ADD TO FAVORITES l SUBMIT SOFTWARE     
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

Media Access Controlrole-based access controlcomputer access control
desktop access controlcontrol internet accesscontrol access
Internet access controlaccess controlaccess control card
Web access controlUSB access controlaccess control software
network access controldatabase controlaccess to mysql converter

   

Cyclope Internet Filtering Proxy 2.1

Cyclope Internet Filtering Proxy monitors the entire Internet traffic and blocks the access to websites and files according to the chosen filter. The requested web pages are displayed only if they comply with the specified filters. The Internet Filter allows to specify URL, keywords and file types (application, archive, Shockwave and Flash, audio and video) rules.

See also: Cyclope Internet Filtering Proxy, monitoring software, employee surveillance software, recording Internet Filtering software, Internet Filter, web filter, content filtering, internet filters, block internet access, control internet access

Download Cyclope Internet Filtering Proxy 2.1 (Size: 2107 KB)Buy Cyclope Internet Filtering Proxy 2.1 (only $39.95)


Network USB Port Disabler Tool 2.0.1.5

USB drive access monitoring software continuously tracks every USB activity and immediately inform to administrator (server) by beep a sound when any USB device is plug in plug out on LAN. Program provides option to restrict any USB port accessing device at any moment by blocking access permission of Read, Write or both on using Client PC USB port. USB port blocker shows Client PC IP address, manufacturer or storage capacity of used USB device.

See also: Network, USB, port, disabler, prevent, unauthorized, access, plug in, plug out, client, computer, drive, real time, offline, surveillance, activity, LAN, network, administrative, control, permission, server, IP address, host, flash, media

Download Network USB Port Disabler Tool 2.0.1.5 (Size: 3010 KB)Buy Network USB Port Disabler Tool 2.0.1.5 (only $120.00)


File & Folder Protector 2.51

Protect Files and Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.

See also: free, screen, lock, restrict, privacy, files, protect, control, access, administrator, security, password, download

Download File & Folder Protector 2.51 (Size: 741 KB)Buy File & Folder Protector 2.51 (only $49.00)


IE Internet Security 6.51

It customizes different features of the Internet Explorer Web browser, lets you disable changing your web browser settings, restrict access to certain tabs of Internet Options dialog box, as well as specific settings from each tab, disable certain menu items and buttons, and prevent others from editing your Favorites. Multi-user support allows you to apply security restrictions for each user personally. Password protection is also offered.

See also: free, screen, lock, restrict, privacy, protect, control, access, administrator, security, password, download

Download IE Internet Security 6.51 (Size: 1106 KB)Buy IE Internet Security 6.51 (only $49.00)


Hide Files & Folders 2.5

Hide Files & Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.

See also: lock, screen, free, download, computer, restricting, restrictions, restrict, privacy, protect, control, access, security, password

Download Hide Files & Folders 2.5 (Size: 737 KB)Buy Hide Files & Folders 2.5 (only $39.00)


Outlook Express Security 1.7

Use Outlook Express Security to control access to Outlook Express and its databases. When it is active, Outlook Express becomes locked and no third-party programs can access its message base files and the address book. As a result, when you try to start Outlook Express, open the address book or access the files, a password will be asked to allow access. If an invalid password is entered, Outlook Express or Address Book will not be opened.

See also: express, outlook, active, asked, becomes, data, databases, locked, open, party, programs, result, start, third, try, control, base, message, allow, security, password, address, book, files, access

Download Outlook Express Security 1.7 (Size: 611 KB)Buy Outlook Express Security 1.7 (only $29.00)


Windows Security Officer 6.9.3.1

Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources.

