Lock My PC 4.0
According to IT specialists reports, the majority of electronic data theft crimes happen due to improper protection of computer systems from the inside. Co-workers and even our spouses can easily recover any bit of information simply by looking at the screen of an unattended machine. Lock My PC acts like a guard on duty, protecting your PC from prying eyes. Try it today for FREE and actually relax!
See also: lock, computer, access, control, password, security, locker, locking, block, protect, stealth, screen, mouse, parental control, desktop
Anyplace Control 2.12
"Anyplace Control" is a remote control program that can display a screen of another computer (via internet or network) on your screen. The program allows you to use your mouse and keyboard to control the other PC remotely. You will even be able to transfer data between computers. It means that you can work on a remote computer, as if you were sitting in front of it, right from your current location.
See also: vpn, administration remote secure, anyplace control, vnc, remote desktop, helpdesk, help desk, pcanywhere, terminal server, remote access, remote computer, remote control, remote screen, remote control internet, access remote desktop, remote networking, data transfer, data exchange, transfering
ShareAlarmPro is a network tool that allows network administrators and users easily perform a shared folders and resources monitoring. Using ShareAlarmPro you can monitor users attempting to access secured shares and confidential files, detect and log network access to shared folders, monitor security events, monitor accessed files, disconnect users from open files or deny network users access, monitor sharing permission changes.
See also: security events, security software, computer security, event log, intrusion detection, network security, free network monitor, free monitor, network monitor, monitor, monitoring, system monitor, network monitoring, network protection, network access, alert, alerting
Program Selector Pro 2000/XP 4.9
Program Selector Pro provides access control and usage management. Replaces standard Windows 2000/XP user interface (task bar, Start button, and icons) with user configurable list box of program names. Supervisor password is required to add programs to the program list box. Administrative level password is required to restore the original Windows interface. Programs can also be individually password protected. Virus protection included.
See also: password protection, access control, computer security, lock desktop
Program Selector Pro 98/ME 4.3
Program Selector Pro provides access control and usage management. Replaces standard Windows 95/98/ME user interface (task bar, Start button, and icons) with user configurable list box of program names. Supervisor level password is required to add programs to the program list box. Administrative level password is required to restore the original Windows interface. Programs can also be individually password protected. Virus protection included.
See also: password protection, access control, computer security
Canary Standard 2005.01.28 (11)
Discover how this monitoring program will help you monitor what your child does when using the home computer (programs run, files printed, programs installed,...), and while surfing the Internet (web sites visited, files downloaded, emails sent,...). Each order comes with a FREE report that contains more than 30 vital parenting principles that, together with Canary, will enable you to develop a more open relationship with your child.
See also: internet monitoring software, computer monitoring software, computer parental control, internet parental control, internet access monitor, internet monitoring, computer monitoring, cattle ramp software
WirelessMon 2.0 enables a person to detect and monitor Access Points (AP) on any wireless (WiFi) networks within range. The program provides substantial information including whether an AP is secure (or not) and its availability for use. A live channel usage chart helps identify potential interference problems. Users of the Professional Edition can generate signal strength coverage maps by either manually plotting points or using a GPS device.
See also: free, monitoring, testing, download, computer, laptop, performance, test, graph, channel, signal strength, access points, lan, wireless, 802.11, hot spots, Wifi
Shared Monitor 1.0
Shared Monitor is an advanced shared resource monitor and logger. The program sits in your system tray and constantly monitors all the Microsoft Network connections. It allows you to monitor active connections to your resources and browse the historical data. In addition, you can generate HTML reports, set alerts on specific events (for example, when a new computer connects to your resources) and run the program automatically on Windows start.
See also: network monitoring, network monitor, network security, system monitor, computer security, security software, network protection, network access
A parental control software program, gives you complete control over your child's use of the computer: when he or she can use it for entertainment, and when for doing homework. It enables you to restrict the times when the computer can be used, and to set the times that your child may surf the Internet, play games, use particular programs, and watch movies.
See also: game control, internet schedule, pc control, computer use, computer access, schedule computer time, time control, control computer time, parental control
Children Control 1.7
Allows you to control access to PC, Internet sites, programs and system functions. A choise #1 for parents who don't want wheir children play for hours in games, navigate on bad sites, launch unallowed programs or crash an operating system.
This program can be protected by your password so nobody else can't use it.
It's VERY EASY to use so you will be amased by simplicity and functionality of this program!
See also: locker, IE Lock, lock computer, access control, program access
Personalwatchdog introduces unique features regarding privacy protection and data security: encrypt folders using the AES encryption algorithm; control your computer access at windows login or unlock; configure additional security passwords for your user account; remove safely temporary files and clean the recycle bin in an irrecoverable way; configure key sequences for protection on demand; safely remove evidence of your work at computer exit.
