|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
Executable Vaccine 4.0
Exe Vaccine protects your PC by acting as an executable file filter. It attaches to the operating system and filters all executable files, be it .exe .com .dll .drv .sys .dpl etc from all drives and all network shares against a list of files or paths, you, the administrator provide as trusted applications. If a prohibited executable (one not in the allow list or one explicitly defined in the deny list) is loaded, a customizable popup box shows up
See also: illegal software installation, aup, enforce aup, lock down, lockdown, viruses, trojans, malware, spyware, programs prevent, prevent unauthorized, messenger, kazaa, desktop security, pc protection
Exe Lockdown 4.1
Executable Lockdown protects PC?s by locking-down your existing "trusted" applications... All new exe's, introduced via any media source. (physical or removable drives, network shares, USB drives, Internet ftp etc.) will not launch unless it is listed within your administrative "Allowed" executables list. It acts as an executable white-list-filter. It filters all executable files; regardless of its file extension. .exe .com .dll .drv.etc.
See also: lock down configurations, anti-virus, block kazaa, lock-down settings, prevent unauthorized programs, prevent messenger, prevent spyware, trojans, viruses, malware, lockdown programs, lockdown pc
Install-Block allows you to require a password to be entered in order for new software to be installed on your computer. You can also prevent users from accessing any currently-installed programs that you choose, such as system tools, chat programs, games, and file-sharing applications. Access to specific websites, Windows features, and Options screens can also be denied. Install-Block is an ideal solution for parents, employers, and teachers.
See also: prevent, users, installing, programs, people, install, block, password, protect, software, adding, installation, allow
Encrypt My Information 3.01
Encrypt My Information allows you to hide folders and encrypt files with on-the-fly AES encryption. Just create one or more encrypted secure folders from local folders and move your sensitive files into these specified folders and they will be encrypted/decrypted in real-time. You can work with the files as usual, and when you finish, lock the secure folder, which will store the files securely and also hide the entire folder from view.
See also: files, hide, folders, encrypted, programs, encrypt, workers, usual, under, secure, prevent, others, my, members, malicious, information, hackers, folder, fat, family
USB Port Blocker 18.104.22.168
Network USB Data leakage Protection tool is a comprehensive USB blocker that easily prevent unauthorized possibility for accessing sensitive data from or to computer system using USB port. Software capture all detail in text format for future surveillance purpose and inform to server by beep sound. Windows network anti data-theft program easily captures plug in plug out of device even your home or office network is broken or disconnected.
See also: computer, media, flash, host, IP address, server, permission, control, administrative, network, LAN, activity, plug out, plug in, surveillance, offline, real time, drive, PC, client, access, unauthorized, prevent, blocker, port, USB
Network USB Port Disabler Tool 22.214.171.124
USB drive access monitoring software continuously tracks every USB activity and immediately inform to administrator (server) by beep a sound when any USB device is plug in plug out on LAN. Program provides option to restrict any USB port accessing device at any moment by blocking access permission of Read, Write or both on using Client PC USB port. USB port blocker shows Client PC IP address, manufacturer or storage capacity of used USB device.
See also: Network, USB, port, disabler, tool, prevent, unauthorized, access, plug in, plug out, client, PC, computer, drive, real time, offline, surveillance, activity, LAN, network, administrative, control, permission, server, IP address, host, flash, media
USB Devices Monitoring Software 126.96.36.199
USB stick activity blocker tool simultaneously blocks several USB port data storage device either network connection is established or breakdown in Local Area Network. USB data leakage prevention software can store all details of incoming and outgoing data into text or html format log file. Removable media blocker utility supports all kinds of USB mass storage device and provides beep alerts if anyone want to access without permission.
See also: USB, drive, blocker, software, monitor, USB port, activities, tool, prevent, unauthorized, files, leakage, anti data, theft, utility, windows, network, client, server, analyze, detect, block, access, removable, drives, pen drive, blocking, disabler
Software Spy 188.8.131.52
Advance keylogger application has backup facility for all generated encrypted log files at regular time interval. Reliable system surveillance spy software runs in conceal manner and even not visible in control panel add/remove program, task manager, start menu, program files etc. Cost effective keyboard key recorder program is capable to delivers all encrypted log report files at user specified email address or uploaded by FTP server settings.
