Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Prevent your kids, students, co-workers from using your computers at off hours. Access Boss is a great easy-to-use tool that enables you to effectively restrict access to a local or remote PC for certain users based on time factors. This program lets you set hours when access to the computer is denied and set a maximum duration of working time. When the user's time is up, Access Boss will log the user off automatically. Try it right now!
  • Desktop locking security utility to protect desktop when you are not near PC. Password protection can be automatically activated on boot or with a click of an icon in the system tray. Log access attempts and enforce a custom background image. Simple messaging system allows your visitors to leave short messages on your locked desktop. Two locking methods are supported: with hiding your desktop; and without hiding to allow others to see desktop.
  • Security program requests username and password or simple password upon boot-up and locks desktop by one mouse click. It can't be bypassed on Windows 95/98/ME. All unwanted people are kept out to your PC. Very flexible use: multi-user support(up to 450 users), password encryption, integration with your favorite screensaver, color's highlight log files with integrity test, setup of colored text for requesting passwords, possibility use Access Denied usernames as Windows logon names and other pleasant additions including hidden measures that can stop hackers/crackers. Screen Guard sub-system can save message events from anyone, even unauthorized persons but still protect desktop. Users can change their passwords only if during installation you enable this feature.
  • Security program that request username and password on Windows load-up and fast lock your desktop by one mouse click or keyboard shortcut. All unwanted people are getting away from your computer. It is stronger what Windows XP security. You can see and manage easily user privileges within colored list of users. Empty password users now can be fast detected to prevent unauthorized use of such accounts. Color logs allow you to take knowledge about usage of computer and detect intruder in appropriate time. With logs you can see programs used by other users i.e. are your children work in text editor, use email program or just play a games. Other feature is possibility to disable CTRL+ALT+DEL.
  • Access Forbidden provides a quick, secure and easy way to lock the access to your computer and protect the screeen from prying eyes. Access Forbidden instantly locks the computer with a user defined password or using a "key drive" (a pendrive or other removable drive). The PC will be unlocked entering the password or inserting the key drive. Access Forbidden enables the user to easily prepare a standard removable drive that will be used as an "hardware key". Just one click on the system tray icon and you can leave the PC without worries! Enter your password and the computer returns under your control instantly. Lock the access to your desktop without interrupting other computer activities (running programs, active downloads, mail delivering/reception, chats, scheduled tasks, and so on...). Exclusive feature: use a USB pendrive to lock/unlock the computer! Simply plugging/unplugging the pendrive, whithout the need to click or enter the password. Access Forbidden is ...
  • Access Lock is a system-tray security utility, which enables you to lock your PC with a password by two methods. The first one hides your desktop and shows a screen saver while the second one does not hide it allowing others to watch what happens there. It also prevents unauthorized access on boot, logs the attemps of breaking the lock and allows people around to leave messages while the system is locked.
  • Access Manager is a free software solution that keeps all your passwords in one, simple to use list. It offers fast, easy and secure password management. One 'Master Password' is all that is needed to access all your passwords and private information: - Web site passwords - Credit card and private PIN numbers - Computer logon passwords - Telephone banking codes - E-mail passwords - Software access passwords - Door entry and alarm codes You can view or edit your password list, and drag & drop or copy passwords to web pages and other software. Strong encryption keeps your information secure. Access Manager is available in English, Dutch and German language versions. Access Manager is free for personal, non-commercial use.
  • Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer u
  • Access Password by Thegrideon Software is advanced MS Access database (mdb, mdw, mde, etc.) password recovery tool. With this tool you can recover your database passwords, user-level security records (logins from .mdw) or users and groups ids to recreate lost system.mdw (Workgroup Information) file. Access Password recovers data instantly and works with all MS Access 2.0 - 2013 databases.
  • Kernel for Access Password Recovery is a competent Access password recovery tool that restores the actual password of protected Access database file. Since Access database files (.MDB files) are protected using strong encryption algorithms, software for recovering password of such files should be highly efficient. Access password recovery software restores the password of such files without considering length and complexity. Moreover, the software supports recovery of multilingual passwords, so that Access database files that are protected with multilingual passwords can be accessed easily. Access password recovery software supports password recovery for Access database files created using Microsoft Access 2003, XP, 2000, and 97. The password recovery capabilities of the software can analyzed with demo version. The demo version is available for free download and enables the user to recover first two characters of the selected Access file. For recovering the complete password, full version of Access password r ...
  • This password recovery tool helps the user to recover lost or forgotten passwords for the MS Access database files (*.MDB) and user-level passwords stored in the workgroup information file (*.MDW). The software automatically finds recently accessed *.mdb and *.mdw files and recovers passwrds instantly. Importantly, the program is capable of recovering passwords containing non-English characters as well.
  • Losing a password for a vitally important MS Access document is a more common situation than you can imagine. But don't panic if this happens to you, just install Access Password Recovery Professional, and even if your lost password was an unutterable fifteen-character Japanese name for some exotic animal, this program will instantly recover it for you. Success is guaranteed.
