Cookie Consent by Privacy Policies website
 
Language selection:   Deutsch   Deutsch   |   English   English

Category Security & Privacy / Access Control

Freeware | Shareware | Full version | Demo | Evaluation | Cardware | Adware | Open Source

Go to page: Back | 1 | 2 | 3 | 4 | 5 | 6 … | Next | End

ID Flow Free ID Card Software

Quickly enroll new cardholders, capture photo, lookup and manage existing records and print ID cards one at a time or in batches using the Card Production Center. More…

Corporate Network Security

Network-based security software used for protecting PC workstations over a network. Impose access restrictions to network PC workstations, execute patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts. The software supports over 600 different security restrictions and tweaks that let you restrict access to almost every corner of Windows. More…
 

Internet Explorer History Eraser

Internet History Eraser software erase temporary internet files delete visited sites URL uniform resource locator address bar surfing information list. Utility remove cookies pictures images photos clear start menu run find auto complete data. Wipe temp files folders cache video clips ensures privacy from tracing online offline past activity. It sweeps recent typed opened browser websites list clear form and password support internet explorer IE. More…

Computer Lock Up

Protect your computer from all kinds of threats, from snooping co-workers and bad guys to your pet or toddler! Computer Lock Up offers you a powerful tool to lock your PC when leaving it and prevent any unauthorized access. Set the unlock password that cannot be bypassed in safe mode or ignored by a user with administrative rights. The smart software locks keyboard shortcuts, mouse, CD/DVD drives and screen, and closes all the security loopholes. More…
 

Password Generator 2015

Generate unique strong passwords, pins, keycodes, and usernames with random password generator. Generate random numbers within a certain range or matching a distribution. Control which characters can appear, where, and how often. Allow/disallow duplicate, consecutive, repeating, and similar characters. Use strings, sequential numbers, and non-ASCII characters. Use various filters to further control output. Save results to Excel, file, database. More…

Outlook Express Security

Use Outlook Express Security to control access to Outlook Express and its databases. When it is active, Outlook Express becomes locked and no third-party programs can access its message base files and the address book. As a result, when you try to start Outlook Express, open the address book or access the files, a password will be asked to allow access. If an invalid password is entered, Outlook Express or Address Book will not be opened. More…