See also: internet, folder, file, guard, privacy, protect, lock, administration, securing, security, control, access, password

Download Windows Security Officer 6.9.3.1 (Size: 1541 KB)Buy Windows Security Officer 6.9.3.1 (only $24.95)


Internet Deadbolt 6.0

?The Internet Deadbolt is more than security software. It allows network administrators, and upper management to get control of their corporate networks by restricting employees downloading of software that may have viruses or worms,? said Anthony Johnson, president of ICC Software. ?It has been on the market since 2002. It?s currently in use in banks and financial institutions to help increase security. ?

See also: administering, monitoring employees, monitoring, network, network monitoring, access control software, monitoring software, network security, Internet Deadbolt, internet, control, download, activity recorder, password, secure, protect

Download Internet Deadbolt 6.0 (Size: 2929 KB)Buy Internet Deadbolt 6.0 (only $69.99)


CS-RCS Basic 4.0.273

CS-RCS is a general-purpose document revision management and Internet remote access solution. Fully integrated with the Windows Explorer. Provides the most powerful and intuitive solution on the market today. Free for single users. CS-RCS handles all types of documents including HTML and MS-Office documents, images and program files. CS-RCS supports Internet access to remote projects by native client or any Internet browser.

See also: Internet access, document management, configuration management, revision control system, version control, MS-Office repository

Download CS-RCS Basic 4.0.273 (Size: 3005 KB)


Software Time Lock 1.0.1

Control when and how long various computer functions can be used each day of the week 1) Set blocks of time during which you cannot access the Web 2) Set blocks of time during which specific programs cannot be used 3) Set blocks of time during which you cannot use the computer at all 4) Set limits on how long you can access the Web each day 5) Set how long specific programs can be used each day 6) Set how many hours you can use the compute

See also: time lock, computer access control, software time restriction, time control, restrict time

Download Software Time Lock 1.0.1 (Size: 858 KB)Buy Software Time Lock 1.0.1 (only $30.00)


KidsWatch Time Control 3.0

Time Control allows you to limit Internet surfing, chatting and game playing to a time and duration appropriate for each child. Schedule the number of hours each child can use the computer, per day or by week. Automatically log your child out of their computer when its time for lights out. Lock down the computer to prevent your child from pirating music or installing inappropriate software. Easily share computer time among siblings.

See also: control, restrict, limiting computer access, limiting program access, limiting internet access, internet restrictions, program restrictions, computer restrictions, parental controls, access control, computer, internet, access, parental control

Download KidsWatch Time Control 3.0 (Size: 5750 KB)Buy KidsWatch Time Control 3.0 (only $29.95)


Mouse Lock 1.64

Mouse Lock is a Windows based application designed to prevent  unauthorized use of your computer. The program simply traps your mouse inside a small button. Your computer can  trap or free the mouse at specified time. You can to do it handle too. Mouse Lock disables special key combinations such as ALT_TAB, CTRL_ESC, CONTROL_ALT_DELETE and others. The program has protection from rebooting and reseting your computer.Mouse Lock can turn of

See also: mouse, lock, access, security, control

Download Mouse Lock 1.64 (Size: 140 KB)Buy Mouse Lock 1.64 (only $15.00)


Aether Antiboss 1.00

Quickly hide your private files, documents and folders. And don't merely hide individual files, secure any of your currently installed software totally! There's no need to "unhide" or "unlock" hidden software first to be able to run it! It remains totally invisible but still is able to work! And combine all this with unique Antiboss abilities: hide and restore hidden software windows and even tray icons with a customizable hotkey! Try it now!

See also: antiboss, hide, files, folders, programs, lock, invisible, hidden, secure, protect, guard, restrict, security, policy, access, control, parental, password, prying, eye, private

Download Aether Antiboss 1.00 (Size: 1295 KB)Buy Aether Antiboss 1.00 (only $25.00)


IE Internet Security 6.41

It customizes different features of the Internet Explorer Web browser, lets you disable changing your web browser settings, restrict access to certain tabs of Internet Options dialog box, as well as specific settings from each tab, disable certain menu items and buttons, and prevent others from editing your Favorites. Multi-user support allows you to apply security restrictions for each user personally. Password protection is also offered.

