Access Control

Internet Access Scheduler 2.0

Internet Access Scheduler 2.0: A firewall with user-level access controls for Windows 9x/Me. Internet Access Scheduler (IAS) is a firewall that offers user-level access controls for Windows 9x/Me. IAS enhances the standard Windows access management and once installed, administrators can assign permissions to TCP/IP connections. Internet Access Scheduler lets you control which users can access what TCP/IP based protocols (HTTP, FTP, SMTP, POP3, Telnet, etc.) on a local computer, depending on the time of day and day of the week.

SentryPC 2.20: Spytech SentryPC Secure Filtering, Monitoring, and Access Contro
SentryPC 2.20

Spytech SentryPC Secure Filtering, Monitoring, and Access Control SentryPC enables you to control, restrict and record access and usage of your PC. You can control how long, and when users are allowed to use the computer, prevent the use of specific programs, block access to certain websites, restrict access to Windows functions, and more. In addition to access control, the program can also record all user activities, including keystroke

spyagent, recorder, internet monitor, keylogger, surveillance, parental control, spyanywhere, netvizor, network surveillance, pc monitoring, employee monitoring, activity recorder, keystroke logger

Internet Administrator for Microsoft ISA Server 2.6: 'Internet Administrator' - Total internet access control at the enterprise
Internet Administrator for Microsoft ISA Server 2.6

control and manage internet access and provides: - all-round internet monitoring; - incoming traffic, time and bandwidth control; - access control to web sites, by protocols, time, queries, words, etc.; - flexible and powerful content filtering; - URL category database with more than 3 000 000 web sites; - more than 10 reports visually showing internet usage statistics; The "Internet Administrator" software provides the all-round internet access

internet statistics, web filtering, content filtering, traffic control, internet monitoring, internet access control

No Image
CD Access Control Professional 1.0.1

CD Access Control Professional checks all inserted compact disks againts a set of rules. these rules determine whether the disk is allowed to be run or ejected from the system. When a CD is ejected a message is displayed. Schedule when a disk can be used by hour or by day. Ideal for Schools, businesses or simply at home, where restriction of CDRom Access is required. Colour coded icons to show when a disk is Blocked/Allowed or semi blocked.

access, professional, control

BPACLer View all allow and deny access control entries from the ACL .

access control list (ACL) (user and group permissions) and owner information. BPACLer eliminates the tedious process of selecting a file or folder object and having to browse through each individual access control entry (ACE) to see the effective permissions for different users and groups (trustees). Through the ease of an explorer like interface, BPACLer quickly displays all allow and deny access control entries (ACE) from the ACL for a selected

entry, system, access, file, permission, folder, administrator, security, control, list

No Image
FaceCode v - 2.0

access control software FaceCode gives you complete access control to your PC like no other product before. Specially designed to prevent children, family members, co-workers and other workstation users from gaining access to your computer, FaceCode is the only product that can ensure the real identity of the user. Using a simple web-camera and without the need to type in username or password FaceCode is the perfect user friendly access control software

protection, logon, face recognition, biometrics, log on, password, security, user, access control

Advanced Security Level 7.6: The Internet security, computer security and access control software!
Advanced Security Level 7.6

Secure your PC and restrict access to it with Advanced Security Level. It gives you an excellent administrative support to control the users access rights for your computer by setting up the desired access control level for each user. You can restrict access to Control Panel applets and to running specific applications; hide desktop icons, local and network drives; disable Start Menu items, DOS, boot keys, Registry editing, taskbar and much more.

advanced security level, downloads, computer security, secure internet, password protection, restrict access, software, access control, privacy

More Results: 1  2  3  4  5  6  

World IT News