Software program that prevents tampering with (changing) the computer clock
Internet Lock is an access control and password protection solution for your internet connections and programs. With Internet Lock, you can fully control the internet connections and programs on your computer.
Favortools USB Locker is designed to securely control your USB, Internet and CD/DVD, so as to prevent unauthorized data transfer through these devices and reduce the risk of data leakage and theft.
Make different list of software products, and give different instructions. You can supervise some software work, and restart if needed, and prevent from shutting it down. Or forbid some other software from starting! Website blocker.
Parental Filter software program that helps parents to monitor and control the child's use of the Internet.
Steel Run-As can run programs, commands and scripts under a different user account than the current logged on user. Run any application,script in alternate user credentials.
SmyleSafe is an access control software that blocks adults and hate websites based on parent's preferences. Parents can also create time control, block applications and monitor real-time activities of their child.
Fast Windows Hider is a privacy tool designed to help you hide any windows at one moment. It's very useful when you need privacy and do not wish your actions to be viewed by others.
Comprehensive protection for Windows-based network workstations under a public environment. Restrict access to PC workstation, apply executable patches, and schedule reboots, shutdowns, and Explorer restarts remotely.
Use Easy Disk Drive Safeguard to hide and lock your local, network, Floppy and USB drives as well as disable the AutoRun feature for them. A password protection can be applied to the program to prevent your users from changing the security settings.
Protect your PC from abusive use of removable media and enforce whether your users are allowed to use removable media or access your local drives. 1st Disk Drive Protector lets you hide, lock and prevent usage of local, network, Floppy and USB drives
1st Desktop Guard lets you prevent your desktop icons from getting rearranged, stop users from changing desktop wallpaper and screen saver, secure your public access computers, save, restore, manage and lock desktop layouts.
Easy Desktop Keeper lets you save, restore, manage and lock your desktop layout or layouts of PC users including placement of desktop icons, files and folders located on the desktop, desired wallpaper and screen saver.
Corporate Network Security is a network-based security software used for protecting PC workstations over a corporate network. Corporate Network Security supports over 600 different security restrictions.
Password-protect, hide and lock your local, network, Floppy, CD/DVD and USB drives; disable AutoRun; ensure security and privacy. The program itself can be protected with a password and can not be uninstalled under a regular user account.
PC security tweaking software to tweak Windows-based computers. Tweak access to Control Panel applet functions, disable selected Start Menu items, lock and protect disk drives in My Computer, disable the DOS and command prompt, and much more.
Protect PC, restrict access to Windows applications, password-protect boot, apply access restrictions to PC, deny access to Control Panel, disable boot keys, context menus, DOS, Registry editing, Internet, network access. Hide desktop icons, disk dri
Secure your PC with 1st Security Agent. It offers an administrative support for controlling which users are allowed to access your PC and the level of access each user may have. Restrict access to Control Panel, Start Menu, local, network, USB drives
It customizes the Internet Explorer Web browser, lets you apply access restrictions to web browser, restrict access to certain tabs and features of Internet Options, disable certain menu items and buttons and prevent others from editing your Favorite
1st Screen Lock is a password-protected desktop security utility that lets you lock your desktop with a password on boot, or at the time you are leaving your PC. You can use the built-in spy utility that works in background and enables you to spy on
Desktop security solution for personal or publicly accessible computers. It disallows unauthorized changes to various settings of the Windows system, such as Control Panel, Desktop, Local Security Policies, Outlook Express account settings and more.
Highly configurable artificial intelligence password and number generator. Truly Random uses high quality pseudo random generator or true random numbers from sound card. Configure your random string or number precisely. Pronounceable passwords.
NetShareWatcher is network security improvement software. It allows network administrators to monitor network shares and identify shares which are violating data access policy of their organization.
Free easy to use parental control client, simple install, aimed for novices mom and dads that want a simple child protection software, without the hassle that some of the big brands require.
ShareAlarmPro monitoring network access to network shares, allows to see parameters of the workstation which tries to establish a connection with your computer.The remote workstation, user, path, OS, permissions of the accessed folder.
Outlook Express Privacy lets you control access to Outlook Express and its email message database. When you enable protection, the program disables access to the message database and address book files.
Password-protect and hide your files and folders with a click of mouse. The program supports Windows Explorer integration and upon installation creates easily accessible menu items in the context menu of Windows Explorer.
Protect your files and applications from being executed, viewed, changed and deleted with File Access Scheduler. This software will automatically enable a chosen protection based on currently logged-in user, current time and the schedule you specify
Desktop locking security utility to protect desktop when you are not near PC. Password protection can be automatically activated on boot or with a click of an icon in the system tray. Log access attempts and enforce a custom background image.