|
||||||
|
||
|
Home > Access levels software |
Related keywords: access, Access, access control, levels, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access |
|
|
91. | Network Clipboard and Viewer 1.0.0.20 (interdesigner.com) | ||
(i.e.: saves time when have to enter long codes, etc.). Easy access at any time with Win+C combination (Windows Start Key and C letter). - Enhanced Security with list of allowed computers on network, password enforced, Favorites computers access, remote users (authorized or blocked), etc. - Allows to compress remote clipboard information before transfer it to your | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Serrano | Size: 2015 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
92. | Monitor and Free RAM 1.1 (winenhance.com) | ||
if you experience slowdowns or crashes. What is RAM? Random Access Memory, or RAM for short, is the short-term memory of your computer and is used to store information about currently running programs. When a program is executed, critical data is loaded from your hard drive (or other device) | |||
Updated: 2, 2006 | Rating: 103 | Author: WinEnhance Marketing | Size: 591 kb | Shareware Go to category: System Utilities > Benchmarking Similar programs | |||
93. | Maverick Launch Centre 2.1.004 (skaro.net) | ||
and flexible launcher that can be configured to provide quick access to your documents, applications and games, etc. It combines ease of use with a myriad of features and utilities including a sophisticated alarm clock, a hex file viewer, an advanced font viewer, a file wiper (to irrevocably destroy files), a file toucher (to change dates), a file/disk profiler (to analyse disk | |||
Updated: 2, 2006 | Rating: 0 | Author: James Turner | Size: 1569 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
94. | Locked! 4.7.8 (jcmatt.com) | ||
powered off or on, Locked! securely protects your computer against access by others. It's proprietary multi-level structure integrates deeply within the Windows architecture, working with and controlling access until you unlock it with a password. Entries from the keyboard and mouse are | |||
Updated: 2, 2006 | Rating: 0 | Author: James Matt | Size: 2980 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
95. | Lock My PC 3.4 (fspro.net) | ||
one-click system locking software that ensures no one but you can access your private data when you leave your computer unattended. Just press the hotkey on your keyboard or double-click the TaskTray icon to lock down your PC. Once that is done, only the person who knows the correct password may | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
96. | PC LockUp 2.185 (getfreefile.com) | ||
time schedule and duration can be defined for each user to restrict access to your PC in definite hours. PC LockUp also supports monitor power save options and has some additional useful features like built-in password protected screen saver and network user validation feature for Windows logon to increase your security. You will find the program interface very easy to negotiate | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
97. | LaptopLocate.net 2.9.2 (tometasoftware.com) | ||
Tometa LaptopLocate.net is a software utility that will monitor a computer's IP address to allow server administrators and general users to locate their computer. Using cutting edge technology, each time a computer that has LaptopLocate.net is turned on, the IP address of the computer is transmitted to a | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 4839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
98. | Junk-Out for Outlook 2003/2002/2000 1.0 (theofficemaven.com) | ||
Junk-Out keeps junk mail out of your Microsoft Outlook Inbox, using a combination of statistical methods (Bayesian filtering) and information you provide, to show only e-mail messages you want to see. The more you use Junk-Out, the better it gets at distinguishing useful e-mail, and getting junk out of your | |||
Updated: 2, 2006 | Rating: 0 | Author: Mike Craven | Size: 10536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
99. | JetStart 3.0 (codesector.com) | ||
JetStart provides you alternative methods of launching applications. Access all your programs and documents by typing few letters. You can execute system commands (e.g. Restart or Shutdown) as well or use it as a command line replacement. Place your most used information in the handy toolbar. Just | |||
Updated: 2, 2006 | Rating: 0 | Author: Jackie Ray | Size: 540 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
100. | Hide Files 3.4 (hide-files.biz) | ||
Once files or folders are hidden, it is impossible to find them, or access and remove any file. Unhiding files or folders is as easy as hiding them - just one mouse click and they are visible and accessible to you again. If program folder or whole disks are hidden, itself program or Windows will | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Access levels software |
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|