Dekart Logon for Lotus Notes 1.02
Protect access to Lotus Notes with smart cards, USB disks and biometrics. Dekart Logon for Lotus Notes performs high level user authentication, ensuring that only authorized users can access Lotus Notes data and resources. When the user removes the USB token or smart card from their computer, Logon for Lotus Notes can automatically lock the Lotus Notes workspace.
See also: user authentication, access control, smart card login, Windows login, secure login, protect passwords, hardware protection, USB tokens, Lotus Notes login
IDpack Business 8.1
IDpack Business ID card software is the most comprehensive and flexible ID card and ID badge design and printing software for Windows. IDpack empowers you to create, secure, and produce professional photo ID cards and ID badges such as access cards, employee ID, student ID and more all in a timely fashion. IDpack integrates with Microsoft Access and ODBC databases. IDpack, Smart Security at a Smart Price!
See also: idpack business, idpack, id card software, card software, id card, id cards, identification card, badge software, photo id software, id badge software, employee id, access control card, convention badge, student id, id pack, idpack 8
File & Folder Protector 2.51
Protect Files and Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
See also: free, screen, lock, restrict, privacy, files, protect, control, access, administrator, security, password, download
IE Internet Security 6.51
It customizes different features of the Internet Explorer Web browser, lets you disable changing your web browser settings, restrict access to certain tabs of Internet Options dialog box, as well as specific settings from each tab, disable certain menu items and buttons, and prevent others from editing your Favorites. Multi-user support allows you to apply security restrictions for each user personally. Password protection is also offered.
See also: free, screen, lock, restrict, privacy, protect, control, access, administrator, security, password, download
Hide Files & Folders 2.5
Hide Files & Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
See also: lock, screen, free, download, computer, restricting, restrictions, restrict, privacy, protect, control, access, security, password
Outlook Express Security 1.7
Use Outlook Express Security to control access to Outlook Express and its databases. When it is active, Outlook Express becomes locked and no third-party programs can access its message base files and the address book. As a result, when you try to start Outlook Express, open the address book or access the files, a password will be asked to allow access. If an invalid password is entered, Outlook Express or Address Book will not be opened.
See also: express, outlook, active, asked, becomes, data, databases, locked, open, party, programs, result, start, third, try, control, base, message, allow, security, password, address, book, files, access
This feature-packed package turns any PC into a kiosk. Users can only access sites, applications, and settings you approve through a shell you design. You can command SiteKiosk and extend its functionality via scripts, objects, or simply configure it with wizards. Multilanguage support, automatic dial-up or network, event-logging support, website filtering (with automatic update), remote management, payment options, video/photo-Email.
See also: security software, cyber cafe software, photo mail software, video mail software, touch screen, credit card payment, bill acceptor, coin machine, pay per use, kiosk software, kiosk, public computer, internet monitoring, public access terminal, internet kiosk, internet terminal
Home Credit Card Manager 3.0.050611
Home Credit Card Manager lets you find out where your hard-earned money is being spent by using your credit card statements.
Simply match your statement transactions to the categories provided, then use the tools to group and sort the information.
...and with the integrated "auto-matching" tool, most of the work is done for you!
See also: credit card fees, interest rates, debt control, budgeting, free software, personal finance, money manager, home finance, money, budget, credit card, HomeCreditCardManager, HomeMoneyManager
Auto Volume Control 1.5
Solves the volume control problems for TVs, radio stations, CDs and Public Address systems. Now use your PC as a volume control device which stays between the audio input source (microphone) & the audio output source (speaker) all this software requires is a sound card with a line-in and line-out.No more be startled by obnoxiously loud commercials. Keeps volume levels steady, so you won't be bothered by annoying volume dips or peaks
See also: PA system, microphone, Line-out, Line-in, Amplifier, Speaker, Volume Control, Sound card, Auto volume control, TV Remote, TV Volume, Speech
Internet Deadbolt 6.0
?The Internet Deadbolt is more than security software. It allows network administrators, and upper management to get control of their corporate networks by restricting employees downloading of software that may have viruses or worms,? said Anthony Johnson, president of ICC Software. ?It has been on the market since 2002. It?s currently in use in banks and financial institutions to help increase security. ?
See also: administering, monitoring employees, monitoring, network, network monitoring, access control software, monitoring software, network security, Internet Deadbolt, internet, control, download, activity recorder, password, secure, protect
CS-RCS Basic 4.0.273
CS-RCS is a general-purpose document revision management and Internet remote access solution. Fully integrated with the Windows Explorer. Provides the most powerful and intuitive solution on the market today. Free for single users.
