Search our site:

Access Control

Safesquid Content Filtering Proxy  Safesquid Content Filtering Proxy 4.1.0
Antivirus and content filtering proxy server

PC Activity Monitor (PC Acme)  PC Activity Monitor (PC Acme) 6.4.1
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.

Beyond Keylogger  Beyond Keylogger 2.95
Beyond Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the 'girlfriend' your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP.

BioCert Authenticator Lite Edition 10 Users  BioCert Authenticator Lite Edition 10 Users 1.2
BioCert Authenticator Lite Edition 10 Users Our standard software programming toolkit offers 1:m matching capability up to 10 users. This toolkit is primarily focused upon students and learning programmers that wish to explore the feasibility of inclusion of Biometric Authentication within their projects. The Lite is a full-featured toolkit with all of the functionality of the Pro edition, with a limitation of 10 fingerprints
biometric, toolkit, fingerprint, password, security, identification, authentication, access control, attendance, recognition,

4S Lock  4S Lock 1.07
4S Lock 1.07 enables you to lock your workstation at any time by simple double click on system tray icon. Transparent lock is available. 4S Lock makes an auto show of top world cars and sport utilities. 10+ pre-configured image sets are available for free one-click download within the program interface. 4S Lock and images it shows are totally independent. With version 1.07, 4S Lock also automates computer cleanup.
4s lock, synaptex, cars, car, security, screensavers, screensaver, screen savers, access control, pc security,

VeriFinger Extended SDK Trial  VeriFinger Extended SDK Trial 5.0
Multiplatform fingerprint identification SDK with biometric ActiveX clent/server components for rapid application development. Matching speed up to 40,000 fingerprints per second. Supports 20+ major scanners and sensors on Windows, Linux and Mac OS X. Includes programming samples in C, C++, C#, Java, Visual Basic 6, VBA and Delphi 6. The trial requires constant internet connection and Microsoft Visual C++ 2005 Redistributable Package (x86).
fingerprint, sdk, recognition, identification, matching, verification, biometric, biometrical, pc, mac,

All In One Keylogger  All In One Keylogger 2.94
All In One Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the 'girlfriend' your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP.
keylogger, key logger, keystroke logger, surveillance, stealth, invisible, keyboard monitor, keyboard spy, access control, microphone,

Desktop Identity  Desktop Identity 1.0.1
Biometrics made easy! Desktop Identity identifies people and generates time & attendance logs. It also has the very powerful functionality of working online with an existing application and to provide this identification information to the third-party software. In this mode it integrates with any existing system, such as time and attendance, check-in / check-out, access control, even if this is a legacy, text-oriented, system.
microsoft fingerprint reader, fingerprint, log, login, biometrics, recognition, fingerprint recognition, access control, griaule, password,

Stealth Keyboard Interceptor for Win NT/2000/XP  Stealth Keyboard Interceptor for Win NT/2000/XP 6.0.2
Stealth Keyboard Interceptor for Windows NT/2000/ XP (SKIn2000) is a monitoring program which allows to intercept all keystrokes, mouse clicks, captions of active windows, static text and other. It has a unique set of features that makes SKIn2000 the powerful program, suitable for perfect monitoring of user's computer activity.
security, spy, keylogger, monitoring, stealth, key logger, surveillance, detective, parental, intelligence,

SafeLogon  SafeLogon 2.0
SafeLogon is a multi-user and password-based access control utility that enhances and complements the Windows built-in logon and authentication system. In other words, it allows you to protect your system at home and office from unauthorized access, and much more...
lock, locker, safe, logon, startup, days, times, access control, parental control, boot protection,

  FingerCell Standard EDK (Windows Demo) 1.2
FingerCell Standard EDK is intended for developers, who are going to develop embedded or embedded/PC biometrical systems with third party or custom hardware. Includes 2 copy-protected licenses for FingerCell library (one for embedded device and one for PC), drivers for image input from fingerprint sensors, sample applications (with source code) and software documentation.
fingerprint, recognition, identification, matching, verification, embedded, pc, windows, win32, demo,

Internet Access Scheduler  Internet Access Scheduler 2.0
Internet Access Scheduler (IAS) is a firewall that offers user-level access controls for Windows 9x/Me. IAS enhances the standard Windows access management and once installed, administrators can assign permissions to TCP/IP connections. Internet Access Scheduler lets you control which users can access what TCP/IP based protocols (HTTP, FTP, SMTP, POP3, Telnet, etc.) on a local computer, depending on the time of day and day of the week.
internet access, internet security, internet control, internet software, network access, network security, network control, network software, security software, protection software,

KidsWatch Time Control  KidsWatch Time Control 3.0
Time Control allows you to limit Internet surfing, chatting and game playing to a time and duration appropriate for each child. Schedule the number of hours each child can use the computer, per day or by week. Automatically log your child out of their computer when its time for lights out. Lock down the computer to prevent your child from pirating music or installing inappropriate software. Easily share computer time among siblings.
access control, parental controls, computer restrictions, program restrictions, internet restrictions, limiting internet access, limiting program access, limiting computer access, restrict, control,

Advanced Stealth Email Redirector  Advanced Stealth Email Redirector 6.5.2
Advanced SER enables you to collect copies of all the outgoing emails from the particular PC. This program monitors outgoing traffic of the target PC's email client and intercepts all the messages sent from it. Intercepted emails are forwarded to a pre-specified email address. Advanced Stealth Email Redirector (Advanced SER) does not intercept emails sent from web-based email services like www.yahoo.com, www.hotmail.com etc.
security, monitoring, intelligence, access control, parental control, investigation, surveillance, detective, espionage, spy,

PC Activity Monitor Net (PC Acme Net)  PC Activity Monitor Net (PC Acme Net) 6.4.1
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
security, monitoring, intelligence, access control, parental control, investigation, surveillance, detective, espionage, spy,

Browse Pages: 1 [2] [3] [4] [5]