See also: Invisible, system, surveillance, tool, generate, encrypted, log, file, advance, keystroke, record, spy, software, capture, screenshot, Windows, program, hidden, keylogger, utility, prevent, unauthorized, access, monitor, PC, activity, external, user
Company Purchase Order Software 184.108.40.206
Company Purchase Order Software creates business, invoice, and customer information as per details and requirements. Visit www.purchaseorder.in which refers PO tool for creation of receipt of delivery report and sales report without any technical knowledge and can send via e-mail facility.
See also: Order, management, software, generate, company, sales, purchase, receipt, detail, program, maintainer, tool, produce, customer, vendor, information, business, organization, prevent, unauthorized, person, data, backup, restore
Business Management Software 220.127.116.11
Company www.employeesalarysoftware.com recommends advance quality Business Management Software to schedule business organization tour and training requirements in real time. Employee management software is capable to maintain multiple company tour and training reports at single place.
See also: Business, management, software, manage, multiple, company, database, records, tour, training, employee, name, designation, ID, department, reports, generate, computer, prepare, time, table, prevent, unauthorized, external, user, access, managers
The Freeware SIW is a System Information tool that gathers detailed information about your system properties and settings. A utility that includes detailed specs for Hardware, Software and Network as well as real-time monitors for CPU, Memory, Page File usage and network traffic. Shows used TCP and UDP Ports. Windows 9x password retriever. Serial Number (CD key) for operating system and applications. Show Hidden Passwords.
See also: devices, key, product, bios, cpuid, processor, cpu, mainboard, graphic, internal, diagnostic, analysis, systeminfo, sysinfo, gtopala, siw, asterisks, behind, password, hidden, network, software, hardware, ports, used, tcp/ip, processes, programs, security, serial, display, free
Program Lock Pro 2.09
Lock and unlock any program on your pc, including IE, Outlook, AOL, AIM, and more. You can even lock your control panel with one button click. Other features include the ability to choose your own message to display if anyone attempts to run one of your locked programs, and also includes password protection so only you can unlock the program when you are ready to use it. Allows the entire PC to remain active and running.
See also: program, access, locking, protection, password, prevent, prevent access, secure, program lock, pc lock, program protect, lockup, lock, pc, security
KGB Free Key Logger 1.94
Free KGB Key Logger is a free keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as the caption of that window.
See also: logon, logging, logger, littlesister, Little Sister, law enforcement, keytrapper, keytrap, keystroke, keyspy, keylogwn, keylogger, keylog, keycopy, keyboard, key, government agency, grabber, gathering, internet, investigator, investigative, investigation, investigate, intrusion, interceptor, interception, intercept, intercept, intelligence, inspection, investigator, inspection, internet monitoring, intelligence gathering, industrial espionage, husband, hooking, hook, hardware keystroke recorder, hardware keylogger, hacking, hacker, hack, home security, foreign intelligence, freeware, espionage, equipment, eavsdrop, eavesdropping, eavesdropper, employee monitoring, e-mail monitoring, e-mail, email, economic espionage, desktop monitoring, data interception, desktop, computer, corporate information security policies, computer monitoring, competitor intelligence, competitive intelligence, child monitoring, cheating spouse, control, catch, capture, bugging, bug, bigbrother, Big Brother, business intelligence, background investigation, audio, access control background check, attack, accountability, access, activity monitor, key stroke, keystroke, recording, monitoring, key monitor, recorder, spy on user, keyspy, keyboard capture, keyboard monitoring, keystroke monitoring, key monitor, keystroke recording, keylogwn, keylog, key capture, keystroke capture, keystroke logging, keystroke recorder, keystroke recorder, keycopy, keyboard monitoring, keyboard monitor, keylogger stealth, keyboard logger, invisible keylogger 97, invisible keylogger, keytrap, password, passwords, password grabber, keystroke logger, password recorder, keystroke recorder, hardware keystroke recorder, Hardware KeyLogger, key logger, keylogger, spy software, military agency, monitor, monitoring, nonviral malware, nonvirus malicious programs, password, patrol, parental control, personnel security program, police, private investigator, product, program, p.i., PC, pwd, recorder, recording, surf, software, spy kids, screen capture, snapshot, snooper, snooping, snoopware, spies, spy, spy gadget, spy gear, spy on user, spysoft, spytool, spyware, surveillance, tracking, traffic, trap, trapper, trapware, Trojan, trojan, tool, utilities, video, virus, web, wife, workplace surveillance etc.
