Dekart Logon for Lotus Notes 1.02
Protect access to Lotus Notes with smart cards, USB disks and biometrics. Dekart Logon for Lotus Notes performs high level user authentication, ensuring that only authorized users can access Lotus Notes data and resources. When the user removes the USB token or smart card from their computer, Logon for Lotus Notes can automatically lock the Lotus Notes workspace.
See also: user authentication, access control, smart card login, Windows login, secure login, protect passwords, hardware protection, USB tokens, Lotus Notes login
IDpack Business 8.1
IDpack Business ID card software is the most comprehensive and flexible ID card and ID badge design and printing software for Windows. IDpack empowers you to create, secure, and produce professional photo ID cards and ID badges such as access cards, employee ID, student ID and more all in a timely fashion. IDpack integrates with Microsoft Access and ODBC databases. IDpack, Smart Security at a Smart Price!
See also: idpack business, idpack, id card software, card software, id card, id software, id cards, identification card, badge software, photo id software, id badge software, employee id, access control card, convention badge, student id, id pack, idpack 8
VeriFinger Standard SDK 4.2
VeriFinger Standard SDK is intended for most biometric system developers. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners, AuthenTec AES4000 EntrePad and AF-S2 FingerLoc sensors.
See also: fingerprint, identification, matching, verification, biometric, security, scan, crime, ridge, SDK, authentication, recognition, access control, recognition, pattern recognition, criminalistics
File & Folder Protector 2.51
Protect Files and Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
See also: free, screen, lock, restrict, privacy, files, protect, control, access, administrator, security, password, download
Keylogger King Home 2.3
Statistics point out that today even young kids often become "hackers" after reading a few docs published on the Internet. If you don't want to be responsible for your kids buying goods on-line with stolen credit cards, you need a program like Keylogger King Home that logs all keyboard activities and applications running. The program can send you reports via e-mail. You will have access to all e-mail written by your kids and all their passwords.
See also: logon, logging, logger, littlesister, Little Sister, law enforcement, keytrapper, keytrap, keystroke, keyspy, keylogwn, keylogger, keylog, keycopy, keyboard, key, government agency, grabber, gathering, internet, investigator, investigative, investigation, investigate, intrusion, interceptor, interception, intercept, intercept, intelligence, inspection, investigator, inspection, internet monitoring, intelligence gathering, industrial espionage, husband, hooking, hook, hardware keystroke recorder, hardware keylogger, hacking, hacker, hack, home security, foreign intelligence, freeware, espionage, equipment, eavsdrop, eavesdropping, eavesdropper, employee monitoring, e-mail monitoring, e-mail, email, economic espionage, desktop monitoring, data interception, desktop, computer, corporate information security policies, computer monitoring, competitor intelligence, competitive intelligence, child monitoring, cheating spouse, control, catch, capture, bugging, bug, bigbrother, Big Brother, business intelligence, background investigation, audio, access control background check, attack, accountability, access, activity monitor, key stroke, keystroke, recording, monitoring, key monitor, recorder, spy on user, keyspy, keyboard capture, keyboard monitoring, keystroke monitoring, key monitor, keystroke recording, keylogwn, keylog, key capture, keystroke capture, keystroke logging, keystroke recorder, keystroke recorder, keycopy, keyboard monitoring, keyboard monitor, keylogger stealth, keyboard logger, invisible keylogger 97, invisible keylogger, keytrap, password, passwords, password grabber, keystroke logger, password recorder, keystroke recorder, hardware keystroke recorder, Hardware KeyLogger, key logger, keylogger, spy software, military agency, monitor, monitoring, nonviral malware, nonvirus malicious programs, password, patrol, parental control, personnel security program, police, private investigator, product, program, p.i., PC, pwd, recorder, recording, surf, software, spy kids, screen capture, snapshot, snooper, snooping, snoopware, spies, spy, spy gadget, spy gear, spy on user, spysoft, spytool, spyware, surveillance, tracking, traffic, trap, trapper, trapware, Trojan, trojan, tool, utilities, video, virus, web, wife, workplace surveillance etc.
