Cyclope Internet Filtering Proxy 2.1
Cyclope Internet Filtering Proxy monitors the entire Internet traffic and blocks the access to websites and files according to the chosen filter. The requested web pages are displayed only if they comply with the specified filters.
The Internet Filter allows to specify URL, keywords and file types (application, archive, Shockwave and Flash, audio and video) rules.
See also: Cyclope Internet Filtering Proxy, monitoring software, employee surveillance software, recording Internet Filtering software, Internet Filter, web filter, content filtering, internet filters, block internet access, control internet access
Network USB Port Disabler Tool 22.214.171.124
USB drive access monitoring software continuously tracks every USB activity and immediately inform to administrator (server) by beep a sound when any USB device is plug in plug out on LAN. Program provides option to restrict any USB port accessing device at any moment by blocking access permission of Read, Write or both on using Client PC USB port. USB port blocker shows Client PC IP address, manufacturer or storage capacity of used USB device.
See also: Network, USB, port, disabler, prevent, unauthorized, access, plug in, plug out, client, computer, drive, real time, offline, surveillance, activity, LAN, network, administrative, control, permission, server, IP address, host, flash, media
VeriFinger Linux SDK 4.2
VeriFinger Linux SDK is intended for most biometric system developers. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports BiometriKa FX 2000 scanner, AuthenTec AES4000 EntrePad and AF-S2 FingerLoc sensors.
See also: pattern recognition, access control, recognition, authentication, SDK, ridge, crime, scan, security, biometric, verification, matching, identification, recognition, fingerprint, criminalistics
Security Administrator 10.51
Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, local, network and USB drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.
See also: free, screen, lock, restrict, privacy, protect, control, access, administrator, security, password, download
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the week.
See also: access control, secure nt, port lock, smart security, cd lock, floppy lock, floplock, flock, protection, securent
Advanced Security Level 6.1
Secure your PC and restrict access to it with Advanced Security Level. It gives you an excellent administrative support to control the users access rights for your computer by setting up the desired access control level for each user. You can restrict access to Control Panel applets and to running specific applications; hide desktop icons, local and network drives; disable Start Menu items, DOS, boot keys, Registry editing, taskbar and much more.
See also: computer security, secure Internet, access control, password protection, privacy, restrict access, downloads, advanced security level
Statlook enables IT managers to track almost all users' activities, including: logging, work time and break duration, detailed statistics of application usage and visited web site history. Statlook is a comprehensive system for IT asset management, covering all major IT resources, such as: user activity, license compliance, software/hardware inventory. Thanks to Statlook it is possible to get a full access to users' hard disks and view the screen
See also: visited web site history, application software usage, break duration, user activity tracking work time, software hardware inventory, license compliance, user activity, asset management, user hard disks computer access control, screen capture grabbing
Add Images to Access Easily and Efficiently with DBPix: the Access Image Control. Avoid ALL the Access Imaging Gotchas! * Fast easy development * No OLE bloat * Responsive forms and fast record scrolling * Optimize storage, performance and display quality * Rotate portrait images without quality loss * View EXIF camera info * TWAIN scanner and camera control * Intuitive user-interface * Drag and drop * Try DBPix Now!
See also: dbpix, image, control, database, access, jpeg, EXIF, image control, form, report, data, scan, twain, ole, activex, thumbnail, upload, picture, component, jpg, content, bitmap, document, photo, graphic, msaccess, ms access, photograph, camera, scanner, OLE Object, table
This Access-like .NET Winforms data navigation control works with datasets, views, collections and objects that implement IList. Navigate by clicking on buttons, using shortcut keys, entering navigation commands in the display box or by context menu. Additionally, developer-defined buttons can be activated. Two buttons are defined for incremental navigation, enabling users to jump a predefined number of data items.
See also: Windows Forms, RAD, component, IList navigation, collection navigation, record navigation, dataset navigation, data navigation, record navigation, MS Access-like, VS.NET control, data navigation bar, VB.NET, CSharp, .NET, .NET Framework, NavBar
PC Control 1.3.0
PC Control allows the system administrator to establish access controls for each username. For each day of the week, the administrator sets access times, as well as the total length of time available for use.
The program is based upon a "set and forget" philosophy. Setting controls requires [1 min per user. Once set, the administrator can forget. The program requires no ongoing actions to operate. There are no daily authorizations, tokens.