Amazing CD & DVD Burner 1.6.2
Easily burn music, video and data CDs and DVDs. Amazing CD & DVD Burner handles all drive types including CD-R, CD-RW, DVD-R, DVD+R, DVD-RW, DVD+RW, and DVD-RAM (SCSI, IDE, EIDE, and USB). Frequent tasks such as burning files, building and burning ISO files, and erasing rewritable CDs and DVDs are made easy for novice as well as advanced users. Amazing CD & DVD Burner has an innovative action driven user interface.
See also: dvd burners, free mp3 to dvd burner, free mp3 dvd burner, mp3 dvd burner, copy dvd, dvd copy, copy video, free dvd burner, burner, burn, amazing, dvd, cd, free dvd burner software, dvd burner, free dvd burner downloads, free dvd burner programs, free
Drawing Board ActiveX Control 2.0
Drawing Board ActiveX Control acts as a drawing board for creating online drawing programs rapidly. The OCX is lightweight and flexible, and gives developers new possibilities for drawing flowcharts, organizational charts, workflow, network diagrams and other business charts in a form or web page. You can custom the toolbars and template library according your requirement.
See also: diagrams application, drawing programs, flowchart activex, workflow activex, graphic activex, diagrams activex, drawing ocx, draw activex, drawing activex, drawing board, drawing online, drawing component, online board, storyboard
Unless you work with .htaccess on a daily basis the chances are you haven't got the exact syntax rolling around in your head when you need it. That's where HTAccessible comes in. It provides a simple interface for putting together some of the most commonly used Apache directives, without the need for yet another Google search.
See also: add wap support, prevent hot linking, generate, htaccess, redirects
MS Word Remove (Delete) Duplicates In Documents Software 7.0
Search and delete duplicate lines, entries, values, records, rows and numbers in any list in multiple Word files. Simply add Word files into this application and click 'Remove Duplicates Except First'. Use this product to compare and eliminate all matching, redundant data.
See also: search, lines, entries, rows, comparison, list, match data, entry, compare, entries, records, rows, search, cells, names, unique list, unique number, unique value, unique record, unique values, matching data, finder, rows, entries, records, identify data in spreadsheet, Can locate data entered, How do I prevent data in, how can i locate data in an data table, Finding and sorting data in, Finding data, Filter data in a column, finding Data in columns, Locating Data In a Spreadsheet, Find Data in Two Lists, Formula to filter out text data in a column, Deleting Data, Find data within a column, question on removing data, Sorting Data, Excel: How to delete Row data, How do I delete entries in, data, if command in VBA, Highlight data, comparing lists of data to remove data, how to check if columns contain data, Delete rows from a list in, get rid of data, Macro to delete data in row, Excluding Data, How can I sort text data in, Cells, prevent in Data Validation, Eliminate data, Reject data entries, How to Hide Data in a column, How do I delete both sets of data, using a macro to delete data (cells), Scanning for Data in a Column, tool which finds date in 2003, Values, names in, find data and copy to a third worksheet, How do I locate records in, Comparing column data, prevent data from being entered, Data within Worksheet, Duplicates in mail merge, finding and deleting data in two spreadsheets, Duplicates in Column 2000, how to deal with data rows, Can MS remove duplicates, Manipulate Data, No data in a column, values, data entry, stop data, Comparing two columns of data and flag any duplicates, Deduping entries, Extracting data, What formula should I use to compare data, Highlighting data entry, numbers in list (2000), Check rows for references, How to delete rows in 2000, display of data in columns, How do I delete rows in an spreadsheet, Removing Data, data in a cell, deleting rows with data in specified column, Removing Data, Formula to data to second sheet, How do you Stop Entering Data in a Column, Entries Isolation, comparing and deleting rows, dedata in, Checking for data, How to eliminate entries, Finding Data set in Worksheets, records in, Macro to delete data, Delete Data in a Sheet Automatically, Eliminating rows of data efficiently, Finding duplicates in a data set, How to suppress duplicates in a sheet, How to not query data, Checking for Data in Worksheets, No entries in a column using, Duplication elimination, Sorting of data in 2003, Delete data, filtering data from 2 different reports, Cell reference of data, macro to delete lines, Prevent in Data Validation, finding records, Removing rows, Chip Pearson, Deleting rows, Searching for Duplicates across columns, Column duplicates, Delete Records, Avoiding entries, Filter Data Advanced, Comparing 2 Columns for data, Comparing 2 rows for data, Records in, data in Array, matching and eliminating data, How do you eliminate cells in, remove values in an column, Filter