Cyclope Internet Filtering Proxy 2.1
Cyclope Internet Filtering Proxy monitors the entire Internet traffic and blocks the access to websites and files according to the chosen filter. The requested web pages are displayed only if they comply with the specified filters.
The Internet Filter allows to specify URL, keywords and file types (application, archive, Shockwave and Flash, audio and video) rules.
See also: Cyclope Internet Filtering Proxy, monitoring software, employee surveillance software, recording Internet Filtering software, Internet Filter, web filter, content filtering, internet filters, block internet access, control internet access
Network USB Port Disabler Tool 220.127.116.11
USB drive access monitoring software continuously tracks every USB activity and immediately inform to administrator (server) by beep a sound when any USB device is plug in plug out on LAN. Program provides option to restrict any USB port accessing device at any moment by blocking access permission of Read, Write or both on using Client PC USB port. USB port blocker shows Client PC IP address, manufacturer or storage capacity of used USB device.
See also: Network, USB, port, disabler, prevent, unauthorized, access, plug in, plug out, client, computer, drive, real time, offline, surveillance, activity, LAN, network, administrative, control, permission, server, IP address, host, flash, media
FingerCell PC EDK for Windows 1.2
FingerCell 1.2 Embedded Development Kit for PC with MS Windows. This EDK is intended for developers, who are going to use PC with MS Windows as part of their network biometric system. Includes 1 license for FingerCell DLL, interfaces for image input from either files or fingerprint sensors, sample application with source code and software documentation.
See also: fingerprint, pattern recognition, recognition, identification, matching, verification, embedded, win32, demo, evaluation, biometric, security, scan, crime, ridge, authentication, access control, criminalistics, fingerprint recognition, fingerprint identification
BPACLer eliminates the tedious process of selecting a file or folder object and having to browse through each individual access control entry (ACE) to see the effective permissions for different users and groups (trustees). BPACLer quickly displays all allow and deny access control entries (ACE) from the ACL for a selected file or folder. The selected file or folder owner information is also displayed on the same screen.
See also: administrator, system, entry, security, folder, file, permission, List, Control, Access, ACE, ACL
Easy Desktop Keeper 1.81
Easy Desktop Keeper lets you save, restore, manage and lock desktop layout that includes files and folders located on the desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock desktop layout, every time you reboot your PC, the program will restore desktop icons and bring them back to their original positions as well as return the old wallpaper and the screen saver to the background.
See also: download, free, screen, lock, restrict, icons, files, protect, control, access, save, restore, desktop
Easy File Protector 4.2
Easy File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable, un
See also: lock, screen, free, download, computer, restricting, restrictions, restrict, privacy, protect, control, access, security, password
Hide & Protect any Drives 2.1
Hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media.
See also: free, download, computer, restricting, restrictions, restrict, privacy, protect, control, access, security, password, Hard Drive, DVD, lock
Do you want to supervise users' every action on remote computers simultaneously? NetWatcher, a Real Nuke for you to supervise and control computers over Internet/network in a Windows. For more info, please visit http://www.netguarder.com/en/netwatcher.htm. You will see remote computer screens, URL access, and program run history of remote users in a Windows of your computer.
See also: log, url, report, email, device, forbid, terminal, instant, access, remote, control, supervision, supervise
Deskman Pro 5.5
Desktop security management for home users and system administrators alike. Home users need a simple way of protecting their computers on coffee breaks, or restraining access to their desktop on shared computer environments. System administrators require an effective tool to stop users from messing up the desktop, or apply tight security measures on a per-user or system-wide basis. Deskman is the tool of choice for its simplicity and effectivity.
See also: system protection, security manager, desktop manager, user control, security software, access control, desktop restrictions, desktop security, easy security, access point
FlyTreeXPro ActiveX - Fast, powerful and flexible multicolumnar Tree/Grid/List/Outline. Get more than 30 controls in one! More than 40 types of inplace editors, data-bounding, a lot of properties and events for every need!
