Software Downloads | Home | Submit | Latest News | Category | Contact us |
Search for Restrict User Control 2007 5.1 in Salfeld Computer User Control allows you to block any undesired window title or any application / EXE-file. On the Internet you can define exactly which contents shall be allowed and which not. You can also explicitly allow only authorized applications and/or Internet addresses. Block the varied Windows systems areas (such as system control, setting on start menu, downloads from IE, Windows settings, etc.) with just a few mouse clicks.Child Control 2007 9.51 in Salfeld Computer The most optimal parental control for all Windows-PCs (incl.Vista). Set time limits for the PC and/or the Internet and block/filter unwanted Internet contents. Limit access to internal Windows components and personal folders. A protocol informs you at any time as to what happened on your computer and when. Access is protected via password. Several safety steps for young computer freaks that are too smart.Network Files Search Software 7.0 in Data Recovery Reviews LAN Search Pro is a powerful utility for fast file searching across your LAN. You can search for specific file names or for files of a certain kind (e.g. all MP3 files). LAN Search PRO provides a lightning fast search engine and includes the ability to search hidden network resources, restricted access resources, IP subnets and much more.Network Files Search Tool 7.0 in Data Recovery Reviews LAN Search software is a easy to use and powerful utility for finding specific or certain kind (e.g. all MP3 files) of files. You can search for any kind of file including MP3 with help of Network file search utility. Search software includes the ability to search hidden network resources, restricted access resources, IP subnets etc and provides a lightning fast search engine.Access Boss 1.0 in Access Boss Software Attempting to understand how the inside magic of Windows administering works may be a challenging task even for an experienced administrator. Needless to say, smaller companies that cannot afford hiring a dedicated tech guy to manage administrative rights on corporate network PCs are becoming victims to this circumstance. Introducing Access Boss, the unique easy-to-use tool that enables person in charge of access rights restriction in corporaSpytech SpyLock Secure Desktop 1.0 in Spytech SpyLock Secu Software SpyLock is a secure desktop lockdown system that allows you to quickly and securely lock your PC down while you are away. SpyLock logs away messages from visiting users, invalid access attempts, and has a variety of access restrictions for your useSecure Folder(For Windows2000/XP) 1.0 in Secure Folder(For Wi Software Folder Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only ,preventing modification or deletion by other users or programs. The program can also lock Floppy, CTime and Attendance (500+ Employees) 1.0 in Time and Attendance Software This package is geared towards monitoring employee attendence and to enforce security in security sensitive areas. By this we mean the software will restrict access between certain hours via electronic locks which work in conjuction with barcode/magnetic strip readers.The reports and charts give at a glance attendence on any given day , month or year. From the charts one can diagnose trends and determine most/least productive time intervals. ThePC TimeCop 1.0 in PC TimeCop Software Restrict how much time each user can access the computer in any given day, week, or month. Control when applications can be run and by which users. Monitor web sites visited, keyboard strokes and periodic screen shots. Three levels of security to help enforce the rules that you set. FREE Upgrades! As features are added, you can enjoy the benefits without having to purchase an upgrade. No monthly subscription fees.Easy File Protector 1.0 in Easy File Protector Software Easy File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable, unTiger Creep Hide IP 1.3.36.3 in Tiger Creep Hide IP Hiding IP address is a must have for keeping your privacy on the web. Don't let anyone to track you using IP address - information pointing directly to your home door. Hide IP address with simple to use anonymity tool - Tiger Creep. Program runs on Windows systray and provides very fast and convenient way of hiding IP address - just one click to hide IP and surf anonymously. Install Tiger Creep today to avoid privacy problems tomorrow!KDT Site Blocker 2.0 in KDT Soft. Fully Functional website blocker. Easy to use, filter and modify access to specific websites. This software comes complete with an installer, uninstaller, and easy-to-use instructions of how you can gain full control of your computer. KDT Site Blocker is fully compatible with all internet browsers.Unrest 1.0 in Matt Parnell.com Removes restrictions from limited user accounts, and is modifyable to fit needs, for spyware removal (get access to regedit again), deletion of registry keys, etc.HSLAB Free Logger 3.4.25 in Handy Software Lab The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and usings removable media. Using this software to become possible to receive the information about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole.HSLAB Free Logger 3.4.25 in Handy Software Lab The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and usings removable media. Using this software to become possible to receive the information about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole.
|