names in an database, Duplicating Excel's Autofilter functionality, Identify and Highlight items, Search data for entries, Counting Data in a Column, Function for finding rows, Data comparison, Sort duplicates, Only Keep Non-duplicates in an spreadsheet, extracting data, Removing rows of data, Avoiding duplicates when importing from spreadsheets, Finding Duplicates - Matching Data & Copying Records, Way to delete cell contents in columns, Have rows of data, Remove names from column, Macro for Checking Spread Sheet for Entries, Extracting data from two lists, Identify & Count the number of Entries, values in, Unique data in column or row in, filter unique values, Unique and data between 2 worksheets, find rows for unique data in 1 column and different data, filter unique data using functions, Get Data - Unique Records only, - Unique Identifiers, make column data unique, List of unique data, Unique records in, Unique Data Filter Help, formatting database output to by deleting duplicates, unique data in a table, unique values, How do I count or display unique data in a column, Merging two tables based on a unique data field, how to make number unique in column, Data Sort Unique Records, Extracting unique data from a list, delete data record from sheet result, Restricting cell data to unique entries, Unique column value in, Update Data from, Combine and eliminate duplicates, Finding unique cell value after using AUTOFILTER, Unique data in column, display unique data only, cpearson, Unique Entries In a List, Unique values in a data set, Filtering Unique Records, delete entries in, Data Validation dependant and unique, Extracting unique data from a range, function unique list of entries, Counting 2 Separate Columns With Unique Data, display only unique data from a list of cells, set up a column in with unique entries, - identify and count the number of unique entries, count unique text in a column, Unique data validation, Unique numbers in a range, Finding unique items in data field, pivot tables, function that determines the number of unique records, number of unique values, validation for unique entry, Returning a Unique Result Set from a List, unique problems, Unique cells in a column, avoid record when import data from to Access, Identifying Unique Values, Restricting column in linked to require unique entries, Sorting of data in 2003, non unique data, eliminating repeated data, formula for counting number of unique cells based on, Counting number of unique ID in range excluding duplicates, Count unique values Pivot Table, Unique column value while entering data, Suppressing duplicates, How do I prevent data in, Count instances of unique item in range, How do I locate records in, comparing two list worksheet, Counting Unique Instances, Prevent in Data Validation, Extract Unique Values, How can I sort text data in, Unique Values, Repeat data, Import Unique Web Data, alter data before import, Count unique values and create list based on these values, Extracting unique numbers from a list, sort unique numbers, Unique Records, Data Filter limit, dedata in, Deleting Unique Rows from an Spreadsheet, Filtering for unique records, data sorting problem, Do Records Match, spreadsheet, table, hide
PostalCodeWorld Canada Desktop Application 2.0
PostalCodeWorld Canada Desktop is a free standalone Windows application that allows instant detection of geographical data in Canada by using Postal Code search. Users can perform 90 queries per month using Free account. Please visit http://www.fraudlabs.com for more information.
See also: postal code, credit card fraud, detect fraud, prevent fraud, order checking
Block Websites Buddy 3.37
Block Websites Buddy is award-winning website blocker for Windows XP/2003/Vista. The software is compatible with all popular browsers including Mozilla Firefox, Google Chrome, Internet Explorer (IE7,IE8), Safari and Opera. Block Websites Buddy lets you block several websites at once, backup/restore blocked websites list, protect blocker/unblocker with password. The software has predefined list of ready-to-block advertising websites. Enjoy!
See also: block websites, block website, how to block websites, blocking websites, blocks websites, block internet websites, block website access, websites blocker, how do you block websites, IE, Chrome, Firefox, Safari, Opera, XP, Vista, restrict, restricting, prevent
Hard Disk Sentinel DOS 1.00.5
Display hard disk drive and SSD health and temperature information even without starting the installed operating system. The software can be started from a bootable floppy, CD, pendrive, memory card or USB hard disk to diagnose IDE/SATA hard disks and SSD devices in the system without touching any data stored on them. Perfect tool to diagnose hard disk issues. Comes in different formats to make bootable floppy, CD, USB pendrive. Freeware!
See also: Hard Disk, Sentinel, DOS, bootable, Disk Health, data protection, disk drive, HDD, SSD, disk life, HDD Temperature, SMART, S.M.A.R.T., disk failure, data loss, prevent, prediction, predict, IDE, S-ATA, Serial ATA