|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
The data can inadvertently go astray when a device is lost or stolen or can deliberately be carried out by those with access to confidential files. Banning these devices in the workplace is becoming increasingly difficult to monitor. As a result, more and more companies are resorting to tools that can prevent users from implementing these devices to their workstations.
See also: accesspatrol, access, patrol, access patrol, device, device patrol, power patrol, power control, device control, device block, device restrict, device restriction, device lock, device block, USB, USB block, CD block, drive block, drive access, drive r
SecrecyKeeper allows grouping data stored on workstations and servers by information security level and defines users that may access the information by users access level. SecrecyKeeper will help you prevent both accidental data leakage and intentional data theft caused by employees with access to such data. SecrecyKeeper makes it difficult for a company's IT department employees to steal sensitive data.
See also: data, information, theft, insider, employee, protect, confidential, mandatory, access, control, preventing, leakage, restriction, policy, usb, block
System USB Monitor Software 22.214.171.124
Secure USB drive monitor application tracks USB mass storage media access activities of client computers. System USB device activity surveillance program records local area network clients computer USB ports activities with their computer name, IP address, data-time, used USB information. Windows networks data theft monitor program works in stealth mode and does not show its presence in desktop, control panel and task manager.
See also: Universal, serial, port, USB, reader, device, surveillance, record, LAN, activities, change, read, write, access, permission, send, log, report, file, administrator, block, pen, drive, data, theft, monitor, card
LAN USB Controller 126.96.36.199
USB drive activities surveillance application provides real time monitoring of multiple connected external USB storage devices at client machine in windows LAN. Pen drive monitoring software support all USB media including memory card and provide instantly sound alert notification when USB connect to system and create log details of USB manufactures name, hardware ID, client machine name, IP address and USB storage capacity in text file format.
See also: USB, device, data, monitor, analyze, file, folders, transfer, block, storage, permission, display, theft, information, leakage, traffic, steal, network, protection, protect, LAN, view, port, move, store, security, record, log
CybSecure is an internet filtering and application blocking tool. CybSecure blocks access to illegal file downloads and it also provides you increased protection with its EXE and Window Blocker which will prevent the usage of mis-usable software. The Device Security feature provides you with additional protection against data theft by blocking USB and other storage devices which are a threat to company?s sensitive internal data.
See also: email filter, web security, parental control, internet security, web security, network security, application blocking, window blocking, exe blocking, Restrict window, Restrict usage of device, Device Blocking, Block USB Port, URL Filtering
USB Drive Disabler Tool 188.8.131.52
USB data theft protection application automatically maintains log file in text or HTML format and provides USB device detailed information. Software also provides facility to user to enable or disable access permission of any USB drive storage media within LAN network. USB drive disabler tool monitors multiple computer system simultaneously within local area network. Pen drive blocker utility supports all windows operating system including VISTA.
See also: USB, drive, disabler, data, theft, protection, network, store, log, record, information, move, folders, manage, security, block, file, prevent, transfer, permission, detect, local, network, monitor, port, leakage, device
USB Data Leakage Protection Software 184.108.40.206
Data theft protection tool for USB drive prevent you from unofficial data transfer through USB mass storage media. Monitoring software alerts by playing sound when any pen / thumb drive is connected at any machine in local area network. Surveillance tool facilitate administrator to block or change different access permission of USB port and log connected USB disk information with machine domain name, IP, storage capacity, manufacture details etc.
See also: steal, LAN, network, leakage, analyze, theft, protect, USB, record, permission, security, device, block, log, folders, move, data, traffic, display, view, protection, file, monitor, port, transfer, store, information, storage
USB Devices Monitoring Software 220.127.116.11
USB stick activity blocker tool simultaneously blocks several USB port data storage device either network connection is established or breakdown in Local Area Network. USB data leakage prevention software can store all details of incoming and outgoing data into text or html format log file. Removable media blocker utility supports all kinds of USB mass storage device and provides beep alerts if anyone want to access without permission.
See also: USB, drive, blocker, monitor, USB port, activities, prevent, unauthorized, files, leakage, anti data, theft, network, client, server, analyze, detect, block, access, removable, drives, pen drive, blocking, disabler
Safetica BUSINESS 3.1.5
Your staff can threaten security of sensitive corporate data. Firewalls and antivirus software do not protect you from internal threats. Protect yourselves from data leakage from corporate computers and disks. Gain control over the staff?s access to sensitive data and increase their working attitude by monitoring their activity. Save access data safely and do not allow spyware to log your passwords. Administer your company?s security centrally.
See also: security, encryption, shredder, disk encryption, activity monitoring, parental lock, access block, usb lock, pc lock, application lock, usb token, password manager, key manager, privacy, private key, secret, secret key, protection, public key, DLP
uHook Enterprise Device Control 4.4.1
uHook Enterprise Device Control lets you control and manage the access of removable media devices such as USB sticks, CDs, DVDs etc in your business network from one single place. uHook Enterprise is meant for businesses, where it is not possible to track who is copying business critical information on removable media devices.
