myCodes-lite 1.3
) in a convenient user interface and to protect it from unauthorized access. Each data record can be stored in a subordinated category with a description. Regarding the categorization, there are no limits you have complete structural control.
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- Computer Data Recovery
- Android Data Recovery Software
- FAT Partition Files...
- Topography in AutoCAD
- Memory Cards Recovery Program
- DVD Labels
- SSuite NetSurfer E-Gamer x64
- Privacy Eraser Free
- EasyBilling Invoicing Software
- AnyMP4 Video Editor
- Windows Data Recovery Software
- Aiseesoft AI Photo Editor
- Files Recover Mac
- FoneLab iOS Unlocker
- NTFS Files Recovery Utility
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Monitor Unauthorized Access Download
-
26Freeware
-
27WinAIR Forms 2.0
- Apply security controls to prevent accidental revision or unauthorized access. - Print contracts in letter or legal size. - Save completed forms in your personal folders. - Eliminate redundant typing by storing recurring text in your own personal ...$149.00 -
28Anti Jammer DONATE 1.6
Most of these alarms work by sending messages to the alarm central when an unauthorized access to your home event is produced. Most companies of alarm installations are using GSM communication. Do you know what easy is to avoid the communication with ...$1.85 -
29Who Used My Phone? 1.03
Have a photo and proof of every unauthorized access to your phone! This application will take photo each time your phone is unlocked, so you can later check who recently manipulated with your phone. This application uses front facing camera and few ...$1.30 -
30My Blacklist 1.0.0.0
Restrict any unauthorized access to the information that could compromise you. Increase the protection of your secret contacts with a personal password. The application Secret Contacts is created especially for those who has something to hide and who ...$0.99 -
31iBlacklist 1.0.0.0
Restrict any unauthorized access to the information that could compromise you. Increase the protection of your contacts with a personal password. The application iBlacklist is created especially for those who has something to hide and who is tired ...$1.99 -
32Privacy Drive 2.7
Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & "On-the-fly" Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access. ...$19.95
Buy -
33Privacy Drive Portable 2.7
Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access. ...$19.95
Buy -
34Homedale 1.33
Homedale is a lightweight software that will allow users to monitor the signal strength of various WLAN Access Points. With Homedale you can monitor the signal strength of multiple WLAN Access Points. You can view a summary of all available access ...Freeware -
35NetWrix Non-owner Mailbox Access
All access attempts to user mailboxes by non-owners must be closely monitored, to keep track of all unauthorized and accidental attempts to steal CEO or CFO's e-mails. Auditing of non-owner mailbox access is a major requirement of regulatory compliance ...Freeware -
36Netwrix Nonowner Mailbox Access
All access attempts to user mailboxes by non-owners must be closely monitored, to keep track of all unauthorized and accidental attempts to steal CEO or CFO's e-mails. Auditing of non-owner mailbox access is a major requirement of regulatory compliance ...Freeware -
37EaseFilter Data Protection SDK
The EaseFilter Data Protection SDK can prevent your sensitive files from being accessed by unauthorized user. With the EaseFilter file protector you can control the file I/O activities on file system level, capture file open, create, overwrite, read, ...$19,999.00
Buy -
38BrowseControl 4.2
PRODUCT FEATURES INCLUDES: - Deny all access to the Internet - Allow access to authorized c sites – Allowed List - Deny access to specific sites – Blocked List - Implement Interent access policies by PC or by User - Restrict use of ...$79.00
Buy -
39InterGate Policy Manager for
InterGate Policy Manager for Windows - A comprehensive Internet access management solution, providing fine grained control of web content access, usage of Peer to Peer, Instant Messaging and Skype networks, logging and reporting of user activity, as ...$210.00 -
40InterGate Policy Manager for Mac
InterGate Policy Manager for Mac OS X - A comprehensive Internet access management solution, providing fine grained control of web content access, usage of Peer to Peer, Instant Messaging and Skype networks, logging and reporting of user activity, as ...$210.00 -
41PC-Alarm and Security System 2.2.12
Monitor mouse and keyboard activity for uninvited intruders, plus, utilizes your computer's microphone to monitor loud sounds such as a fire or home alarm. Also monitors inexpensive door-mounted alarms to detect intruders in and around your home or ...Freeware -
42AssureFiles Secure File Sharing
Dynamically control file access. AssureFiles Secure File Sharing solution helps organizations prevent data breaches caused by internal and external threats by enhancing access control to critical business applications and data. AssureFiles integrates ...Freeware -
43WinLock 9.1.0
It is a program that ensures that only authorized people can access sensitive information on your computer. This security tool allows you to restrict your users from accessing important system resources like Control Panel, desktop, and system registry, ...$26.95
Buy -
44Public Kiosk Software 7.7
Simple and easy to setup and manage, this program is ideal for Internet cafe and public places, it allows you to secure your PC, so you can turn it into public access workstation. Protect all features of your operating system like system files and registry.$69.00
Buy -
45Router Commander for Linux 1.2.50
You can monitor router with built-in Syslog server and bandwidth monitor in easy to understand graphical forms. With Router Commander you can always see what devices are using the router resources. The software shows IP, MAC, wired or wireless connection ...Freeware -
46WinLock Professional 9.1.0
It is a program that ensures that only authorized people can access sensitive information on your computer. This security tool allows you to restrict your users from accessing important system resources like Control Panel, desktop, and system registry, ...$34.95
Buy -
47XpoLog Xtrim Log Viewer 1.0
Tail changing logs filesu Xtrim can help you export log files over e-mail, SSH, SMTPu From XpoLog you can monitor log files that are located on remote machines. XpoLog Security allows you to build a complete log viewing and analysis solution restricting ...$189.00 -
48LoginTrap 1.2
ProteMac LoginTrap is a login recorder aimed to stop unauthorized access to a Mac computer, thus preventing both material theft of Mac machines and virtual theft of personal data.ProteMac LoginTrap monitors all login events and detects whether a login ...$29.95
Buy -
49ManageEngine ADAudit Plus 4.5
Windows File Server Auditing Securely tracks the authorized / unauthorized access, changes to the documents in their files and folder structure, shares and permissions. Detailed Forensics of Approved and Unapproved Changes in file and folder structure.$495.00
Buy -
50GameProtector 1.0
By using it, you will force anyone that tries to access those files to input a password. Failing to do that will prevent anyone to open them. The name of this program could lead you to think that this process can only be done with games. The truth is ...Freeware