Recognize the person that endeavors to enter your computer and thus make your computer data less available to other users. Monitor all login attempts! iSight shot and screenshot of endeavors!
kitProtector allows to secure public access computers.Blocks system keys (Ctrl+Alt+Del, etc.), taskbar,desktop.Allows to run only one programme-if a user closes it starts again.Specify time limit.Set time to switch off computer.Activates screensaver.
Stop others from tampering with your PC. Password protect and deny access to Windows, lock local, network and USB drives, restrict running applications, control Internet usage, view statistics of working of your kids or employees.
FaceGate is a software that protects your data and computer system with your face, and you can log in windows with face instead of password.
Ez PC Lock allows you to remotely control the PC access time of any computer that you allow your employees or contractors access to, anywhere in the World. You can Lock, Restart, turn the power off on any PC.
CD/DVD Door Guard Pro provides you with the most effective software protection for optical drives and allows you to customize any actions concerning the protection. It is not just effective in protection, it is also really handy.
5 Star Computer Monitoring Keylogger Spy Software. Completely invisible and easy to use. All information captured is stored in an encrypted log file. The log file can be sent secretly at scheduled intervals to any specified email address.
USB Manager is a small Windows utility that can quickly enable and disable USB devices. It has no interface and runs from the system tray. You can control the devices from the right-click context menu.
The most optimal parental control for all Windows-PCs (incl. Vista). Set time limits for the PC and/or the Internet and block/filter unwanted Web or Internet contents. Limit access to internal Windows components and personal folders.
The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and removable media.
User Time Administrator lets you specify when exactly and how long the computer can be used. Schedule time intervals and the number of hours each child can use the computer per day a week.
Optimize and tweak your Windows XP Hardware settings to optimize your Windows XP environment. OptimizeXP comes with over 20 tweaks and optimizations.
Multi-Screen Remote Desktop (MSRD) offers a very fast and safe solution to administrators and power users for monitoring other remote computers on their network.
Protect PC, restrict access to Windows applications, password-protect boot, apply access restrictions to PC, deny access to Control Panel, disable boot keys, context menus, DOS, Registry editing, Internet, network access. Hide desktop icons, disk dri
Password-protect and hide your files and folders with a click of mouse. The program supports Windows Explorer integration and upon installation creates easily accessible menu items in the context menu of Windows Explorer.
Desktop locking security utility to protect desktop when you are not near PC. Password protection can be automatically activated on boot or with a click of an icon in the system tray. Log access attempts and enforce a custom background image.
Hide and lock your local, network, Floppy and USB drives as well as disable the AutoRun feature for specific drive types with this password-protected security utility. If you do not want the removable media to appear and be accessible in My Computer
c:JAM is an intuitive and powerful security- and user account-management tool for MS-Access, designed to simplify and centralize workgroup administration esp. in professional intranet environments with large user numbers and distributed applications
Folder Shield enables you to make folders completely invisible. Just specify all confidential folders, activate Folder Shield`s protection and all folders will be hidden and your sensitive data will be protected against unauthorized access.
Gives you complete control over your child's use of the computer: when he or she can use it for entertainment, and when for doing homework.
abylon LOGON protects your computer again illegal access in a comfortable kind. You need only to train a smart card, a USB stick or a CD with your login data. In future you need only this token as key for the logon authentication.
MySecretFolder - You can hide or protect with a password your personal folder with private files and documents, on both the NTFS and FAT/FAT32 volumes. Very easy to use.
Control when and how long the Internet, specific computer programs, and the computer itself can be used each day of the week
ShareAlarmPro monitoring network access to network shares, allows to see parameters of the workstation which tries to establish a connection with your computer.The remote workstation, user, path, OS, permissions of the accessed folder.
SafeSystem is the perfect complement to any anti-virus or anti-spyware program and allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system.
Sentry locks down your computer on demand so it stays secure when you aren't using it. No other programs can be opened, no browser history can be snooped at, and nobody will be touching your files while you're gone. Sentry can even ...
Easy Desktop Keeper lets you save, restore, manage and lock your desktop layout or layouts of PC users including placement of desktop icons, files and folders located on the desktop, desired wallpaper and screen saver.
Access Lock enables you to lock your desktop with a password by several methods, prevent unauthorized access on boot, log the attemps of breaking the lock, allow people around to leave messages while your system is locked.
Restrict access to Windows, protect PC, password-protect boot, apply access restrictions to PC, deny access to Control Panel, disable boot keys, context menus, DOS, Registry editing, Internet, network access. Hide desktop icons, disk drives, etc.