Windows Security Officer 18.104.22.168
Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources.
See also: internet, folder, file, guard, privacy, protect, lock, administration, windows, securing, security, control, access, password
Statlook enables IT managers to track almost all users' activities, including: logging, work time and break duration, detailed statistics of application usage and visited web site history. Statlook is a comprehensive system for IT asset management, covering all major IT resources, such as: user activity, license compliance, software/hardware inventory. Thanks to Statlook it is possible to get a full access to users' hard disks and view the screen
See also: visited web site history, application software usage, break duration, user activity tracking work time, software hardware inventory, license compliance, user activity, asset management, user hard disks computer access control, screen capture grabbing
Most of us prefer not to turn computer off while we are away for coffee or going to the lavatory or have to attend a meeting in a conference room next door. Introducing Active Screen Lock, the unique security application, that disables Windows system key combinations, such as Alt+F4, Ctrl+Alt+Del, Alt+Tab and WinKey and then shows security screen over your desktop that would not let anyone except you in! Download FREE trial version now!
See also: desktop, activescreenlock, lock desktop, pc lock, system locking, screenlock, screen locking, security, locking access, task manager block, access control, permittance, password protection
AVIRA Antivirus for WebGate (Linux) 1.2.1
AVIRA Antivirus for WebGate reliably secures plain HTTP and FTP connections, being placed either between a client computer and the Internet or between a client computer, proxy and the Internet. The program also checks emails and email attachments which are transferred through ''web-based'' mail accounts. It permanently checks inactive connections and closes them automatically after a predefined interval, thus freeing additional resources.
See also: virus alert, virus, trojan horse, trojan, top antivirus, support antivirus, software antivirus, server antivirus, server, security, scanning speed, scan, safe browsing, repair, removal tool, anti virus, anti virus download, anti virus downloads, antivirus, antivirus business, antivirus buy, antivirus buy online, antivirus download, antivirus email, antivirus evaluation, antivirus freebsd, phishing, antivirus openbsd, antivirus program, antivirus protection, antivirus scanner, antivirus software, antivirus software updates, antivirus solution, antivirus support, antivirus technology, antivirus trial, antivirus upgrade, backdoor, block, clean, computer protection, computer security, connection, content filtering, control, dangers, defend, detection, dialer, disinfection, filter, download antivirus, FreeBSD, hack, hackers, home user, how to remove virus, in the wild, Internet, internet browsing, internet security software, internet security suite, internet worm, intrusion prevention, linux, linux anti virus, Linux antivirus, linux antivirus software, linux distributions, Linux security, linux virus protection, linux virus scan, macro virus, malicious code, malware, network protection, network security, on access, on demand, online antivirus, online virus check, online virus scanner, OpenBSD, pc scan, pc security, personal security, privacy, protection, proxy, proxyserver, virus cleaning, virus detection, virus guard, virus outbreak, virus protection, virus removal, virus removal tool, virus report, virus scan, virus scan online, virus scanner, virus scanning, virus signature, viruses, vulnerability, web proxy, web account, web mail, worm, worms
SecureXP allows you to customize your access control settings for your Windows software. Lots of people using your computer? Don't want them changing your settings? SecureXP is the program for you. And it's free! SecureXP also comes with an Internet Explorer customizer, and a Windows Cleaner, which will erase sensitive history data that you may not want others to see. Try SecureXP today.
See also: access control tweak internet explorer windows xp customize custom optimize speed
Program Sentry 1.0.0
Provides access control and usage management. Allows you to either create a list of blocked programs or a list of allowed programs. In the blocked programs mode, any program on the list is blocked. In the allowed program mode, any program NOT on the list is blocked. Individual programs can be password protected.
