|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
ArtistScope CD 2.0
For copy protection of content distributed by email, download or on CD. ArtistScope CD produces an encrypted archive to prevent easy extraction of content. Viewable in all Windows browsers, ArtistScope CD is ideal for catalogue and portfolio distribution. Almost anything that you can run on your web site can be run on ArtistScope CD. Features include optional password protection and expiration of the archive.
See also: protect, secure, encryption, lock, security, safe, image, page, web, internet
Internet Password Lock 2.0.0
Password protect all access to the Internet (Web surfing, Instant Messaging, email, etc.). Protect children by making sure they do not use the Internet without a parent present or lock out unauthorized Internet use on business computers. Once Internet Password Lock is installed, all Internet access is blocked when Windows starts. Input a password to access the Internet. You can then access the Internet freely until you lock the Internet again.
See also: password protect, block Internet, access, Web, Internet, password, lock Internet
Advanced HTML Encrypt and Password Protect 1.09
Advanced HTML Encrypt and Password Protect allows you to encrypt HTML pages with strong encryption algorithms and protect them with a password. The program will prevent anyone from viewing the source code or stealing your art work. Encrypted pages will have the same look as the original ones and can be viewed in all modern web browsers. This tool is a sure way to prevent others from viewing and reusing your webpage source code!
See also: lock, internet encryption, web page encrypt, HTML encrypt password protect, password protection software, web encrypt, web site, no right click, disable text selection
Watch Right 2002.0.75
Watch Right is a simple and inexpensive parental monitoring system that empowers the concerned parent with the ability to "keep an eye" on their child's online activities. Automatically log your child's AOL and AIM instant messages, AOL chatroom conversations, email messages, message board postings, and web sites they visit while online. Works invisibly in the background and resists tampering attempts.
See also: internet, auto log, auto-log, monitoring, lock, guest login, guest, instant message, ims, instant messenger, america online, aim, aol, parental controls, child, children, safety, spy, log, monitor, communications
Security Toolkit 0.6
The Security Toolkit allows you to create encrypted virtual drives, encrypt your hard drives, USB (flash) drives and CD/DVD?s. Also included is a secure file shredder, Internet & Application History shredder, encrypted password manager, random password creator, spyware remover and more. You can even create your own deletion algorithms and spyware removal routines with the fully scriptable deletion engine. Freeware for non-profit use.
See also: internet history, shred, delete, protect, lock, secure, file, folder, password manager, password protect, encrypt cd, encrypt usb, encryption, spyware, security, internet explorer, firefox history, wipe history
Remote Vaccine - Classroom 4.16.863
Remote Vaccine is a powerful yet easy-to-use networking utility that delivers robust classroom control functions. It has integrated tools that allow teachers, corporate trainers, network administrators and PC technicians to use a single product for all their professional needs. Remote Vaccine is designed to meet today's IT challenges by delivering a powerful remote control solution with zero administration deployment and centralized management.
See also: block keyboard, lock mouse, lock keyboard, broadcast, monitor, network deployment, classroom computers, remote control, block mnouse, wol, wake on lan, screen capture internet controls tcp/ip control
Drive Vaccine HNM 2.0
The Drive Vaccine HNM is a software console that allows an administrator access to all installations of Drive Vaccine (PC and Mac) from a central location. With Network Control Manager, Technicians are allowed to enable/disable the protection and broadcast updates, applications or new images. The Network Control Manager also keeps track of how many licenses are purchased, used, and available for use with Drive Vaccine.
See also: hdd sheriff, lock down, lockdown, registry mechanic, evidence eliminator, internet eraser, internet erase, workstation protection, classroom computer, desktop security, reboot, restore, hard drive, recovery genius, public access, computer maintenance
Exe Password 2004
Exe Password allows you to protect any EXE-file with its own password. In doing so, this password is stored directly in the EXE-file. It is extremely easy to add any password to a file: Just select the desired file on the desktop/in the start menu or in Explorer, choose the context menu (right mouse click), select password protection, enter password ? finished. From now on a password must be entered when the EXE-file is started.
See also: Lock, Internet, Explorer, Add Password, File Protection, Protect File, Exe Password, Protection, Password, Security
User Control 2005
User Control allows you to block any undesired window title or any application / EXE-file. On the Internet you can define exactly which contents shall be allowed and which not. You can also explicitly allow only authorized applications and/or Internet addresses. Block the varied Windows systems areas (such as system control, setting on start menu, downloads from IE, Windows settings, etc.) with just a few mouse clicks.
See also: Timer, Lock Applications, Policies, Protect Windows, Security, Security, Control, Policies, Restrictions, Internet Filter, Block Internet, Block EXE, Nanny, Filter Internet, Lock Windows, Control, Parental Control, Internet Filter, Password
Child Control 2005 7.153
The most optimal parental control for all Windows-PCs (incl. XP). Set time limits for the PC and/or the Internet and block/filter unwanted Internet contents. Limit access to internal Windows components and personal folders. A protocol informs you at any time as to what happened on your computer and when. Access is protected via password. Several safety steps for young computer freaks that are too smart.