See also: Parental Control, Access Control
Alparysoft VideoLock for Webcam 1.0
Alparysoft VideoLock for Webcam is a new surveillance security system based on the webcam aided facial image identification technology adapted for PC use. The product is designed to protect your computer and space around from unauthorized access and inform computer owner about the events happening at the workplace or home during his/her absence.
See also: Alparysoft VideoLock for Webcam is a new surveillance security system based on the webcam aided facial image identification technology adapted for PC use. The product is designed to protect your computer and space around from unauthorized access and infor
Advanced Security Administrator 10.41
Protect your computer and restrict access to Internet with Security Administrator. This nice password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, Printers, System and Internet Options. You can disable your boot keys, cont
See also: password, security, administrator, access, control, protect, privacy, restrict, lock, screen, free, download
CD-DVD Lock 2.11
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any removable media, and also prevent data leak by removable media.
See also: DVD, Hard drive, password, security, administrator, access, control, protect, files, privacy, restrict, lock, screen, free, download
Corporate Network Security 1.61
Network-based security software used for protecting PC workstations over a network. Impose access restrictions to network PC workstations, execute patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts. The software supports over 600 different security restrictions and tweaks that let you restrict access to almost every corner of Windows.
See also: password, security, administrator, access, control, protect, privacy, restrict, lock, screen, free, download
Internet Lock 5.0
Internet Lock is an access control and password protection software for your Internet programs, it can deny or password protect any program and connection from accessing the Internet. Internet Lock works with the "Rules" mode: you can add one or more rules to control programs and internet connections. A rule normally has such format: [Allow/Deny/Password Protect] [Program] on [Port].
See also: password protect, password protection, internet lock, internet access, internet access control, deny, allow, secure, security, access control, intranet, denied
Internet Administrator for Microsoft ISA Server 2.6
The "Internet Administrator for Microsoft ISA Server" is an integrated solution which allows to control and manage internet access and provides:
- all-round internet monitoring;
- incoming traffic, time and bandwidth control;
- access control to web sites, by protocols, time, queries, words, etc.;
- flexible and powerful content filtering;
- URL category database with more than 3 000 000 web sites;
See also: internet access control, internet monitoring, traffic control, web filtering, content filtering, internet statistics
Adragon Firewall 7.5
Adragon Firewall provides a full access control of your files and registry keys. you can deny any program running,disable copy/open/modify/find any specified files.with Adragon Firewall,you can prevent any file from being run/opened/modified/copied/found; and any access to the controled files will be logged in details.furthermore,Adragon Firewall helps you to find what's going on in your PC, it can monitor all process' access to any files/regis
See also: deny copy, no run, access control, file monitor, registry monitor, file safe, system security, system log, no open, no modify, no print, no delete, no find any file, disable running of any program, deny copy of any documents.hide file, no modify file.
Remote Control 2.0
Remote Control. Remote Access Tool. Displays the screen of remote computer via LAN or Internet. Allows you to use your mouse and keyboard to control the other computer remotely. It means that you can work on a remote computer, as if you were sitting in front of it, regardless of distance between computers. The connection is protected by RC4-like encryption algorithm with 128 bit key. Allows you to control traffic through the connection speed.
See also: Remote, access, desktop, control, lan, internet
Time Lock 126.96.36.199
Time Lock is a simple program, which allows to protect your computer against unwanted use. When the computer is locked by the Time Lock software, nobody can access documents on your computer, run programs, browse on the internet, etc. Time Lock is very often used by parents as a "child lock" for home PC. Simply let your child to play games or browse on the internet only for a certain time period.
See also: security protection, access control, home PC, protect PC, child lock, time lock
Ammyy Admin 3.0
Ammyy Admin - is a free remote desktop sharing and PC remote control software that can be used for remote administration, remote office arrangement, remote support or distant education purposes. Ammyy Admin lets get quick remote PC access via Internet without problems with firewalls or NAT and work with remote PC as if you're sitting right in front of it. Ammyy Admin uses advanced encryption algorithm system. It provides high class data security
See also: remote desktop, PC remote control, remote desktop sharing, PC remote access, remote desktop software, free remote desktop software, free remote control, remote access PC, remote support, remote desktop access, internet remote access, remote desktop windows