|
||||||
|
||
|
Home > Restrict software |
Related keywords: restrict access, restrict server access, restrict connection, restrict IE, restrict logon, restrict logon time, restrict logon hours, Time Restrict |
|
|
81. | RelayFax Server 6.7.0 (files.altn.com) | ||
RelayFax is a powerful email-to-fax and fax-to-email fax server. RelayFax Pro automates the process of sending, receiving and managing your network fax traffic. By integrating into existing email systems, RelayFax provides full faxing capabilities from your desktop. This fax software will prove cost effective | |||
Updated: 2, 2006 | Rating: 16 | Author: Arvel Hathcock | Size: 12132 kb | Demo Go to category: Communications > Fax Tools Similar programs | |||
82. | Search Engine Promotion Tools 6.0 (searchenginepromotiontools.com) | ||
Search Engine Promotion Tools totally automates your search engine marketing. Everything's included: automatic search engines submission scheduler, meta tag generator, link checker, web ranking, keyword creator, doorway page generator, link promoter & keyword density analyzer! This easy to use software | |||
Updated: 9, 2005 | Rating: 0 | Author: Don Schnure | Size: 447 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
83. | SearchEnginePromotionTools 6.0 (aidsoft.com) | ||
Search Engine Promotion Tools totally automates your search engine marketing. Everything's included: automatic search engines submission scheduler, meta tag generator, link checker, web ranking, keyword creator, doorway page generator, link promoter & keyword density analyzer! Search Engine Promotion | |||
Updated: 3, 2005 | Rating: 0 | Author: Don Schnure | Demo Go to category: Network & Internet > Other Similar programs | |||
84. | Secure Browser 1.72 (tropsoft.com) | ||
Secure Browser offers the administrator the ability to control where the user navigates on the internet through the use of key words and specified URLs. Secure Browser has many security features like locking down or controlling other browsers and the ability to make itself the only allowed application. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 570 kb | Demo Go to category: Network & Internet > Browsers Similar programs | |||
85. | Telconi Terminal 1.01 (telconi.com) | ||
Telconi Terminal is an unique network management application with interactive full-screen configuration editing, browsing, help facility support, debugging and more. It focuses on common Cisco IOS functionality present with any hardware or software configuration and complements the command line interface with | |||
Updated: 9, 2005 | Rating: 16 | Author: Axel Bauer | Size: 2555 kb | Demo Go to category: Network & Internet > Network Monitoring Similar programs | |||
86. | WysiPad 2 Browser Based HTML Editor 2.0 (alagad.com) | ||
You get to choose if your users can add links, images or tables. Restrict your users from changing font colors, or enable it as you choose. You have the choice to give your users access to edit the generated HTML source, or you prevent them from ever seeing it. WysiPad 2 uses your Cascading | |||
Updated: 9, 2005 | Rating: 0 | Author: Doug Hughes | Size: 2517 kb | Demo Go to category: Web Development > HTML Tools Similar programs | |||
87. | KeyRobot 5.0 (keyrobot.com) | ||
Login Helper: Logins? Ids? Passwords? Account numbers? Forget about 'em! The KeyRobot remembers it all for you. If you're asked to fill in a login name and password, the KeyRobot pops up and asks if you want it remembered. After that, the KeyRobot will automatically log you in every time you come to that | |||
Updated: 3, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 2300 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
88. | PC Security 6.4 (tropsoft.com) | ||
Folder Lock, System Lock, Internet Lock, Shortcut/Program Lock, Restricted System, Window Lock, intruder Detection with Alarm, Flexible and complete password protection and Drag and Drop support. A very powerful and easy to use protection utility. Lock down your system like never before. Exercize total control over your computer: Explorer Control, File Lock, Folder Lock, System Lock | |||
Updated: 9, 2005 | Rating: 18 | Author: Silvio Kuczynski | Size: 1100 kb | Demo Go to category: System Utilities > Other Similar programs | |||
89. | STS Pinger 1.2.1 (softexsolutions.com) | ||
Network Neighborhood not working properly? Want to do some advanced network searching? If so, you need the STS Pinger. The STS Pinger is a useful network utility for finding computers on or off your network. Just set the IP value range you would like to search and put the STS Pinger to work. The full | |||
Updated: 8, 2004 | Rating: 42 | Size: 173056 kb | Demo Go to category: System Utilities > Other Similar programs | |||
90. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
Automatic inventory. Vidamic Netlog is a smart inventory program that automatically generates a completed inventory card for each computer/client. Upon initial log-in, users are requested to provide the system with the following information: Your Name, Room or department, Computer Brand, ID-Number. Vidamic | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > Restrict software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|