See also: endpoint, security, usb, monitor, disk, ipods, camera, protection, device, control, dlp, enterprise, data, loss, prevention, dvd, block, protect
Blocking Software 1.0.12
Blocking Software can block files, apps, usb, folders and websites for security. PC Protection Pro is advance application to bring multiple blocking process to hide and disable access of multiple documents and extensions, run in complete hidden mode. Advance security program to blocking unwanted url and web also block usb and dvd writer so no one can take data from system. Protection software is safe and secure to do several process for secure pc
See also: Protection, files, folder, block, usb, dvd, drives, protector, secure, stealth, hide, block, blocker, blocking, application inbuilt tools, website
Port Locker (Complete Data Leak Prevention) 18.104.22.168
Corporate data security is a major issue today, and such user friendly softwares work great deal towards managing data security. These self implementing Data Leakage Prevention softwares demand mere simple clicks on the part of users, for protecting user data effectively. But, before purchasing Data Leakage Prevention software, users shall keep few things in mind. Firstly, a utility from a trusted company shall be preferred.
See also: Port Locker, DLP Software, Data Leakage Prevention, Data Loss Prevention, Free USB Protection, Protection Of Data, Data Protection Programs, Endpoint Security, USB Security Manager, Block USB, USB Blocker, Data Leak Prevention
Port Locker 22.214.171.124 126.96.36.199
Port locker is an essential data security tool, which detects and prevents data leakage by selectively blocking specific ports on your PC. It is breakthrough data leakage prevention utility which prohibits important user data from leaving a computer system, thereby maintaining information confidentiality. The tool enables a user to have complete control over all kinds of information exchange through his computer or over a network.
See also: Data Prevention, Data Leak Prevention, Data Leakage Prevention, Port Locker, DLP Software, Data Loss Prevention, Free USB Protection, Protection Of Data, Data Protection Programs, USB Security Manager, Block USB
Data Leakage Prevention 188.8.131.52
Data loss prevention tool enables you to defy all the unauthorized attempts on your precious data and information. You can now block USB and other mass storage devices for the scheduled duration to prevent them from getting access to your data. Install free data protection software to understand the usage of the data loss prevention application for.
See also: Port Locker, DLP Software, Data Leakage Prevention, Data Loss Prevention, Protection Of Data, Data Protection Programs, Endpoint Security, USB Security Manager, Block USB, Data Leak Prevention, Free data protection, Data Leakage Prevention Software
MeLite for SAS 9.10.06
Multi-Edit Lite for SAS incorporates a collection of edit macros, templates and other features dedicated to SAS, answering the need for a modern SAS IDE. Powerful editing tools along with support for over 50 languages allow you to edit within a single environment. Basic features include SAS highlighting, indention, & fast commenting. Expand keystrokes into SAS language constructs. Complete SAS integration.
See also: Code Formatter, Beyond Compare, Microsoft, Delphi, Borland, Visual Studio .net, Delphi Forum, EBCDIC, Syntax Highlighting, Programming, File Compare, Mac, Unix, Block, Column, HTML, Binary, Hex, ASCII, Editor, SAS, SAS Institute, Evolve, BSC
Delete Cookie 1.0
See also: delete cookie utility, delete cookies tool, clean cookie, block cookie, delete cookie, clean cookies tool
Super Block for Pocket PC 1.0
Thank you for using Super Block for Pocket PC, an improved clone of one of the classic games of the 80's.
Your mission is to operate the blocks while they are falling down from the top, so that each line of empty space is filled. Once one line is filled with blocks, the line will disappear and you will earn a score. You must fill the empty space with the blocks correctly and expediently, or the blocks will stack up to the top and you will lose.
See also: game, puzzle, block, super, tetris
Happy Browser 1.03
Happy Browser is a multifunctional web browser with integrated many utilities.Find anonymous,free or fastest proxy,check of proxy status,response time,country,proxy type (Transparent, Anonymous or High anonymity),import and export proxy,download proxy lists from web,IP to country,surf the web anonymously,block AD,execute script,network tools(Ping,Traceroute,Finger,Whois),external tools .Protect your privacy while staying online.
See also: multithreaded, Protect privacy, Whois, Finger, Traceroute, Ping, IP to Country, Block AD, anonymously, Surf, free proxy, Check proxy, web Browser, Happy Browser, utilities, internet
DialogDevil is three desktop automation tools in one all sharing the same interface. You drag a small icon from DialogDevil to another program and DialogDevil intelligently auto-clicks, auto-fills, or auto-positions the window when it appears again. DialogDevil blocks the annoyance of Windows error messages you do not want to see, the annoyance of having to reenter the same data, and annoyances from always having to resize application windows.
See also: utilities, stop, pop-up, popup, nags, nag, minimize, message, manager, error, eliminate, dialog, desktop, close, click, cancel, button, boxes, box, block, automatic, auto-position, auto-fill, auto-click, auto, answer, annoying, annoyance
Computer Payment Enforcer 2.0.0
Do you sell or lease computers and have customers not paying on time? Install Computer Payment Enforcer (CPE) on the computers. Input information on when payments are due. Each day, CPE displays a small screen telling the customer how many days are left until their next payment is due. When a payment is due, CPE totally blocks access to the computer until the user inputs a code. You provide this code when the customer pays their bill.
See also: block, lease, rent, limit, time, computer, lock, enforce, overdue, payment