See also: password protect programs, computer access control, computer security, password protection, computer use control, control access
ABC Security Protector 5.31
This nice free security utility enables you to protect your PC by disabling some features like: use of the MS-DOS command prompt in Windows and real mode DOS applications from within the Windows shell, and disable function keys on boot up like the F5, F6 and F8 keys. The program is very useful if you want to disable the lowlevel access to your system. It's easy to use, excellent online help is also available. Try our password and security tools,
See also: download, free, lock, screen, restrict, privacy, files, protect, control, dos, access, administrator, security, password
Network Security Protector 1.61
The best network-based security software for public environment applications to secure and maintain a lot of network PC workstations located in different places. It supports over 600 different security restrictions, options and tweaks to restrict access to all parts of Windows, lets you apply executable patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer.
See also: free, screen, lock, restrict, privacy, protect, control, access, administrator, security, password, download
Personalwatchdog introduces unique features regarding privacy protection and data security: encrypt folders using the AES encryption algorithm; control your computer access at windows login or unlock; configure additional security passwords for your user account; remove safely temporary files and clean the recycle bin in an irrecoverable way; configure key sequences for protection on demand; safely remove evidence of your work at computer exit.
See also: privacy protection, data security, top-class protection, exclusive security features, on-the-flight encryption, DOD5020.22-M safe remove algorithm, AES encryption algorithm, computer access control, safe access password, remove evidence
VeriFinger Standard SDK Trial 5.0
Multiplatform fingerprint identification SDK. Based on reliable fingerprint recognition technology with matching speed up to 40,000 fingerprints per second. Supports more than 20 major fingerprint scanners and sensors on Windows, Linux and Mac OS X. Includes programming samples in C, C++, C#, Sun Java 2, Visual Basic 6, VBA and Delphi 6. The trial requires constant internet connection and Microsoft Visual C++ 2005 Redistributable Package (x86).
See also: fingerprint, SDK, recognition, identification, matching, verification, biometric, biometrical, PC, Mac, Windows, Linux, Mac OS, security, scan, authentication, logon, access control, attendance control
Game Protector 1.0
Game Protector protects any game with a password and when any user tries to open game it prompts for a password, so that only you can launch it, it is free software from www.gameprotector.com, a completely freeware. Game Protector lets you protect Game on your own PC, protect games executable files from unauthorized runs both on your computer, and even when you copy it to other computers.
See also: game, protector, parental control, access control
Website Filter 1.0
WebsiteFilter provides the best option for being able to filter access to an unlimited number of websites. Users can simply add individual webpages or websites onto a 'custom list' and instantly block them from the system. Easily, quickly and effectively! Unlike many other website blockers available, WebsiteFilter works with all website browsers and not just Internet Explorer!
See also: filter, block, websites, website, web, blocker, access, control, site, siteblocker, websitefilter
Remote Control 2.0
Remote Control. Remote Access Tool. Displays the screen of remote computer via LAN or Internet. Allows you to use your mouse and keyboard to control the other computer remotely. It means that you can work on a remote computer, as if you were sitting in front of it, regardless of distance between computers. The connection is protected by RC4-like encryption algorithm with 128 bit key. Allows you to control traffic through the connection speed.
See also: Remote, access, desktop, control, lan, internet
ADUC CollectAdmin 22.214.171.124
ADUC CollectAdmin is a powerful tool that helps you retrieve file system rights from file servers across your network from behind your own workstation.
See also: Active Directory, File System, Get Remote File System Rights, Access Control, ACL, ADUC, network, networking, database, security, inventory, software, management, frontoffice, administration, network administration, consultancy, front office
LanAudit Employee Computer Monitoring 2.84
Keep your employees on task and save money otherwise wasted by inefficient workers with LanAudit Employee Computer Monitoring now. PC-Monitor is employee computer monitoring software that invisibly monitors your entire network from one central location! It is an all-in-one Employee Computer monitoring software for real-time network computer monitoring, employee activity monitoring, content filtering and employees' work time tracking.
See also: Hardware Inventory, software Inventory, Data Loss Prevention, Document Operations, Stop Data leakage, Application Control, Web Access Control, Employee Computer Monitoring, Employee Monitoring, Computer Monitoring, Remote Control, Remote Install