UNETSHA is a plug-in for extending security health check capabilities and interoperability with third-party endpoint security solutions on the Microsoft NAP platform. It enables more granular network access control in an enterprise-wide NAP implementation that includes heterogeneous network terminals such as Windows, Linux and Mac OS X.
See also: SHA, SHV, NPS, compliance check, NAP, NAC, network access protection, network access control
FingerCell PC EDK for Windows 1.2
FingerCell 1.2 Embedded Development Kit for PC with MS Windows. This EDK is intended for developers, who are going to use PC with MS Windows as part of their network biometric system. Includes 1 license for FingerCell DLL, interfaces for image input from either files or fingerprint sensors, sample application with source code and software documentation.
See also: fingerprint, pattern recognition, recognition, identification, matching, verification, embedded, win32, demo, evaluation, biometric, security, scan, crime, ridge, authentication, access control, criminalistics, fingerprint recognition, fingerprint identification
BPACLer eliminates the tedious process of selecting a file or folder object and having to browse through each individual access control entry (ACE) to see the effective permissions for different users and groups (trustees). BPACLer quickly displays all allow and deny access control entries (ACE) from the ACL for a selected file or folder. The selected file or folder owner information is also displayed on the same screen.
See also: administrator, system, entry, security, folder, file, permission, List, Control, Access, ACE, ACL
Easy Desktop Keeper 1.81
Easy Desktop Keeper lets you save, restore, manage and lock desktop layout that includes files and folders located on the desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock desktop layout, every time you reboot your PC, the program will restore desktop icons and bring them back to their original positions as well as return the old wallpaper and the screen saver to the background.
See also: download, free, screen, lock, restrict, icons, files, protect, control, access, save, restore, desktop
File & Folder Protector 2.51
Protect Files and Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
See also: free, screen, lock, restrict, privacy, files, protect, control, access, administrator, security, password, download
Easy File Protector 4.2
Easy File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable, un
See also: lock, screen, free, download, computer, restricting, restrictions, restrict, privacy, protect, control, access, security, password
Hide & Protect any Drives 2.1
Hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media.
See also: free, download, computer, restricting, restrictions, restrict, privacy, protect, control, access, security, password, Hard Drive, DVD, lock
Outlook Express Security 1.7
Use Outlook Express Security to control access to Outlook Express and its databases. When it is active, Outlook Express becomes locked and no third-party programs can access its message base files and the address book. As a result, when you try to start Outlook Express, open the address book or access the files, a password will be asked to allow access. If an invalid password is entered, Outlook Express or Address Book will not be opened.
See also: express, outlook, active, asked, becomes, data, databases, locked, open, party, programs, result, start, third, try, control, base, message, allow, security, password, address, book, files, access
Do you want to supervise users' every action on remote computers simultaneously? NetWatcher, a Real Nuke for you to supervise and control computers over Internet/network in a Windows. For more info, please visit http://www.netguarder.com/en/netwatcher.htm. You will see remote computer screens, URL access, and program run history of remote users in a Windows of your computer.
See also: log, url, report, email, device, forbid, terminal, instant, access, remote, control, supervision, supervise
Deskman Pro 5.5
Desktop security management for home users and system administrators alike. Home users need a simple way of protecting their computers on coffee breaks, or restraining access to their desktop on shared computer environments. System administrators require an effective tool to stop users from messing up the desktop, or apply tight security measures on a per-user or system-wide basis. Deskman is the tool of choice for its simplicity and effectivity.
See also: system protection, security manager, desktop manager, user control, security software, access control, desktop restrictions, desktop security, easy security, access point
infoRouter Document Management Software 7.0
infoRouter Version 7 is an Electronic Document Management Software System that includes Workflow, Content & Portal Management, Knowledge Management, Electronic Forms, ISO 9000 Document Control and Regulatory Compliance modules under one integrated software suite.
See also: PDF, digital media, procurement, documentation, regulatory compliance, lifecycle, Computer, paperless, delivery, collaboration, distribution, News, Reviews, index, Printer, medical records, database, search, organizations, directory, find, Online, authoring, Research, AIIM, share, Legal, OCR, Browse, Document Tracking, Digital Asset, programming, CMS, format, retrieval, revision, capture, RFP, proposal, Office, EDMS, XML, articles, DMS, COLD, printing, publisher, imaging solutions, source code, document recovery, Recycle bin, Secure documents, Domain, Document Archiving Software, Document Expiration, Document Retention Software, DOD, file manager, zip download, check-out, check-in, upload, download, folder, file, Web interface, Custom Properties, Templates, Forms, API, Web services, Scanning interface, Workflow, portal management, knowledge management, ISO Document Control, content management, electronic document management, document management software, information assets, Digital Archiving, attachments, HIPAA, conversion, Output, version-control, Desktop Publishing, locking, copy, move, metadata, indexing, query, viewing, TIFF, Subscription, white papers, intelligence, Collection, Text, full-text search engine, flow, messaging, Sarbanes Oxley, auditing
FlyTreeXPro ActiveX - Fast, powerful and flexible multicolumnar Tree/Grid/List/Outline. Get more than 30 controls in one! More than 40 types of inplace editors, data-bounding, a lot of properties and events for every need!
