leave your cozy chair :) Try Remote Desktop Control and you will gain incredible mobility and save time too!
See also: remote pc, remote desktop, remote connection, remote computer, remote access, access computer, aquatra
Radmin Remote Control 3.0
Radmin is fast and secure remote control and remote access software that enables you to work on a remote computer as if you were sitting right in front of it and access it from multiple places. Radmin includes Windows Vista support, file transfer, multi-user text and voice chats, Windows security, Kerberos authentication, 256-bit AES encryption, telnet access, multiple monitors support and unique DirectScreenTransfer technology.
See also: remote, control, access, administrator, computer, help desk, network, remotely, support, vnc, system, solution, server, security, secure, radmin, management, fast, desktop, client, administration
Computers Hall 3.21
Complete solution for management and automation of work of computer clubs, Internet cafes, cyber cafes, gaming centers. Main goals: control of the paid time, control of the work of managers. The computers are locked if the money were not paid for the work with them. Advanced reports, well protected from changing. Simplification of managers work. Multi-language interface: English, Russian, Ukrainian, German, Lettish, Lithuanian are available.
See also: computers hall, computers club, game club, Internet club, Internet cafe, cyber cafe, ComputerZal, automation, management, cyber cafe software, cybercafe software, internet timer, computer timer, public access, software for internet cafes, cybercafe, timing, billing
AdminToys Suite 1.1
Allows you to manage processes remotely, monitor computers performance on your network, track and limit disk space usage on remote machines, synchronize computer clock all over your network, perform a planning restart/shutdown of network computers, execute commands remotely on a group of computers or in the entire domain, configure network adapters remotely, dump your network computer's statistic to CSV, TXT or HTML. Find 13 network tools inside.
See also: admin tools, administration utilities, network tools, remote administration, remote access software, remote management software, central administration, remote access, remote management, remote control, pc administration, computer administration
Time Monitor 1.0.6
Time Monitor v1.0.6 for Windows is parental control software designed to limit the time your kids spend using a computer. Time Monitor puts you in control of deciding when they can log in and for how long. Time Monitor is easy to use, free to try, and runs on Windows XP, 2003, and Vista.
See also: limit, computer, time, parental, control, access, logon, logoff
LanAudit Data Loss Prevention 2.84
Protect your data,record when and who accessed, copied, created, deleted, moved, printed, renamed and restored which file.Control, and the lowest total cost-of-ownership to stop data leakage.To stop data leakage with block include: floppy drive, CD Rom/DVD Rom, CD-R/RW drive, tape drive, COM port and printer port, modem, USB port, USB storage device, SCSI device, 1394 port, infrared device and PCMCIA port of notebook and other new devices.
See also: Hardware Inventory, software Inventory, Data Loss Prevention, Document Operations, Stop Data leakage, Application Control, Web Access Control, Employee Computer Monitoring, Employee Monitoring, Computer Monitoring, Remote Control, Remote Install