Unlock MDB 3.0
Now the process to unlock .mdb file is easier with access password recovery program. Unlock MDB is a fastest access password recovery program to recover access password of .mdb of Microsoft Access 95/97/2000/2002/2003. Software hardly takes 4-5 seconds to unlock mdb file. Unlock MDB is a powerful .mdb password recovery tool for system and security administrators and all who have problems with MS Access database security.
See also: unlock mdb, unlock mdb file, unlock access database, unprotect access database, access password recovery, unlock mdb database, unlock mdb password, mdb unlocker, unlock access mdb, unlock access password, unlock ms access database, break access security
Get Access Password 3.0
Get Access Password is very powerful mdb password recovery tool for Access database administrators, security officers to get ms access password. Software supports all versions of Microsoft Access 95, 97, 2000, 2002, XP, 2003 & get mdb password with a few clicks and enable users to copy the recovered password in a clipboard. Now get access database password of .mdb file instantly.
See also: get access password, get access database password, get mdb password, get ms access password, unlock mdb, access password recovery program, unlock access database, unlock mdb password, break access password, break access security
NSF Security Breaker 3.5
Download NSF security breaker tool at free to understanding the features for how to remove NSF security. Pick one the best NSF security removal tool to open NSF files or documents and remove local security from NSF documents. Use Securase software to execute NSF local security removal and remove ?you are not authorized to access that database? error.
See also: nsf security breaker, remove nsf security, best nsf security removal tool, nsf security remover software, you are not authorized to access that database, break lotus notes nsf security, nsf security removal, open nsf files, read nsf
File & Folder Protector 2.51
Protect Files and Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
See also: free, screen, lock, restrict, privacy, files, protect, control, access, administrator, security, password, download
IE Internet Security 6.51
It customizes different features of the Internet Explorer Web browser, lets you disable changing your web browser settings, restrict access to certain tabs of Internet Options dialog box, as well as specific settings from each tab, disable certain menu items and buttons, and prevent others from editing your Favorites. Multi-user support allows you to apply security restrictions for each user personally. Password protection is also offered.
See also: free, screen, lock, restrict, privacy, protect, control, access, administrator, security, password, download
Hide Files & Folders 2.5
Hide Files & Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
See also: lock, screen, free, download, computer, restricting, restrictions, restrict, privacy, protect, control, access, security, password
Outlook Express Security 1.7
Use Outlook Express Security to control access to Outlook Express and its databases. When it is active, Outlook Express becomes locked and no third-party programs can access its message base files and the address book. As a result, when you try to start Outlook Express, open the address book or access the files, a password will be asked to allow access. If an invalid password is entered, Outlook Express or Address Book will not be opened.
See also: express, outlook, active, asked, becomes, data, databases, locked, open, party, programs, result, start, third, try, control, base, message, allow, security, password, address, book, files, access
Windows Security Officer 18.104.22.168
Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources.
See also: internet, folder, file, guard, privacy, protect, lock, administration, securing, security, control, access, password
This feature-packed package turns any PC into a kiosk. Users can only access sites, applications, and settings you approve through a shell you design. You can command SiteKiosk and extend its functionality via scripts, objects, or simply configure it with wizards. Multilanguage support, automatic dial-up or network, event-logging support, website filtering (with automatic update), remote management, payment options, video/photo-Email.
See also: security software, cyber cafe software, photo mail software, video mail software, touch screen, credit card payment, bill acceptor, coin machine, pay per use, kiosk software, kiosk, public computer, internet monitoring, public access terminal, internet kiosk, internet terminal
Utility which makes it easy to create secure MS Access Databases, follows recommended approach SECFaq. It encrypts and removes recognised weaknesses (admin user rights, ownership, permissions, creates super user) and creates workgroups. Other features: assigns passwords (database, super user, admin) import tables from other databases, produces Jet Connection string. MS Access 2000/2003 format. 30 day money back guarantee, 30 day trial.
See also: tables, append, Connection String, Jet, admin, passwords, Access, encrypt, mdb, security, database, secure, users
Internet Deadbolt 6.0
?The Internet Deadbolt is more than security software. It allows network administrators, and upper management to get control of their corporate networks by restricting employees downloading of software that may have viruses or worms,? said Anthony Johnson, president of ICC Software. ?It has been on the market since 2002. It?s currently in use in banks and financial institutions to help increase security. ?