See also: .Net, Access, ListView, data-aware, Database, TreeView, Outline, List, Grid, Tree, Control, ActiveX
BioCert Authenticator Lite Edition 10 Users 1.2
BioCert Authenticator Lite Edition 10 Users Our standard software programming toolkit offers 1:m matching capability up to 10 users. This toolkit is primarily focused upon students and learning programmers that wish to explore the feasibility of inclusion of Biometric Authentication within their projects. The Lite is a full-featured toolkit with all of the functionality of the Pro edition, with a limitation of 10 fingerprints
See also: attendance, access control, authentication, identification, security, password, fingerprint, toolkit, biometric, recognition, matching
Internet Deadbolt 6.0
?The Internet Deadbolt is more than security software. It allows network administrators, and upper management to get control of their corporate networks by restricting employees downloading of software that may have viruses or worms,? said Anthony Johnson, president of ICC Software. ?It has been on the market since 2002. It?s currently in use in banks and financial institutions to help increase security. ?
See also: administering, monitoring employees, monitoring, network, network monitoring, access control software, monitoring software, network security, Internet Deadbolt, internet, control, download, activity recorder, password, secure, protect
PlanetRemote Plus 2.01
PlanetRemote allows you to take control of your PC and access your files remotely as if you were actually sitting right in front of it! You can control your PC using a web browser from anywhere on the Internet, even with a dynamic IP address.
Security is provided by assigning a special access password to your computer, which is needed each time you want to control your computer or access your files remotely.
See also: Remote Computing, Desktop Sharing, Remote Desktop, Remote Management, Remote Administration, Remote Access, Remote Control, VNC, Virtual Network Computing
Public PC Desktop 3.31
Setup an Internet kiosk or a public access PC; disable access to vital files and allow only necessary applications to be run including Internet Explorer. Lock access to the desktop using username and password authentication, time-locked code (allows users to access PC for a given period of time only) or a combination of both. The program is ideal for public libraries, Internet cafes, information terminals or homePCs to limit childrens
See also: password, security, administrator, access, control, protect, privacy, restrict, lock, screen, free, download
Folder Security Personal 4.0.289
Folder Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only, preventing modification or deletion by other users or programs. It can restrict access to Floppy, CDRom, USB sticks, and other removable drives by locking them or making them read-only.Version 4.0 comes with proactive spyware defender, and is able to block installation of spyware and adware.
See also: read-only, Hijack, password, control, lock, folder, file, protect, hide, drive, access
Internet Access Controller 22.214.171.124
Internet Access Controller you can restrict, block web sites and limit internet access at specified time, schedule or on demand. Password protect an internet connection or website. Great for parental control or to prevent employess from inappropriate internet usage. You can block, limit, allow which programs have access to the web. Disable internet connection after specified amount of time. control your computer's internet and network connection.
See also: Internet Access Control, Restrict, Block Website, Limit, Parental Control, Internet Access Security, Children, Employees, Kids, Monitor
Attend HRM (Futuristic HRM Solution) 2.0.1
This unique software is integrating various technologies seamlessly. It works on client / server technology. It can be accessed across LAN / WAN. This is being built on indigenous frame work technology. This effectuation allows new modules to be added dynamically. It is modular, flexible and supports Multi Languages. Connects to any Database & Access Control System. The Enterprise version can be extended with User Clients, Thin clients.
See also: Time Attendance, Payroll, Access Control, Biometric, HRM
ADUC AdminPlus 126.96.36.199
Restore deleted Objects WITH their properties, such as Group Memberships and Telephone Number, Roll Back any changes you make to your Active Directory, retrieve real last logon information, search for running Services or Processes across your network, Remote Shutdown as many computers as you like, search for Obsolete Objects, get effective Group memberships, update SID History, Remote Control Computers and many many more options...
See also: Active Directory, ADUC, SID History, network, networking, obsolete home directories, profiles, user, computer, group, security, inventory, administration, last logon, shutdown, front office, access token, draw memberships, Remote Control, Take Over Computer