  • Buy Access Security Recovery program to recover Access security from MDB file. Access Security Recovery is the perfect software, if you need to unlock, remove, break or recover Access security. The software can recover Access security for Microsoft Access /97/2000/2002/2003 database. The demo version is offered to verify if the software is capable to recover access security or not. To recover complete Access security password you have to pay 25$ for full version of Access Security Recovery tool.
  • Access Workgroup Password Recovery is a program to recover lost or forgotten passwords for Microsoft Access workgroup files. (*.mdw, *.mda). All passwords are recovered instantly regardless of length. All versions of Microsoft Access are supported.
  • Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and..
  • Access Lock is a system-tray security utility, which enables you to lock your PC with a password by two methods. The first one hides your desktop and shows a screen saver while the second one does not hide it allowing others to watch what happens there. It also prevents unauthorized access on boot, logs the attemps of breaking the lock and allows people around to leave messages while the system is locked.
  • With the influx of portable storage devices and removable media, data theft is becoming an increasing threat to organizations. Devices such as USBs, WiFI, FireWire, Bluetooth, iPods, MP3s connect seamlessly to company networks, without IT administrators having any knowledge that their company data is being exposed. Codework?s endpoint security solution, Access Patrol, provides a comprehensive solution for securing company devices to minimize unauthorized access to proprietary information. Another challenge facing organizations is the unnecessary wastage of energy when workstations are left running after hours. With rising energy costs, administrators are turning to more effective solutions for managing energy consumption in the workplace.. AccessPatrol provides an effective method for power management. With a simple click of the mouse, computers can be remotely shutdown or booted. This function can also be scheduled to force a shutdown of the PCs at a specific time, e.g. after work hours, or schedule ...
  • Ace Password Guard is a password management software with powerful functions and easy to be accessed.1) Allow you to add any amount of attachments to each account. 2) Provides the auto-fill function. 3) Built-in flexible and very random password generator in the software. 4) With powerful functions and easy to be accessed. 5) You can also save whatever information.
  • The most powerful and effetive password sniffer. Ace Password Sniffer can listen on your LAN and enable network administrators or parents to capture passwords of any network user. Currently Ace Password Sniffer can monitor and capture passwords through FTP, POP3, HTTP, SMTP, Telnet, and etc. It works passively and don't generate any network traffic, therefore, it is very hard to be detected by others. No need to install additional software.
  • Ace ScreenSpy 5.0 is a popular Advanced Security Software to secretly monitor your PC screen, capture and save any Screen or Windows activity that occurs at any time. The Software automatically captures and saves the entire monitor screen, together with any Windows, Applications, Browser windows & images, Web-pages & Web-images etc that are opened by any user as well any other activity that occurs on your PC Screen. Screens of any dimensions and resolution can be monitored. The program can be scheduled to monitor the screen according to the time interval your choice and can be configured to load with Windows automatically. The secret Screenshots that are captured by the monitoring process can be stored in any folder that you choose on your hard-disk. Full Password protection can be enabled so that no other user can alter or change any of your settings. The following are the features of Ace ScreenSpy - Designed for ease of use, fast setup and interactivity, button and menu-oriented graphical interf ...
  • An easy to use, secure digital file shredder with several powerful shredding algorithms to wipe & destroy your files, folders, recycle bin, free space, internet browsing history, cookies, index.dat files, run history, file tips, & more, beyond recovery. With an easy drag & drop interface, comprehensive help, per-item/total progress bars, & fast multi-threaded design, AceErase is the ideal application to use for all your data destruction needs!
  • An easy secure file shredder & history eraser privacy tool. Powerful shredding algorithms wipe & delete files, folders, recycle bin, free space, IE browsing history, cookies, cache, index.dat files, run history, file tips, & more. With an easy drag & drop interface, comprehensive help, per-item progress bars, quick installer/uninstaller, built-in check for updates, command line options, & fast multi-threaded design, this is your ideal shredder!
  • AceSpy makes it easy for you to accurately monitor and block the activities of others using your PC. The software is cutting edge computer spy software that secretly monitors all activity while it remains completely hidden. The easy application records and instantly forwards you each email sent or received and BOTH sides of chats. Also records web sites visited, keystrokes, passwords, full MySpace and Facebook content and more.
  • ACT Password Recovery is a program to recover lost or forgotten passwords to the ACT! files (*.mud, *.blb, *.adf). All passwords are recovered instantly regardless of length. Multilingual passwords are supported. All versions of ACT! are supported.
  • Active Directory Change Tracker, a powerful tool to track, analyze, and report all changes made to your AD configuration. Active Directory Change Tracker audits all changes made to your Active Directory by periodically collecting only the changed data, reporting what exactly changed, along with the new and old values, when the change was made, where the change happened in your Active Directory. Active Directory Change Tracker also determines who made the change by looking up the Security Event logs of your audit-enabled Active Directory. Active Directory Change Tracker may be configured to work with or without the native Auditing capabilities of Active Directory. You can use the tool to track and audit AD configuration changes on what exactly changed even without using the native auditing of AD. You can additionally combine the tool with the default native auditing of AD to capture Security event log audit records of changes from all domain controllers in your domain (since event log data is not repli ...

Page 4 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware