Access Control

Beyond Keylogger Beyond Keylogger 3.102
Beyond Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the 'girlfriend' your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP.
keylogger, key logger, keystroke logger, surveillance, stealth, invisible, keyboard monitor, keyboard spy, access control, microphone,
@All In One Keylogger @All In One Keylogger 2.0
All In One Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the "girlfriend" your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP.
keylogger, key logger, keystroke logger, surveillance, stealth, invisible, keyboard monitor, keyboard spy, access control, microphone,
Advanced Stealth Email Redirector Advanced Stealth Email Redirector 6.5.2
Advanced SER enables you to collect copies of all the outgoing emails from the particular PC. This program monitors outgoing traffic of the target PC's email client and intercepts all the messages sent from it. Intercepted emails are forwarded to a pre-specified email address. Advanced Stealth Email Redirector (Advanced SER) does not intercept emails sent from web-based email services like www.yahoo.com, www.hotmail.com etc.
security, monitoring, intelligence, access control, parental control, investigation, surveillance, detective, espionage, spy,
VeriFinger Extended SDK Trial VeriFinger Extended SDK Trial 5.0
Multiplatform fingerprint identification SDK with biometric ActiveX clent/server components for rapid application development. Matching speed up to 40,000 fingerprints per second. Supports 20+ major scanners and sensors on Windows, Linux and Mac OS X. Includes programming samples in C, C++, C#, Java, Visual Basic 6, VBA and Delphi 6. The trial requires constant internet connection and Microsoft Visual C++ 2005 Redistributable Package (x86).
fingerprint, sdk, recognition, identification, matching, verification, biometric, biometrical, pc, mac,
All In 1 Keylogger All In 1 Keylogger 3.295
All In One Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the 'girlfriend' your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP.
keylogger, key logger, keystroke logger, surveillance, stealth, invisible, keyboard monitor, keyboard spy, access control, microphone,
PC Activity Monitor (PC Acme) PC Activity Monitor (PC Acme) 6.4.1
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
security, monitoring, intelligence, access control, parental control, investigation, surveillance, detective, espionage, spy,
Desktop Login Desktop Login 1.0.1
Desktop Login uses fingerprints to provide an easy way to log on to Windows. It replaces the standard username and password login with a fingerprint identification procedure. When you touch the fingerprint reader, Desktop Login compares the scanned fingerprint with the ones stored in its database to verify your identity. Supports Microsoft FingerPrint reader, Digital Persona U.are.U 4000B, Testech Bio-i, Secugen Hamster and Crossmatch V300/V500.
microsoft fingerprint reader, fingerprint, windows, microsoft, log, login, biometrics, recognition, fingerprint recognition, access control,
KidsWatch Time Control KidsWatch Time Control 3.0
Time Control allows you to limit Internet surfing, chatting and game playing to a time and duration appropriate for each child. Schedule the number of hours each child can use the computer, per day or by week. Automatically log your child out of their computer when its time for lights out. Lock down the computer to prevent your child from pirating music or installing inappropriate software. Easily share computer time among siblings.
access control, parental controls, computer restrictions, program restrictions, internet restrictions, limiting internet access, limiting program access, limiting computer access, restrict, control,
PC Activity Monitor Professional (PC Acme Professional) PC Activity Monitor Professional (PC Acme Professional) 7.5
PC Activity Monitor Professional (PC Acme Professional) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal and network PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
security, monitoring, activity, intelligence, access control, parental control, investigation, surveillance, detective, espionage,
PC Activity Monitor Lite (PC Acme Lite) PC Activity Monitor Lite (PC Acme Lite) 7.4.1
PC Activity Monitor Lite (PC Acme Lite) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
security, monitoring, intelligence, access control, parental control, investigation, surveillance, detective, espionage, spy,
Deskman Pro Deskman Pro 5.5
Desktop security management for home users and system administrators alike. Home users need a simple way of protecting their computers on coffee breaks, or restraining access to their desktop on shared computer environments. System administrators require an effective tool to stop users from messing up the desktop, or apply tight security measures on a per-user or system-wide basis. Deskman is the tool of choice for its simplicity and effectivity.
easy security, desktop security, desktop restrictions, access control, security software, user control, desktop manager, security manager, system protection, access point,
Internet Lock Internet Lock 5.0
Internet Lock is an access control and password protection software for your Internet programs, it can deny or password protect any program and connection from accessing the Internet. Internet Lock works with the "Rules" mode: you can add one or more rules to control programs and internet connections. A rule normally has such format: [Allow/Deny/Password Protect] [Program] on [Port].
password protect, password protection, internet lock, internet access, internet access control, deny, allow, secure, security, access control,
Keylogger Spy Software Keylogger Spy Software 3.299
All In One Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the 'girlfriend' your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP.
keylogger, key logger, keystroke logger, surveillance, stealth, invisible, keyboard monitor, keyboard spy, access control, microphone,
FREE CompuSec PC Security Suite FREE CompuSec PC Security Suite 4.22
FREE CompuSec is a security suite for desktops and notebooks providing pre-boot authentication, single-sign-on for windows Logon, hard disk encryption, file encryption for secure exchange and encryption of diskettes, CD/DVD & removable media eg. USB thumb drive. As a full version without limitations, it is not a demo or trial version. Version 4.22 of FREE CompuSec incorporates [ClosedTalk] and Tablet PC support.
encryption, pc security, data encryption, security, authentication, access control, encrypts, cd/dvd encryption, cd protection, cd data encryption,
WinShield WinShield 1.0
WinShield is quickly growing to be recognized as one the easiest and most reliable security utilities in the world. With password encryption and system disabling, WinShield will protect your computer while you're away, sleeping, out to lunch, or at work. WinShield will disable the use of the computer until a security password is entered into the system to exit the security shell. WinShield disables your desktop and all major Hot-Keys
winshield, security, protection, protect, protected, secure, desktop access control, access, control, access control,

 

Browse Pages: 1 [2] [3] [4] [5]