Software Downloads for "Control Access Clock"

Control access to public computers over a network. Consists of two programs. The APT Master program is installed on a single computer and generates one time use passwords to allow access to a computer on the same network that is running the APT Client program. APT Client presents a full screen logon dialog that requires this password before the desktop is presented. The logon session is for a specific period of time..

The "Internet Administrator for Microsoft ISA Server" is an integrated solution which allows to control and manage internet access and provides: - all-round internet monitoring; - incoming traffic, time and bandwidth control; - access control to web sites, by protocols, time, queries, words, etc.; - flexible and powerful content filtering; - URL category database with more than 3 000 000 web sites; - more than 10 reports visually showing internet usage statistics; The "Internet Administrator" software provides the all-round internet access control and monitoring at the enterprises and solves an acute problem of use of the global network - abusing resources of the Internet on a workplace.

SysUtils Device Manager - the removable device access control solution. Once SysUtils Device Manager is installed, administrators can control access to floppies, CDROMs, and other devices. Also SysUtils Device Manager can protect network and local computers against viruses, trojan horses, and other malicious programs often introduced by removable media. SysUtils Device Manager provides the flexibility to control access on a per user basis to: - External Storage Devices; - CD-ROM/DVD Drives; - Floppy Disks; - Digital Cameras.

Allows continued access to Windows NT 3.51 or 4.0 file servers with replacement of administrator password. This Utility only works on FAT drives.. Security software for employee monitoring, parental control, access control, catch cheating spouse, espionage, surveillance etc.. Security software for employee monitoring, parental control, access control, catch cheating spouse, espionage, etc..

With an increasing number of standard screen resolutions in use, it's often necessary to do separate designs for each. This script allows you to control access and redirect to separate pages based on 640, 800, 1024, or larger screen sizes. The script includes optional alert messages, which can be enabled or disabled via a script variable. Thorough instructions are in the script, and set-up is easy..

  • Platform: JavaScript, Scripts
  • Publisher: codebelly.com
  • Date: 21-07-2011

Windows Security Tweaker is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives.

PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability.Program works in background, transparent for user, and captures the following events:- Application start- Switching between applications/windows.

Powerful monitoring solution for employee monitoring and parental control. PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs.It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. PC Activity Monitor is a poweful management utility for companies who want to increase their profitability and productivity.Here are some key features of "PC Activity Monitor (PC Acme)":Extremely easy setup;New unique anti-detection technology (Hides Itself);New stealth Log-file sending technology;New Log Analyzer (easy understanding report);Interception: Keystrokes; International keyboards; DOS-box and Java-chat keystrokes; System logon passwords (9x/NT/2K/XP);...

Buy a registration code for AirClock - the first remote control alarm clock for Palm OS handhelds - in order to:• Remove the 15-day time limit and enjoy unlimited usage• Obtain FREE software upgrades• Access FREE customer support. Awem studio download and play casual games. Awem studio - breathtaking casual games. Play puzzle hidden object simulation time management word arcade action word card game and download pc mac games. Play on-line games.

  • Platform:
  • Publisher: awem.com
  • Date: 18-9-2009

Outlook Express Privacy lets you control access to Outlook Express and its email message database. When you enable protection, the program disables access to the message database and address book files. As a result, when you open Outlook Express or Windows Address Book, a password will be asked for authentication. Outlook Express and Windows Address Book will become accessible only if a correct password is entered. This software can be used to prevent your email data from being stolen or damaged by unauthorized users.

  • Platform: Windows
  • Publisher: PC-Safety
  • Date:
  • Size: 716 KB

eScan Web and Mail Filter for Windows is the latest offering from MicroWorld Technologies Inc. It offers a combination of features to help you fight the threat of viruses, set security policies for parental control over content accessed by your child. It guards against Internet misuse, block Spam and offensive mails and block PopUp Ads. The functions preformed are; Control access to websites, Control e-mail activity, Control remote file modification, Block Spammer's e-mail ID and issue warnings and notifications.

Deviceshield acts as firewall that works on the INSIDE to control access to ALL Removable Media Devices. It protects your data from inside security breaches by removeable media devices such as USB memory sticks, CD/DVD drives, Firewire etc. DeviceShield iprotects the integrity of your company's confidential data without restricting access to these files by any authorised employees - files can be automatically encrypted so they can even be taken out of the office in safety. You protect your network from invasive Viruses and Spyware by installing the very latest firewall and anti-virus protection, yet the security of your organization's most sensitive information and intellectual property may remain totally exposed and vulnerable from the inside.

Mail-Lock - control access and distribution of your sent emails With Mail-Lock you determine who can print, forward and read privileged E-mail communications and attachments. You also determine how long the E-mail and attachments are available for review by the recipient.Mail-Lock gives the Outlook/Exchange E-mail user all of these features and functions.A simple client-based installation gives you all the power you will need.Any e-mail user using a Microsoft Windows e-mail client can read messages you send with Mail-Lock.

  • Platform: WinOther
  • Publisher: grpsoft.com
  • Date: 11-10-2009
  • Size: 9451 KB
  • PiXPO
  • License: Shareware
  • Rating

PiXPO is p2p photo sharing software where you control access to your photos PiXPO is able to change the way you think about sharing images. Photo Album CreationPiXPO's photo album software was designed specifically to make managing and sharing albums fast and easy. With one click PiXPO automatically finds and organizes all of your pictures into albums using the PiXPO instant album creator. Managing your digital photo storage has never been easier. Community BuildingPiXPO is p2p software that is designed to bring people together through picture sharing.

