Dekart Logon for Lotus Notes 1.02
Protect access to Lotus Notes with smart cards, USB disks and biometrics. Dekart Logon for Lotus Notes performs high level user authentication, ensuring that only authorized users can access Lotus Notes data and resources. When the user removes the USB token or smart card from their computer, Logon for Lotus Notes can automatically lock the Lotus Notes workspace.
See also: user authentication, access control, smart card login, Windows login, secure login, protect passwords, hardware protection, USB tokens, Lotus Notes login
IDpack Business 8.1
IDpack Business ID card software is the most comprehensive and flexible ID card and ID badge design and printing software for Windows. IDpack empowers you to create, secure, and produce professional photo ID cards and ID badges such as access cards, employee ID, student ID and more all in a timely fashion. IDpack integrates with Microsoft Access and ODBC databases. IDpack, Smart Security at a Smart Price!
See also: idpack business, idpack, id card software, card software, id card, id cards, identification card, badge software, photo id software, id badge software, employee id, access control card, convention badge, student id, id pack, idpack 8
FingerCell PC EDK for Windows 1.2
FingerCell 1.2 Embedded Development Kit for PC with MS Windows. This EDK is intended for developers, who are going to use PC with MS Windows as part of their network biometric system. Includes 1 license for FingerCell DLL, interfaces for image input from either files or fingerprint sensors, sample application with source code and software documentation.
See also: fingerprint, pattern recognition, recognition, identification, matching, verification, embedded, win32, demo, evaluation, biometric, security, scan, crime, ridge, authentication, access control, criminalistics, fingerprint recognition, fingerprint identification
BPACLer eliminates the tedious process of selecting a file or folder object and having to browse through each individual access control entry (ACE) to see the effective permissions for different users and groups (trustees). BPACLer quickly displays all allow and deny access control entries (ACE) from the ACL for a selected file or folder. The selected file or folder owner information is also displayed on the same screen.
See also: administrator, system, entry, security, folder, file, permission, List, Control, Access, ACE, ACL
Easy Desktop Keeper 1.81
Easy Desktop Keeper lets you save, restore, manage and lock desktop layout that includes files and folders located on the desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock desktop layout, every time you reboot your PC, the program will restore desktop icons and bring them back to their original positions as well as return the old wallpaper and the screen saver to the background.
See also: download, free, screen, lock, restrict, icons, files, protect, control, access, save, restore, desktop
Easy File Protector 4.2
Easy File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable, un
See also: lock, screen, free, download, computer, restricting, restrictions, restrict, privacy, protect, control, access, security, password
Hide & Protect any Drives 2.1
Hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media.
See also: free, download, computer, restricting, restrictions, restrict, privacy, protect, control, access, security, password, Hard Drive, DVD, lock
Do you want to supervise users' every action on remote computers simultaneously? NetWatcher, a Real Nuke for you to supervise and control computers over Internet/network in a Windows. For more info, please visit http://www.netguarder.com/en/netwatcher.htm. You will see remote computer screens, URL access, and program run history of remote users in a Windows of your computer.
See also: log, url, report, email, device, forbid, terminal, instant, access, remote, control, supervision, supervise
Deskman Pro 5.5
Desktop security management for home users and system administrators alike. Home users need a simple way of protecting their computers on coffee breaks, or restraining access to their desktop on shared computer environments. System administrators require an effective tool to stop users from messing up the desktop, or apply tight security measures on a per-user or system-wide basis. Deskman is the tool of choice for its simplicity and effectivity.
See also: system protection, security manager, desktop manager, user control, security software, access control, desktop restrictions, desktop security, easy security, access point
FlyTreeXPro ActiveX - Fast, powerful and flexible multicolumnar Tree/Grid/List/Outline. Get more than 30 controls in one! More than 40 types of inplace editors, data-bounding, a lot of properties and events for every need!
See also: .Net, Access, ListView, data-aware, Database, TreeView, Outline, List, Grid, Tree, Control, ActiveX
BioCert Authenticator Lite Edition 10 Users 1.2
BioCert Authenticator Lite Edition 10 Users Our standard software programming toolkit offers 1:m matching capability up to 10 users. This toolkit is primarily focused upon students and learning programmers that wish to explore the feasibility of inclusion of Biometric Authentication within their projects. The Lite is a full-featured toolkit with all of the functionality of the Pro edition, with a limitation of 10 fingerprints
See also: attendance, access control, authentication, identification, security, password, fingerprint, toolkit, biometric, recognition, matching
PlanetRemote Plus 2.01
PlanetRemote allows you to take control of your PC and access your files remotely as if you were actually sitting right in front of it! You can control your PC using a web browser from anywhere on the Internet, even with a dynamic IP address.
