Categories
|
Audio & Multimedia
Audio Encoders/Decoders, Audio File Players, Audio File Recorders, CD Burners, CD Players, Multimedia Creation Tools, Music Composers, Other, Presentation Tools, Rippers & Converters, Speech, Video Tools Business
Accounting & Finance, Calculators & Converters, Databases & Tools, Helpdesk & Remote PC, Inventory & Barcoding, Investment Tools, Math & Scientific Tools, Office Suites & Tools, Other, PIMS & Calendars, Project Management, Vertical Market Apps Communications
Chat & Instant Messaging, Dial Up & Connection Tools, E-Mail Clients, E-Mail List Management, Fax Tools, Newsgroup Clients, Other Comms Tools, Other E-Mail Tools, Pager Tools, Telephony, Web/Video Cams Desktop
Clocks & Alarms, Cursors & Fonts, Icons, Other, Screen Savers: Art, Screen Savers: Cartoons, Screen Savers: Nature, Screen Savers: Other, Screen Savers: People, Screen Savers: Science, Screen Savers: Seasonal, Screen Savers: Vehicles, Themes & Wallpaper Development
Active X, Basic, VB, VB DotNet, C / C++ / C#, Compilers & Interpreters, Components & Libraries, Debugging, Delphi, Help Tools, Install & Setup, Management & Distribution, Other, Source Editors Education
Computer, Dictionaries, Geography, Kids, Languages, Mathematics, Other, Reference Tools, Science, Teaching & Training Tools Games & Entertainment
Action, Adventure & Roleplay, Arcade, Board, Card, Casino & Gambling, Kids, Online Gaming, Other, Puzzle & Word Games, Simulation, Sports, Strategy & War Games, Tools & Editors Graphic Apps
Animation Tools, CAD, Converters & Optimizers, Editors, Font Tools, Gallery & Cataloging Tools, Icon Tools, Other, Screen Capture, Viewers Home & Hobby
Astrology/Biorhythms/Mystic, Astronomy, Cataloging, Food & Drink, Genealogy, Health & Nutrition, Other, Personal Finance, Personal Interest, Recreation, Religion Network & Internet
Ad Blockers, Browser Tools, Browsers, Download Managers, File Sharing/Peer to Peer, FTP Clients, Network Monitoring, Other, Remote Computing, Search/Lookup Tools, Terminal & Telnet Clients, Timers & Time Synch, Trace & Ping Tools Security & Privacy
Access Control, Anti-Spam & Anti-Spy Tools, Anti-Virus Tools, Covert Surveillance, Encryption Tools, Other, Password Managers Servers
Firewall & Proxy Servers, FTP Servers, Mail Servers, News Servers, Other Server Applications, Telnet Servers, Web Servers System Utilities
Automation Tools, Backup & Restore, Benchmarking, Clipboard Tools, File & Disk Management, File Compression, Launchers & Task Managers, Other, Printer, Registry Tools, Shell Tools, System Maintenance, Text/Document Editors Web Development
ASP & PHP, E-Commerce, Flash Tools, HTML Tools, Java & JavaScript, Log Analysers, Other, Site Administration, Wizards & Components, XML/CSS Tools |
|
Search keywords for "access control" (matching exact)
|
|
|
All In One Keylogger 4.0
Invisibly records every activity(web,chats, emails, screen-shots, keystrokes, passwords, microphone) on your computer. Now you can spy on your children,employees, monitor school labs... Away from home, It can even send you the logs by email.
|
|
All In One Keylogger
|
2015-09-01
|
Download
|
|
|
Axence nVision Pro 7.5.5.17498
Comprehensive network management: network monitoring and visualization; hardware and software inventory (license audit, fixed assets); user monitoring; data protection; helpdesk (trouble ticket database, chat); alerts, reports, corrective actions.
|
|
Axence
|
2014-12-05
|
Download
|
|
|
All In One Keylogger 3.9
Invisibly records every activity(web,chats, emails, screen-shots, keystrokes, passwords, microphone) on your computer. Now you can spy on your: children,employees, monitor school labs... Away from home, It can even send you the logs by email.
|
|
Relytec
|
2014-09-22
|
Download
|
|
|
Web Site Zapper 9.2.0
Web Site Zapper closes Web browsers displaying undesirable Web sites. It can be used either for popup control, or to control Internet access. It can either close down any site on the bad site list, or close down any site NOT on the good site list.
|
|
Leithauser Research
|
2012-12-21
|
Download
|
|
|
Ez Content Control 4.5.4
Protect your child or business by restricting access to any Website Url such as Adult Content, Business competitors or Job Search Websites. BLock access to programs you don't want your child ot employee to run on a computer. Receive activity reports.
|
|
IT Works Corporation
|
2012-01-05
|
Download
|
|
|
Restoret 9.1
Restoret is a PC security software which provide user to Recover deleted files,Restore system from crash,Create an image of their system,Protect from data loss or thieves,Prevent unauthorized access, Allows user to restore PC to its happy times.
|
|
Balhanuman Impex Private Limited
|
2011-10-19
|
Download
|
|
|
IEProtect 3.03
Password protect access to selected websites on your PC. All you have to do is to select password and a list of protected websites. When a site is protected other computer users will be asked to enter a correct password in order to view its contents.
|
|
IEProtect
|
2010-11-07
|
Download
|
|
|
Steel USB Sentry 2.0
Steel Usb Sentry controls usage of portable storage media such as iPods, USB Sticks, Usb hard drives. Network USB sentry effectively prevents users from introducing malicious programs, pirated softwares and other un-authorized data in the network.
|
|
SteelSonic Technical Services
|
2010-02-26
|
Download
|
|
|
Program Sentry 2.1.0
Provides access control and usage management. Allows you to either create a list of blocked programs or a list of allowed programs. Individual programs can be password protected.
|
|
Leithauser Research
|
2009-02-20
|
Download
|
|
|
Beyond Keylogger Spy 3.103
Invisibly records every activity(web,chats, emails, screen-shots, keystrokes, passwords, microphone) on your computer. Now you can spy on your: spouse, children,employees, monitor school labs... Away from home, It can even send you the logs by email.
|
|
Beyond Keylogger
|
2008-10-31
|
Download
|
|
|
TupInsight 3.2
TupInsight uses one computer on a local area network (LAN) not only to monitor and record other hosts' web behaviors, but also to restrict online activities according to customized filtering Internet policies.
|
|
The Tup Software Ltd.
|
2006-11-14
|
Download
|
|
|
Dekart Logon for Lotus Notes 1.02
Protect access to Lotus Notes with smart cards, USB disks and biometrics. Dekart Logon for Lotus Notes performs high level user authentication, ensuring that only authorized users can access Lotus Notes data and resources.
|
|
Dekart
|
2005-01-17
|
Download
|
|
|
Program Selector Pro 98/ME 4.3
Replaces standard Windows 95/98/ME user interface (task bar, Start button, and icons) with user-configurable password-protected list box of program names. Individual programs can also be password protected. Provides access control for your computer.
|
|
Leithauser Research
|
2001-04-12
|
Download
|
|
|