See also: privacy protection, data security, top-class protection, exclusive security features, on-the-flight encryption, DOD5020.22-M safe remove algorithm, AES encryption algorithm, computer access control, safe access password, remove evidence
Remote Desktop Control 1.71
Remote Desktop Control allows you to control any remote computer from another computer. Such task is no longer just for network administrators, now you can have the same control. Imagine, you can work on your office computer right from your home computer without leaving the house! You won't even have to leave your cozy chair :) Try Remote Desktop Control and you will gain incredible mobility and save time too!
See also: remote pc, remote desktop, remote connection, remote computer, remote access, access computer, aquatra
Radmin Remote Control 3.0
Radmin is fast and secure remote control and remote access software that enables you to work on a remote computer as if you were sitting right in front of it and access it from multiple places. Radmin includes Windows Vista support, file transfer, multi-user text and voice chats, Windows security, Kerberos authentication, 256-bit AES encryption, telnet access, multiple monitors support and unique DirectScreenTransfer technology.
See also: remote, control, access, administrator, computer, help desk, network, remotely, support, vnc, system, solution, server, security, secure, radmin, management, fast, desktop, client, administration
Computers Hall 3.21
Complete solution for management and automation of work of computer clubs, Internet cafes, cyber cafes, gaming centers. Main goals: control of the paid time, control of the work of managers. The computers are locked if the money were not paid for the work with them. Advanced reports, well protected from changing. Simplification of managers work. Multi-language interface: English, Russian, Ukrainian, German, Lettish, Lithuanian are available.
See also: computers hall, computers club, game club, Internet club, Internet cafe, cyber cafe, ComputerZal, automation, management, cyber cafe software, cybercafe software, internet timer, computer timer, public access, software for internet cafes, cybercafe, timing, billing
AdminToys Suite 1.1
Allows you to manage processes remotely, monitor computers performance on your network, track and limit disk space usage on remote machines, synchronize computer clock all over your network, perform a planning restart/shutdown of network computers, execute commands remotely on a group of computers or in the entire domain, configure network adapters remotely, dump your network computer's statistic to CSV, TXT or HTML. Find 13 network tools inside.
See also: admin tools, administration utilities, network tools, remote administration, remote access software, remote management software, central administration, remote access, remote management, remote control, pc administration, computer administration
LAN on Internet 2.0
LAN On Internet is a Peer-to-Peer connectivity software which makes your existing LAN applications including RDP, NetMeeting, Gaming applications etc to work over internet.Now you can make direct Remote Desktop connection to your office PC from home computer with the invitation created from the office computer.Likewise, joined users can host/join multiplayer games.
See also: Remote access, Game hosting, peer to peer, office computer access, multiplayer gaming, netmeeting
Time Monitor 1.0.6
Time Monitor v1.0.6 for Windows is parental control software designed to limit the time your kids spend using a computer. Time Monitor puts you in control of deciding when they can log in and for how long. Time Monitor is easy to use, free to try, and runs on Windows XP, 2003, and Vista.
See also: limit, computer, time, parental, control, access, logon, logoff
Card Recovery 184.108.40.206
Flash drive information retrieval application is well known and widely used program which provides backup and recovery of different types of files or folders which has been lost due to logical errors, human errors and software and hardware malfunctions. Freeware memory card data recovery software is supported by various types of major Windows operating system versions such as Windows 7, 2000, 2003 serevr,2008 server, ME, NT, XP, VISTA etc.
See also: Card, memory, data, recovery, digital, storage, media, access, mass, drives, files, folders, devices, delete, USB, cameras, system, computer, secure, complete, formats, multimedia, lost, images, recovers, laptop, mobile, phone
LanAudit Employee Computer Monitoring 2.84
Keep your employees on task and save money otherwise wasted by inefficient workers with LanAudit Employee Computer Monitoring now. PC-Monitor is employee computer monitoring software that invisibly monitors your entire network from one central location! It is an all-in-one Employee Computer monitoring software for real-time network computer monitoring, employee activity monitoring, content filtering and employees' work time tracking.
See also: Hardware Inventory, software Inventory, Data Loss Prevention, Document Operations, Stop Data leakage, Application Control, Web Access Control, Employee Computer Monitoring, Employee Monitoring, Computer Monitoring, Remote Control, Remote Install
Business Management Software 220.127.116.11
Company www.employeesalarysoftware.com recommends advance quality Business Management Software to schedule business organization tour and training requirements in real time. Employee management software is capable to maintain multiple company tour and training reports at single place.
See also: Business, management, manage, multiple, company, database, records, tour, training, employee, name, designation, department, reports, generate, computer, prepare, time, table, prevent, unauthorized, external, user, access, managers