Security is provided by assigning a special access password to your computer, which is needed each time you want to control your computer or access your files remotely.
See also: Remote Computing, Desktop Sharing, Remote Desktop, Remote Management, Remote Administration, Remote Access, Remote Control, VNC, Virtual Network Computing
Public PC Desktop 3.31
Setup an Internet kiosk or a public access PC; disable access to vital files and allow only necessary applications to be run including Internet Explorer. Lock access to the desktop using username and password authentication, time-locked code (allows users to access PC for a given period of time only) or a combination of both. The program is ideal for public libraries, Internet cafes, information terminals or homePCs to limit childrens
See also: password, security, administrator, access, control, protect, privacy, restrict, lock, screen, free, download
Folder Security Personal 4.0.289
Folder Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only, preventing modification or deletion by other users or programs. It can restrict access to Floppy, CDRom, USB sticks, and other removable drives by locking them or making them read-only.Version 4.0 comes with proactive spyware defender, and is able to block installation of spyware and adware.
See also: read-only, Hijack, password, control, lock, folder, file, protect, hide, drive, access
VeriFinger Standard SDK Trial 5.0
Multiplatform fingerprint identification SDK. Based on reliable fingerprint recognition technology with matching speed up to 40,000 fingerprints per second. Supports more than 20 major fingerprint scanners and sensors on Windows, Linux and Mac OS X. Includes programming samples in C, C++, C#, Sun Java 2, Visual Basic 6, VBA and Delphi 6. The trial requires constant internet connection and Microsoft Visual C++ 2005 Redistributable Package (x86).
See also: fingerprint, SDK, recognition, identification, matching, verification, biometric, biometrical, Mac, Linux, Mac OS, security, scan, authentication, logon, access control, attendance control
Internet Access Controller 220.127.116.11
Internet Access Controller you can restrict, block web sites and limit internet access at specified time, schedule or on demand. Password protect an internet connection or website. Great for parental control or to prevent employess from inappropriate internet usage. You can block, limit, allow which programs have access to the web. Disable internet connection after specified amount of time. control your computer's internet and network connection.
See also: Internet Access Control, Restrict, Block Website, Limit, Parental Control, Internet Access Security, Children, Employees, Kids, Monitor
Attend HRM (Futuristic HRM Solution) 2.0.1
This unique software is integrating various technologies seamlessly. It works on client / server technology. It can be accessed across LAN / WAN. This is being built on indigenous frame work technology. This effectuation allows new modules to be added dynamically. It is modular, flexible and supports Multi Languages. Connects to any Database & Access Control System. The Enterprise version can be extended with User Clients, Thin clients.
See also: Time Attendance, Payroll, Access Control, Biometric, HRM
Internet Booth 6.2
Internet Booth software enables to you to convert any of your PCs (old or new) into a PC dedicated for the Internet Browsing only. You do not have to worry about anyone changing setting on this PC, since only you, the master, will be able to make changes to your public Internet Booth PC. Once the software is installed and properly setup, you could place your PC into a public spot, such a your store, your coin laundry, public library.
See also: access, protect, internet, security, control, lock, screen
Professional security software enabling you to password protect folders and files with encryption. Maximum efficiency with 6 encryption algorithms available
See also: password, protect, folder, file, encryption, access, control, security, privacy
ADUC AdminPlus 18.104.22.168
Restore deleted Objects WITH their properties, such as Group Memberships and Telephone Number, Roll Back any changes you make to your Active Directory, retrieve real last logon information, search for running Services or Processes across your network, Remote Shutdown as many computers as you like, search for Obsolete Objects, get effective Group memberships, update SID History, Remote Control Computers and many many more options...
See also: Active Directory, ADUC, SID History, network, networking, obsolete home directories, profiles, user, computer, group, security, inventory, administration, last logon, shutdown, front office, access token, draw memberships, Remote Control, Take Over Computer