See also: Kid Control, Education, Children, Hide folders, Lock folders, Time Restrict, Time Limit, Internet Filter, Internet Watch, Parental Control, Parental, Kids, Kid, Kids Control
Win Control 2004
With Win Control you can not only define the access rights each of your users should have, you can also protect the Windows Desktop from unauthorized manipulation. You can even define access privileges to system functionality for each user. Finally make an end to deleted or moved links, unlicensed copies of programs, unauthorized screensavers and most of the other vandalism to a Windows 2000/NT and Windows XP system users can think of.
See also: Lock games, System, secure, Nanny, Parents, Group Policies, Lock Apps, Poledit, Admins, Teacher, Power Toys, Unlock, Lock, Vandalism, 2000, Security, Restrictions, Win Control 2002, Policies, Downloads, Internet Explorer
Shadow Professional 2.5
Shadow Professional is a complete suite of tools to keep web activity, files and documents strictly private. Press start and surf web without any evidence. Make your secret bookmarks hidden, shred files, use disk wiper and have hidden and encrypted folders for your private documents. Integrated Clear history, Secret Folders, Secret Bookmarks, File Shredder, Disk Wiper, Evidence Eraser, Boss Key, Stealth Mode, Scheduler, more than 240 plug-ins.
See also: online privacy, clear, history, cache, cookie, erase, delete, privacy protection, privacy, shredder, evidence, eliminator, disk wipe, hide folder, bookmarks, tracks, password protect, lock, browser, utillity, addressbar, opera, netscape, internet exp
Internet Lock 5.0
Internet Lock is an access control and password protection software for your Internet programs, it can deny or password protect any program and connection from accessing the Internet. Internet Lock works with the "Rules" mode: you can add one or more rules to control programs and internet connections. A rule normally has such format: [Allow/Deny/Password Protect] [Program] on [Port].
See also: password protect, password protection, internet lock, internet access, internet access control, deny, allow, secure, security, access control, intranet, denied
Win Guard Pro Free Edition 6.5
Secure your computer by Password protecting your Windows programs and EXE files for Free. Plus encryption for your files, folders and drives - direct from Windows Explorer. Extra features allow you to disable Task Keys, Software Installation, Internet Explorer, Mozilla FireFox, Downloading Files, Zip and Self Extracting Files and the Boot Keys (F8).
Also available in Premium for optional fee, hence; you may see a buy link on this page.
See also: encryption, encrypt, file, files, folder, folders, drive, drives, directory, directories, dir, lock, password, protect, secure, security, block, disable, access, deny, exe, zip, app, applications, programs, dialog, install, installer, installers, installation, installations, boot, keys, internet, explorer, computer, parental, task, manager, start, menu, desktop
Folder Vault 220.127.116.11
Folder Vault file security program allowing the user to completely hide, lock, encrypt, protect files and folders in the blink of an eye. With one master password FolderVault will protect your files, folders and even entire drives from being viewed, deleted, renamed, removed or accessed. Encrypt, hide, lock folders, files, pictures, documents in a flash. Erase Clean Internet Explorer History. Software works with Microsoft Windows Vista XP 2000.
See also: Folder Vault, Hide Folders Files, Lock Folders Files, Encrypt Folders and Files, Privacy Software, History Eraser Software, Clean Internet Explorer History, Windows XP Vista 2000, encryption
Hidden Desktop 1.2
Hidden Desktop works by creating a secret profile on your computer that can only be accessed by hotkey. The software constantly monitors in the background; hiding and restoring the account when needed. Simply log off to instantly hide your files and activity (including emails, chat history and internet history). It?s extremely simple to use and ensures all activity is kept private.
See also: hidden, secret, account, cloak, internet, history, chat, erase, clean, clear, private, hide, delete, protect, prevent, safeguard, safety, safe, security, guard, lock, protective, safeguard, identity theft, confidential, discreet, eyes only, conceal, hidden desktop
Internet Booth 6.2
Internet Booth software enables to you to convert any of your PCs (old or new) into a PC dedicated for the Internet Browsing only. You do not have to worry about anyone changing setting on this PC, since only you, the master, will be able to make changes to your public Internet Booth PC. Once the software is installed and properly setup, you could place your PC into a public spot, such a your store, your coin laundry, public library.
See also: access, protect, internet, security, control, lock, screen
Network Shutdown Tool 2.1
Network Shutdown Tool can be used effectively in small office networks, and large corporate networks with hundreds computers. Network Shutdown Tool solves the problems associated with power management of computers. You can centrally turn on, turn off, reboot individual computers or groups of computers on network. Also available remove of the computer into standby, in hibernation mode. Remote locking session is possible.
See also: internet, network, remote, reboot, shutdown, stand by, lock, hibernate, power, management, WOL
ModemLockDown automatically disables Internet use until a supervisor or parent is present to grant access. You can pre-allocate automatic one-hour access blocks for individual users or permit access with limited or unrestricted time. Dialup modems are locked to halt malicious dialling. This can occur automatically when you disconnect your session. Supports Dialup, DSL/Cable and current versions of Windows.
See also: ModemLockDown, lock, disable, modem, internet access, supervise, parent control
ID Disk Protector 1.2
ID Disk Protector is a very useful program that protects your computer against unauthorized access. It allows you to protect your disk and partitions and prevents applications from running without your consent. Main features includes: protecting your disk and its partitions, boot protection, keeps private the enable/disable of your disk, blocking any operations on the hardware level.
See also: disk, drive, boot lock, harddisk, id disk protect, protect, privacy, internet, clean, erase, shield, spyware, antispyware, security suite