CS-RCS handles all types of documents including HTML and MS-Office documents, images and program files.
CS-RCS supports Internet access to remote projects by native client or any Internet browser.
See also: Internet access, document management, configuration management, revision control system, version control, MS-Office repository
Software Time Lock 1.0.1
Control when and how long various computer functions can be used each day of the week
1) Set blocks of time during which you cannot access the Web
2) Set blocks of time during which specific programs cannot be used
3) Set blocks of time during which you cannot use the computer at all
4) Set limits on how long you can access the Web each day
5) Set how long specific programs can be used each day
6) Set how many hours you can use the compute
See also: time lock, computer access control, software time restriction, time control, restrict time
KidsWatch Time Control 3.0
Time Control allows you to limit Internet surfing, chatting and game playing to a time and duration appropriate for each child. Schedule the number of hours each child can use the computer, per day or by week. Automatically log your child out of their computer when its time for lights out. Lock down the computer to prevent your child from pirating music or installing inappropriate software. Easily share computer time among siblings.
See also: control, restrict, limiting computer access, limiting program access, limiting internet access, internet restrictions, program restrictions, computer restrictions, parental controls, access control, computer, internet, access, parental control
Mouse Lock 1.64
Mouse Lock is a Windows based application designed
to prevent unauthorized use of your computer.
The program simply traps your mouse inside a small button.
Your computer can trap or free the mouse at specified time.
You can to do it handle too.
Mouse Lock disables special key combinations such as ALT_TAB,
CTRL_ESC, CONTROL_ALT_DELETE and others.
The program has protection from rebooting and reseting
your computer.Mouse Lock can turn of
See also: mouse, lock, access, security, control
Cyclope Internet Filtering Proxy 2.1
Cyclope Internet Filtering Proxy monitors the entire Internet traffic and blocks the access to websites and files according to the chosen filter. The requested web pages are displayed only if they comply with the specified filters.
The Internet Filter allows to specify URL, keywords and file types (application, archive, Shockwave and Flash, audio and video) rules.
See also: Cyclope Internet Filtering Proxy, monitoring software, employee surveillance software, recording Internet Filtering software, Internet Filter, web filter, content filtering, internet filters, block internet access, control internet access
VeriFinger Standard SDK Trial 5.0
Multiplatform fingerprint identification SDK. Based on reliable fingerprint recognition technology with matching speed up to 40,000 fingerprints per second. Supports more than 20 major fingerprint scanners and sensors on Windows, Linux and Mac OS X. Includes programming samples in C, C++, C#, Sun Java 2, Visual Basic 6, VBA and Delphi 6. The trial requires constant internet connection and Microsoft Visual C++ 2005 Redistributable Package (x86).
See also: fingerprint, SDK, recognition, identification, matching, verification, biometric, biometrical, Mac, Linux, Mac OS, security, scan, authentication, logon, access control, attendance control
Internet Booth 6.2
Internet Booth software enables to you to convert any of your PCs (old or new) into a PC dedicated for the Internet Browsing only. You do not have to worry about anyone changing setting on this PC, since only you, the master, will be able to make changes to your public Internet Booth PC. Once the software is installed and properly setup, you could place your PC into a public spot, such a your store, your coin laundry, public library.
See also: access, protect, internet, security, control, lock, screen
Professional security software enabling you to password protect folders and files with encryption. Maximum efficiency with 6 encryption algorithms available
See also: password, protect, folder, file, encryption, access, control, security, privacy
ADUC CollectAdmin 22.214.171.124
ADUC CollectAdmin is a powerful tool that helps you retrieve file system rights from file servers across your network from behind your own workstation.
See also: Active Directory, File System, Get Remote File System Rights, Access Control, ACL, ADUC, network, networking, database, security, inventory, management, frontoffice, administration, network administration, consultancy, front office
CybSecureTS is an Internet Filtering, Application Blocking, Device Security Tool. CybSecureTS blocks access to illegal file downloads and it also provides you increased protection with its EXE and Window Blocker which will prevent the usage of mis-usable software. CybSecureTS offers the solution that filters at the terminal server point to provide complete protection for threats that come through internet or emails.
See also: CybSecure, CybSecureTS Tool, CybSecure for Terminal Server, Terminal Server Configurationl, User Access Permissions, Thin Client Control, Internet Access Control, Internet Filter, EXE Blocking, Internet Scheduler, Application Scheduler