See also: administering, monitoring employees, monitoring, network, network monitoring, access control software, monitoring software, network security, Internet Deadbolt, internet, control, download, activity recorder, password, secure, protect
WinLock Professional 4.42
WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer, disable Windows hot keys (such as Alt-Ctrl-Del, Alt-Tab, Ctrl-Esc, etc.), lock Windows desktop, hide the Start button, lock files and folders, filter Internet content and much more.
See also: security, password, lock, access
Mouse Lock 1.64
Mouse Lock is a Windows based application designed
to prevent unauthorized use of your computer.
The program simply traps your mouse inside a small button.
Your computer can trap or free the mouse at specified time.
You can to do it handle too.
Mouse Lock disables special key combinations such as ALT_TAB,
CTRL_ESC, CONTROL_ALT_DELETE and others.
The program has protection from rebooting and reseting
your computer.Mouse Lock can turn of
See also: mouse, lock, access, security, control
File Lock 7.1
File Lock is a secure software that can lock and/or hide your files, folders and drives. It can prevent access to any of your files, folders or drives. File Lock also supports to hide files and folders, to make them complete invisible. The locked items will be denied access,move and deletion, the hidden items will not be found by any program or the Windows Explorer.File Lock supports all NT-base Windows system included Windows NT/2000/XP/2003.
See also: lock, hide, folder, file, drive, security, privacy, confidentiality, hide folder, deny, access
VeriFinger Standard SDK Trial 5.0
Multiplatform fingerprint identification SDK. Based on reliable fingerprint recognition technology with matching speed up to 40,000 fingerprints per second. Supports more than 20 major fingerprint scanners and sensors on Windows, Linux and Mac OS X. Includes programming samples in C, C++, C#, Sun Java 2, Visual Basic 6, VBA and Delphi 6. The trial requires constant internet connection and Microsoft Visual C++ 2005 Redistributable Package (x86).
See also: fingerprint, SDK, recognition, identification, matching, verification, biometric, biometrical, Mac, Linux, Mac OS, security, scan, authentication, logon, access control, attendance control
Internet Booth 6.2
Internet Booth software enables to you to convert any of your PCs (old or new) into a PC dedicated for the Internet Browsing only. You do not have to worry about anyone changing setting on this PC, since only you, the master, will be able to make changes to your public Internet Booth PC. Once the software is installed and properly setup, you could place your PC into a public spot, such a your store, your coin laundry, public library.
See also: access, protect, internet, security, control, lock, screen
Professional security software enabling you to password protect folders and files with encryption. Maximum efficiency with 6 encryption algorithms available
See also: password, protect, folder, file, encryption, access, control, security, privacy
Safetica BUSINESS 3.1.5
Your staff can threaten security of sensitive corporate data. Firewalls and antivirus software do not protect you from internal threats. Protect yourselves from data leakage from corporate computers and disks. Gain control over the staff?s access to sensitive data and increase their working attitude by monitoring their activity. Save access data safely and do not allow spyware to log your passwords. Administer your company?s security centrally.
See also: security, encryption, shredder, disk encryption, activity monitoring, parental lock, access block, usb lock, pc lock, application lock, usb token, password manager, key manager, privacy, private key, secret, secret key, protection, public key, DLP
Mobilegov Winlogon 2.59
Mobilegov Winlogon can change a simple USB key into a security token in order to access to your Windows session while suppressing your "Login / password". It provides the strong authentication required by the highest-security web site With its (optional) PIN code,. It works like an ignition key and opens the session only if the key is connected. Removing the key locks the Windows session.
See also: start, lock, Windows session, USB, USB Key, Access Computer, Token, Windows Security
ADUC CollectAdmin 22.214.171.124
ADUC CollectAdmin is a powerful tool that helps you retrieve file system rights from file servers across your network from behind your own workstation.
See also: Active Directory, File System, Get Remote File System Rights, Access Control, ACL, ADUC, network, networking, database, security, inventory, management, frontoffice, administration, network administration, consultancy, front office