  • Platform: WinOther
  • Publisher: pixpo.com
  • Date: 05-10-2009
  • Size: 4608 KB

PC Activity Monitor Pro (PC Acme Pro) for Microsoft Windows 95/98/ME/NT/2000/XP is an ultimately invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs.It is professional software that captures all users' activity on the PC. All data collected by the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to specified shared resource in LAN environment) for further inspection and analysis.

The Ultimate Toolkit Includes:Forensic Toolkit (FTK)Find, Organize, & Analyze Computer EvidenceThe Forensic Toolkit offers law enforcement and corporate security professionals the ability to perform complete and thorough computer forensic examinations.Password Recovery Toolkit (PRTK)Recover Lost or Forgotten PasswordsThe Password Recovery Toolkit gives you the ability to recover passwords from well-known applications. More Information.Registry Viewer Analyze & Decrypt Registry DataAccessData's Registry Viewer allows you to view independent registry files, generate reports and gain access to the "Protected Storage System Provider" key.

Distributed Network Attack, or DNA, is a new approach to recovering password protected files. In the past, recoveries have been limited to the processing power of one machine. DNA uses the power of machines across the network or across the world to decrypt passwords.The DNA Server is installed in a central location where machines running DNA Client can access it over the network.DNA Manager coordinates the attack, assigning small portions of the key search to machines distributed throughout the network.

Distributed Network Attack, or DNA, is a new approach to recovering password protected files. In the past, recoveries have been limited to the processing power of one machine. DNA uses the power of machines across the network or across the world to decrypt passwords.The DNA Server is installed in a central location where machines running DNA Client can access it over the network.DNA Manager coordinates the attack, assigning small portions of the key search to machines distributed throughout the network.

Distributed Network Attack, or DNA, is a new approach to recovering password protected files. In the past, recoveries have been limited to the processing power of one machine. DNA uses the power of machines across the network or across the world to decrypt passwords.The DNA Server is installed in a central location where machines running DNA Client can access it over the network.DNA Manager coordinates the attack, assigning small portions of the key search to machines distributed throughout the network.

Distributed Network Attack, or DNA, is a new approach to recovering password protected files. In the past, recoveries have been limited to the processing power of one machine. DNA uses the power of machines across the network or across the world to decrypt passwords.The DNA Server is installed in a central location where machines running DNA Client can access it over the network.DNA Manager coordinates the attack, assigning small portions of the key search to machines distributed throughout the network.

New Reviews


Print Inspector

Whether you are using a printer connected to your local desktop computer or a print server sometimes you need to see whats going on in your printer by having a close look at the print jobs sent by the users. Print Inspector is such type software ...


Disk Genius

Disk Genius was formerly known as Partition Guru which is an all-in-one solution for disk partition management, data recovery and disk repairing. It can recover lost files from partition, backup and restore partition table, clone partition or clone ...


Safe In Cloud

It is quite difficult to find any computer users nowadays who do not need to use the web, for any purpose. Whether it is for education or entertainment, the web is your best resource. You also need to use various online services for banking, ...


PictBear

Nowadays, a majority of PC users resort to digital image editing once in a while. It may be required for retouching image captured in smart phones or for creating an album in Facebook. For some people, tinkering with digital images is a pastime too. ...


Panda Cloud Cleaner

PC security has become a tricky and complicated subject both for home users and network supervisors, with complexity and risk factors multiplying over the years. Using a single antivirus app may not be enough anymore. That explains why many users ...


SnapCrab

Nearly every PC users need to take screenshots from time to time, whether it is for personal or professional needs. While using the basic Windows screenshot capture method is available, it is not adequate for everyone. When you want to capture ...


BitKiller

Dealing with various types of data efficiently holds the key to success in any computing task. Apart from generating new data and modifying existing files, it becomes necessary to delete existing files at times. While most users resort to using ...


SeaMonkey, Portable Edition

Using the Internet has become a necessity for a majority of people, including those who do not use a PC regularly. To browse web, stream video or download online content, people often resort to using various third party apps. For example, using ...


TuckAway Intelligent Email Organizer Pro

Using an email software allow you to do a number of things including managing your address lists, emails and even ending memos, documents and even virtual letters. You can also use it to manage your tasks easily. The email software comes in ...


WebAcappella

Web design sector has witnessed several trends and technological innovations affect website development in big ways. With time, designing websites has become easier. Nowadays, you can find web design software that nearly eliminates the need to ...


New Downloads

PubTyper

PubTyper is an extension for
Adobe InDesign to facilitate
the process of compiling a
document from files of
different ...

ClickCharts Free Flowchart
Software

ClickCharts Free Diagram and
Flowchart Software lets you
lay out your ideas,
organization, process or
create UML ...

DPLS Scientific Calculator

This easy to use calculator is
a must for science students.
It includes triangle
calculators, vector
calculators, shape ...

Privacy Eraser Portable

Privacy Eraser is an
all-in-one privacy suite that
protects your privacy by
cleaning up all your Internet
history tracks ...

Disketch Disc Label
Software Free

Use Disketch Free Disc Label
Software to quickly create
professional labels and
covers. Personalize labels
with your own ...

Shadow Analyzer

Shadow Analyzer is an advanced
parametric CAD tool for
professionals in the area of
Solar Energy Engineering and
...

SecureFX for Linux

A highly configurable secure
file transfer client for SFTP,
FTP/TLS, SCP and FTP with
advanced features like site
...

WinTools.net Classic

Suite of tools for increasing
operating system performance.
WinTools.net cleanly removes
software from disk drives and
...

ZookaWare - Free

Scan removes spyware, unwanted
programs, junk files, registry
issues, tracking cookies and
more to make your PC and ...

Lodgit Desk Hotel Software
for Mac

Booking software for all kinds
of lodging establishments
incl. reservation schedule,
booking and guest list,
cleaning ...