See also: .Net, Access, ListView, data-aware, Database, TreeView, Outline, List, Grid, Tree, Control, ActiveX
BioCert Authenticator Lite Edition 10 Users 1.2
BioCert Authenticator Lite Edition 10 Users Our standard software programming toolkit offers 1:m matching capability up to 10 users. This toolkit is primarily focused upon students and learning programmers that wish to explore the feasibility of inclusion of Biometric Authentication within their projects. The Lite is a full-featured toolkit with all of the functionality of the Pro edition, with a limitation of 10 fingerprints
See also: attendance, access control, authentication, identification, security, password, fingerprint, toolkit, biometric, recognition, matching
PlanetRemote Plus 2.01
PlanetRemote allows you to take control of your PC and access your files remotely as if you were actually sitting right in front of it! You can control your PC using a web browser from anywhere on the Internet, even with a dynamic IP address.
Security is provided by assigning a special access password to your computer, which is needed each time you want to control your computer or access your files remotely.
See also: Remote Computing, Desktop Sharing, Remote Desktop, Remote Management, Remote Administration, Remote Access, Remote Control, VNC, Virtual Network Computing
Public PC Desktop 3.31
Setup an Internet kiosk or a public access PC; disable access to vital files and allow only necessary applications to be run including Internet Explorer. Lock access to the desktop using username and password authentication, time-locked code (allows users to access PC for a given period of time only) or a combination of both. The program is ideal for public libraries, Internet cafes, information terminals or homePCs to limit childrens
See also: password, security, administrator, access, control, protect, privacy, restrict, lock, screen, free, download
Folder Security Personal 4.0.289
Folder Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only, preventing modification or deletion by other users or programs. It can restrict access to Floppy, CDRom, USB sticks, and other removable drives by locking them or making them read-only.Version 4.0 comes with proactive spyware defender, and is able to block installation of spyware and adware.
See also: read-only, Hijack, password, control, lock, folder, file, protect, hide, drive, access
VeriFinger Standard SDK Trial 5.0
Multiplatform fingerprint identification SDK. Based on reliable fingerprint recognition technology with matching speed up to 40,000 fingerprints per second. Supports more than 20 major fingerprint scanners and sensors on Windows, Linux and Mac OS X. Includes programming samples in C, C++, C#, Sun Java 2, Visual Basic 6, VBA and Delphi 6. The trial requires constant internet connection and Microsoft Visual C++ 2005 Redistributable Package (x86).
See also: fingerprint, SDK, recognition, identification, matching, verification, biometric, biometrical, Mac, Linux, Mac OS, security, scan, authentication, logon, access control, attendance control
Internet Access Controller 18.104.22.168
Internet Access Controller you can restrict, block web sites and limit internet access at specified time, schedule or on demand. Password protect an internet connection or website. Great for parental control or to prevent employess from inappropriate internet usage. You can block, limit, allow which programs have access to the web. Disable internet connection after specified amount of time. control your computer's internet and network connection.
See also: Internet Access Control, Restrict, Block Website, Limit, Parental Control, Internet Access Security, Children, Employees, Kids, Monitor
Attend HRM (Futuristic HRM Solution) 2.0.1
This unique software is integrating various technologies seamlessly. It works on client / server technology. It can be accessed across LAN / WAN. This is being built on indigenous frame work technology. This effectuation allows new modules to be added dynamically. It is modular, flexible and supports Multi Languages. Connects to any Database & Access Control System. The Enterprise version can be extended with User Clients, Thin clients.
See also: Time Attendance, Payroll, Access Control, Biometric, HRM
Internet Booth 6.2
Internet Booth software enables to you to convert any of your PCs (old or new) into a PC dedicated for the Internet Browsing only. You do not have to worry about anyone changing setting on this PC, since only you, the master, will be able to make changes to your public Internet Booth PC. Once the software is installed and properly setup, you could place your PC into a public spot, such a your store, your coin laundry, public library.
See also: access, protect, internet, security, control, lock, screen
Professional security software enabling you to password protect folders and files with encryption. Maximum efficiency with 6 encryption algorithms available
See also: password, protect, folder, file, encryption, access, control, security, privacy
ADUC AdminPlus 22.214.171.124
Restore deleted Objects WITH their properties, such as Group Memberships and Telephone Number, Roll Back any changes you make to your Active Directory, retrieve real last logon information, search for running Services or Processes across your network, Remote Shutdown as many computers as you like, search for Obsolete Objects, get effective Group memberships, update SID History, Remote Control Computers and many many more options...
See also: Active Directory, ADUC, SID History, network, networking, obsolete home directories, profiles, user, computer, group, security, inventory, administration, last logon, shutdown, front office, access token, draw memberships, Remote Control, Take Over Computer