computer in Access Control downloads

LogonExpert

10.5 download

... a Windows autologon www.logonexpert.com tool for your home/office computer or corporate server. LogonExpert quickly and securely logs ... logon/logoff to specified time, date or periodicity. Your computer can be protected even after automatic logon by ...

BlockSmart

1.0.2.8 download

... to setup! Simply install the software on the computer you wish to monitor then control the settings from any computer in the world! All you need is an ... you never have to go back to the computer you wish to monitor once the software is ...

ScreenBlur

2.0.12 download

... enable or disable the locking option when the computer is idle. If you can translate ScreenBlur, the tools required for the process are provided with SB. ScreenBlur is ...

GiliSoft USB Lock

10.5.8 download

... the whitelist will be allowed to access your computer, while others will be blocked automatically. Reports and Logs: Look for security software that provides comprehensive reports and logs of USB ...

File Lock for Mac

1.0.0.4205 download

... use software to protect your files on Mac computer. It provide an easy way to hide your ... invisible, no one can find them on your computer, and you can switch the Visible/Invisible status just ...

WinLock

9.1.7 download

... comprehensive security software for personal or publicly accessible computers running all versions of Windows from 2000 to ... authorized people can access sensitive information on your computer. This security tool allows you to restrict your ...

Hotspot Shield

12.7.3 download

... with Hotspot Shield. Standard antivirus software protects your computer, but not your web activities. 100% Security ... Sites (Trojan sites deliberately created to infect your computer with malware.) Illegal or Phishing Sites (Sites ...

Spysure Home Version

2.0.4 download

Spysure puts parents in control of computers in their homes. Monitor what your children are doing on the home computer – in detail – and protect them from online threats. Being aware of your childrens computer habits is the first stage in protecting them. ...

Control Internet Access

1.318 download

... for monitoring and restricting internet access on a computer. CIA is effective, simple, and easy to use. ... employers control activities that lower productivity. - Monitor Computer use. You check whats been happening on the ...

Hide & Protect any Drives

3.06 download

Hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop ...

Access Manager for Windows

10.02 download

... applications only, control Internet usage, view statistics of computer use by your kids or employees and loads more. This program can lock your computer and ask for a password when Windows loads. ...

1 Click & Lock

3.498 download

1Click & Lock up is a system tray security utility you can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define ...

Best Network Security

3.32 download

... becomes absolutely hassle-free. You just connect your administrator's computer to the net from any place and remotely change security settings, upload and execute patches as well as schedule reboots, shutdowns, ...

ComputerTime

4.2.0 download

ComputerTime is parental-control software that lets parents set limits ... the time-of-day when their children can use the computer and Internet. SoftwareTime believes that the computer is an amazing tool for children, both for ...

Child Control

24.3340 download

... time your kids spend in front of the computer. Once their time is up, the computer automatically shuts down and won’t start up again—something ...

Internet History Wiper Utility

4.0.1.5 download

... history application securely destroys all evidence of your computer usage index.dat files, recent documents. Utility removes windows ... Program is easy and safe to safeguards your computer privacy. * Internet explorer eraser software permanently removes ...

Free Hide Folder

3.5 download

Most everyone has files or folders on their computer that they do not want to share with ... to you. Free Hide Folder is a free computer security software to hide your private folders. It ...

Steganos Internet Anonym VPN

2.0.6 download

... you knowing it) install tracking software on your computer that captures statistical data about you. All this ... Bit SSL secure encrypted tunnel from the user's computer to one of the Steganos servers. See "secure ...

Employee Desktop Live Viewer

13.02.01 download

... big or small, with this tool numerous remote computers connected via network can be tracked, monitored and managed for their activities. Management of remote computers being monitored includes sending instant messages, sending monitoring ...

abylon LOGON SSO Home

23.60.1 download

... more difficult. Do you have to leave the computer in the short term, you simply remove your "key" and the computer will be immediately blocked or logged. This prevents ...

Windows USB Blocker

5.0 download

... or Unblock USB Storage Devices on any Windows computer USB devices are one of the primary causes ... you to instantly block USB and safeguard your computer from these viruses. Here are the key features ...

KinderGate Parental Control

3.1 download

... allows creating clustered system of a number of computers, which can be controlled by one computer. This way KinderGate makes system administration much easier ...

Lock My PC Free Edition

4.9.5 download

... lock. The program lets you to lock your computer with a password while you leave it unattended. ... Free Edition every time when you leave your computer unattended. ...

USB Blocker for Windows

5.0 download

... or Unblock USB Storage Devices on any Windows computer USB devices are one of the primary causes ... you to instantly block USB and safeguard your computer from these viruses. Here are the key features ...

Activity and Authentication Analyzer

1.64.0.10 download

... is impossible or unwanted. As applied to the computer security topics the activity analysis and authentication is performed when it is impossible to get documents’ copies, which user worked on, ...