MacFileSafeguard protects your data by restricting access to files and folders.You can lock your personal files and folders with passwords
BlackBox Password Manager is a free lightweight and easy-to-use password manager for Windows which will remember all your passwords. Yes, all of them. The application stores your passwords in a highly encrypted local database.
PC ports and connections data monitoring, logging and analyzing software. Device Monitor is an USB, Serial, Network protocol analyzer, data logger software and may be used to capture, log, view and analyze data coming to and out of your computer
Daniel Drubin Access Control Suite (ACS) is a security product comprised of several technologies called for protecting your PC. The main domains of protection are network and files access. Firewall, files access control, www blocker, programs blocker
Windows Firewall Control is the best tool to manage the native firewall from Windows 8, Windows 7 and Windows Vista.
Recognize the person that endeavors to enter your computer and thus make your computer data less available to other users. Monitor all login attempts! iSight shot and screenshot of endeavors!
kitProtector allows to secure public access computers.Blocks system keys (Ctrl+Alt+Del, etc.), taskbar,desktop.Allows to run only one programme-if a user closes it starts again.Specify time limit.Set time to switch off computer.Activates screensaver.
Stop others from tampering with your PC. Password protect and deny access to Windows, lock local, network and USB drives, restrict running applications, control Internet usage, view statistics of working of your kids or employees.
Ez PC Lock allows you to remotely control the PC access time of any computer that you allow your employees or contractors access to, anywhere in the World. You can Lock, Restart, turn the power off on any PC.
CD/DVD Door Guard Pro provides you with the most effective software protection for optical drives and allows you to customize any actions concerning the protection. It is not just effective in protection, it is also really handy.
5 Star Computer Monitoring Keylogger Spy Software. Completely invisible and easy to use. All information captured is stored in an encrypted log file. The log file can be sent secretly at scheduled intervals to any specified email address.
The most optimal parental control for all Windows-PCs (incl. Vista). Set time limits for the PC and/or the Internet and block/filter unwanted Web or Internet contents. Limit access to internal Windows components and personal folders.
The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and removable media.
User Time Administrator lets you specify when exactly and how long the computer can be used. Schedule time intervals and the number of hours each child can use the computer per day a week.
Multi-Screen Remote Desktop (MSRD) offers a very fast and safe solution to administrators and power users for monitoring other remote computers on their network.
Protect PC, restrict access to Windows applications, password-protect boot, apply access restrictions to PC, deny access to Control Panel, disable boot keys, context menus, DOS, Registry editing, Internet, network access. Hide desktop icons, disk dri
Password-protect and hide your files and folders with a click of mouse. The program supports Windows Explorer integration and upon installation creates easily accessible menu items in the context menu of Windows Explorer.
Desktop locking security utility to protect desktop when you are not near PC. Password protection can be automatically activated on boot or with a click of an icon in the system tray. Log access attempts and enforce a custom background image.
Hide and lock your local, network, Floppy and USB drives as well as disable the AutoRun feature for specific drive types with this password-protected security utility. If you do not want the removable media to appear and be accessible in My Computer
c:JAM is an intuitive and powerful security- and user account-management tool for MS-Access, designed to simplify and centralize workgroup administration esp. in professional intranet environments with large user numbers and distributed applications
Folder Shield enables you to make folders completely invisible. Just specify all confidential folders, activate Folder Shield`s protection and all folders will be hidden and your sensitive data will be protected against unauthorized access.
abylon LOGON protects your computer again illegal access in a comfortable kind. You need only to train a smart card, a USB stick or a CD with your login data. In future you need only this token as key for the logon authentication.
MySecretFolder - You can hide or protect with a password your personal folder with private files and documents, on both the NTFS and FAT/FAT32 volumes. Very easy to use.
Control when and how long the Internet, specific computer programs, and the computer itself can be used each day of the week
ShareAlarmPro monitoring network access to network shares, allows to see parameters of the workstation which tries to establish a connection with your computer.The remote workstation, user, path, OS, permissions of the accessed folder.
IM Lock Home Version controls and blocks access to porn, filters pornography, blocks web pages, and other types of internet use like MSN Messenger. Free trial version available - sets up in less than a minute.
SafeSystem is the perfect complement to any anti-virus or anti-spyware program and allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system.
Sentry locks down your computer on demand so it stays secure when you aren't using it. No other programs can be opened, no browser history can be snooped at, and nobody will be touching your files while you're gone. Sentry can even ...
Easy Desktop Keeper lets you save, restore, manage and lock your desktop layout or layouts of PC users including placement of desktop icons, files and folders located on the desktop, desired wallpaper and screen saver.