|
||||||
|
||
|
Home > Access levels software |
Related keywords: access, Access, access control, levels, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access |
|
|
61. | Reg Organizer 3.1 (chemtable.com) | ||
visual tree-like presentation of the configuration files contents, access to many undocumented Windows features. The program also has some supplementary functions. With Reg Organizer you can customize the 'Open with...' context menu, delete items from the 'Add/Remove Programs' dialog, specify the | |||
Updated: 2, 2006 | Rating: 0 | Author: Konstantin Polyakov | Size: 1440 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
62. | PS Tray Factory 2.1 (pssoftlab.com) | ||
to: hide low-activity icons from a system tray into menu, get fast access to hidden icons, change the order of icons in the menu, change the order of icons in the system tray (sort tray), hide from the menu seldom used icons, protect tray menu with password, minimize any application to tray, restore icons in system tray area at crash or restarting Explorer.exe, change original tray | |||
Updated: 2, 2006 | Rating: 48 | Author: Sergey Poplavsky | Size: 842 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
63. | PS Tray Factory 2.1 (pssoftlab.com) | ||
to: hide low-activity icons from a system tray into menu, get fast access to hidden icons, change the order of icons in the menu, change the order of icons in the system tray (sort tray), hide from the menu seldom used icons, protect tray menu with password, minimize any application to tray, restore icons in system tray area at crash or restarting Explorer.exe, change original tray | |||
Updated: 2, 2006 | Rating: 0 | Author: Sergey Poplavsky | Size: 842 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
64. | Access Administrator 4.14 (getfreefile.com) | ||
and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
65. | PrivacyWatcher 1.20 (managebytes.com) | ||
startup - Desktop lockout feature for preventing unauthorized access to your PC Without privacy there is no freedom. PrivacyWatcher offers you a brand new level of freedom, superior to other similar products! PrivacyWatcher is software that cleans up the history of your computer activity and protects your computer from the unauthorized access. It cleans up the | |||
Updated: 2, 2006 | Rating: 16 | Author: Mikhail Yurasov | Size: 1003 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
66. | PC LockUp 2.185 (softheap.com) | ||
time schedule and duration can be defined for each user to restrict access to your PC in definite hours. PC LockUp also supports monitor power save options and has some additional useful features like built-in password protected screen saver and network user validation feature for Windows logon to increase your security. You will find the program interface very easy to negotiate | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
67. | Network Clipboard and Viewer 1.0.0.20 (interdesigner.com) | ||
(i.e.: saves time when have to enter long codes, etc.). Easy access at any time with Win+C combination (Windows Start Key and C letter). - Enhanced Security with list of allowed computers on network, password enforced, Favorites computers access, remote users (authorized or blocked), etc. - Allows to compress remote clipboard information before transfer it to your | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Serrano | Size: 2015 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
68. | Monitor and Free RAM 1.1 (winenhance.com) | ||
if you experience slowdowns or crashes. What is RAM? Random Access Memory, or RAM for short, is the short-term memory of your computer and is used to store information about currently running programs. When a program is executed, critical data is loaded from your hard drive (or other device) | |||
Updated: 2, 2006 | Rating: 103 | Author: WinEnhance Marketing | Size: 591 kb | Shareware Go to category: System Utilities > Benchmarking Similar programs | |||
69. | Maverick Launch Centre 2.1.004 (skaro.net) | ||
and flexible launcher that can be configured to provide quick access to your documents, applications and games, etc. It combines ease of use with a myriad of features and utilities including a sophisticated alarm clock, a hex file viewer, an advanced font viewer, a file wiper (to irrevocably destroy files), a file toucher (to change dates), a file/disk profiler (to analyse disk | |||
Updated: 2, 2006 | Rating: 0 | Author: James Turner | Size: 1569 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
70. | Locked! 4.7.8 (jcmatt.com) | ||
powered off or on, Locked! securely protects your computer against access by others. It's proprietary multi-level structure integrates deeply within the Windows architecture, working with and controlling access until you unlock it with a password. Entries from the keyboard and mouse are | |||
Updated: 2, 2006 | Rating: 0 | Author: James Matt | Size: 2980 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
71. | PC LockUp 2.185 (getfreefile.com) | ||
time schedule and duration can be defined for each user to restrict access to your PC in definite hours. PC LockUp also supports monitor power save options and has some additional useful features like built-in password protected screen saver and network user validation feature for Windows logon to increase your security. You will find the program interface very easy to negotiate | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
72. | LaptopLocate.net 2.9.2 (tometasoftware.com) | ||
Tometa LaptopLocate.net is a software utility that will monitor a computer's IP address to allow server administrators and general users to locate their computer. Using cutting edge technology, each time a computer that has LaptopLocate.net is turned on, the IP address of the computer is transmitted to a | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 4839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
73. | Junk-Out for Outlook 2003/2002/2000 1.0 (theofficemaven.com) | ||
Junk-Out keeps junk mail out of your Microsoft Outlook Inbox, using a combination of statistical methods (Bayesian filtering) and information you provide, to show only e-mail messages you want to see. The more you use Junk-Out, the better it gets at distinguishing useful e-mail, and getting junk out of your | |||
Updated: 2, 2006 | Rating: 0 | Author: Mike Craven | Size: 10536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
74. | Hide Files 3.4 (hide-files.biz) | ||
Once files or folders are hidden, it is impossible to find them, or access and remove any file. Unhiding files or folders is as easy as hiding them - just one mouse click and they are visible and accessible to you again. If program folder or whole disks are hidden, itself program or Windows will | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
75. | Hide Files & Folders 2.4 (softstack.com) | ||
password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access to the file or folder | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
76. | Hide Files 3.4 (spydex.com) | ||
Once files or folders are hidden, it is impossible to find them, or access and remove any file. Unhiding files or folders is as easy as hiding them - just one mouse click and they are visible and accessible to you again. If program folder or whole disks are hidden, itself program or Windows will | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
77. | File & Folder Protector 2.33 (softheap.com) | ||
password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access to the file or folder | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 740 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
78. | EditExt 5.5b (alcodasoftware.com) | ||
Spell Check as you type, AutoCorrect as you type and easily access the Thesaurus and Definitions Dictionary. ActiveSpell underlines misspelled words as you type. EditExt can also be used as a Notepad replacement and more. New: Dictionary Update Wizard automates downloading and installing additional spelling dictionaries. Some of the benefits of EditExt include: Syntax | |||
Updated: 2, 2006 | Rating: 0 | Author: Ken Hale | Size: 11682 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
79. | Dark Files 3.3.1.1 (mybestsoft.com) | ||
can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms : 9.x/ME/NT/2000/XP . Dark Files can work with Network folders and fully supports protection of removable media (such as floppies, CD | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
80. | BlazingTools Perfect Keylogger 1.6.1.0 (blazingtools.com) | ||
Perfect Keylogger is a remote surveillance tool made specially for beginners. With this key logger you can receive keystrokes, chats, websites, screenshots and passwords from any PC by email or FTP. Remote surveillance with Perfect Keylogger - as easy as never before! Some applications of the keylogger | |||
Updated: 2, 2006 | Rating: 1445 | Author: BlazingTools Software | Size: 540 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Access levels software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|