See also: password, security, administrator, access, control, protect, privacy, restrict, lock, screen, free, download

Download IE Internet Security 6.41 (Size: 1106 KB)Buy IE Internet Security 6.41 (only $49.00)


VeriFinger Standard SDK Trial 5.0

Multiplatform fingerprint identification SDK. Based on reliable fingerprint recognition technology with matching speed up to 40,000 fingerprints per second. Supports more than 20 major fingerprint scanners and sensors on Windows, Linux and Mac OS X. Includes programming samples in C, C++, C#, Sun Java 2, Visual Basic 6, VBA and Delphi 6. The trial requires constant internet connection and Microsoft Visual C++ 2005 Redistributable Package (x86).

See also: fingerprint, SDK, recognition, identification, matching, verification, biometric, biometrical, Mac, Linux, Mac OS, security, scan, authentication, logon, access control, attendance control

Download VeriFinger Standard SDK Trial 5.0 (Size: 44418 KB)Buy VeriFinger Standard SDK Trial 5.0 (only $439.00)


System USB Monitor Software 2.0.1.5

Secure USB drive monitor application tracks USB mass storage media access activities of client computers. System USB device activity surveillance program records local area network clients computer USB ports activities with their computer name, IP address, data-time, used USB information. Windows networks data theft monitor program works in stealth mode and does not show its presence in desktop, control panel and task manager.

See also: Universal, serial, port, USB, reader, device, surveillance, record, LAN, activities, change, read, write, access, permission, send, log, report, file, administrator, block, pen, drive, data, theft, monitor, card

Download System USB Monitor Software 2.0.1.5 (Size: 2908 KB)Buy System USB Monitor Software 2.0.1.5 (only $120.00)


Internet Booth 6.2

Internet Booth software enables to you to convert any of your PCs (old or new) into a PC dedicated for the Internet Browsing only. You do not have to worry about anyone changing setting on this PC, since only you, the master, will be able to make changes to your public Internet Booth PC. Once the software is installed and properly setup, you could place your PC into a public spot, such a your store, your coin laundry, public library.

See also: access, protect, internet, security, control, lock, screen

Download Internet Booth 6.2 (Size: 7865 KB)Buy Internet Booth 6.2 (only $69.00)


WinSesame 10.1

Professional security software enabling you to password protect folders and files with encryption. Maximum efficiency with 6 encryption algorithms available

See also: password, protect, folder, file, encryption, access, control, security, privacy

Download WinSesame 10.1 (Size: 557 KB)


ADUC CollectAdmin 4.0.1.5

ADUC CollectAdmin is a powerful tool that helps you retrieve file system rights from file servers across your network from behind your own workstation.

See also: Active Directory, File System, Get Remote File System Rights, Access Control, ACL, ADUC, network, networking, database, security, inventory, management, frontoffice, administration, network administration, consultancy, front office

Download ADUC CollectAdmin 4.0.1.5 (Size: 1109 KB)Buy ADUC CollectAdmin 4.0.1.5 (only $99.99)


CybSecureTS 1.7.1702

CybSecureTS is an Internet Filtering, Application Blocking, Device Security Tool. CybSecureTS blocks access to illegal file downloads and it also provides you increased protection with its EXE and Window Blocker which will prevent the usage of mis-usable software. CybSecureTS offers the solution that filters at the terminal server point to provide complete protection for threats that come through internet or emails.

See also: CybSecure, CybSecureTS Tool, CybSecure for Terminal Server, Terminal Server Configurationl, User Access Permissions, Thin Client Control, Internet Access Control, Internet Filter, EXE Blocking, Internet Scheduler, Application Scheduler

Download CybSecureTS 1.7.1702 (Size: 13282 KB)Buy CybSecureTS 1.7.1702 (only $59.00)






© 2005-2013 Downloadery. All rights reserved. Terms of Use and Privacy Policy. Contact Us