|
More tags: computer security, computer access control, password protect programs, password protection, computer use control, control access,
|
Category : |
Utilities - Security |
|
|
|
Platform : |
Win95, Win98, WinME, Windows2000, WinXP |
|
|
Price : |
USD 25 |
|
|
Developer: |
|
|
|
Rating : |
|
|
|
License : |
Shareware |
|
|
Limitations: |
30 Days |
|
|
Date : |
05/29/2004 |
|
|
Size : |
0.49 MB |
|
|
Provides access control and usage management. When installed, it allows you to either create a list of blocked programs or a list of allowed programs. In the blocked programs mode, any program on the list is blocked. In the allowed program mode, any program NOT on the list is blocked. Which mode you choose to use depends on whether you have a few programs you want to block (in which case you would use the blocked program mode), or you have a few programs you want to allow people to use (in which case you would use the allowed program mode). In both modes, you can assign optional passwords to the programs on the list. In blocked program mode, if no password is assigned to a program, it cannot be individually unblocked. If a password is assigned to a blocked program, it can be unblocked using the password. In the allowed program mode, if no password is assigned to the program, it is never blocked. If a password is assigned to the program, it is blocked until someone enters the password for that program. passwords are useful if several people use the computer, and you want each to be allowed to use different programs. You can give each person the passwords to the programs they are allowed to use. An administrator password is required to add or remove programs from the lists or change their passwords. This provides the person who installs Program Sentry with the ability to completely control the use of a computer. All blocking can be temporarily turned off using supervisor level password. This password cannot be used to add programs to (or remove programs from) the program lists. This program is most useful in a business setting, where the supervisor needs the ability to control who can do what on each company computer. It can also be useful in a family setting, however, to give parents control of the computer to block children from using certain programs.
TournyttWatermelon SeedsMonster War:(2014 Classic Action Role Playing Game)Es tu aireJones Home ServicesVirgin MenuMoonChat!
|
|
Also See
1)
Encrypt Easy
Encrypt Easy is a highly secure file encryption program enabling fast and simple one-click encryption and decryption of single files, folders and entire directory trees. The program uses the best and ...
License:Shareware USD 29.00
Size:2.81 MB
2)
PerfectGuard
PerfectGuard helps you to protect your Operating System from viruses, hackers and unauthorized access of ill-wishers. PerfectGuard lets to increase labor productivity of your company's stuff as it pre...
License:ShareWare USD 14.99
Size:4 MB
3)
Content Scanner
Free parental control software to scan, filter, content watch and detect porn and objectionable content on user's PC. User can also clean, delete, remove and erase pornography and objectionable Conten...
License:Demo USD 29.99
Size:2 MB
content, audit, parental, controls, delete, remove, erase, clean, ography, control,
4)
Kernel Access Password Recovery Software
Kernel Access Password Recovery tool is a Microsoft Access MDB password recovery software designed to recover lost and forgotten passwords from Microsoft Access Database (.mdb) files. Kernel Access Pa...
License:Demo USD 27
Size:0.54 MB
5)
Internet SPY PC Detective
PC Pandora - PC Detective and Web Spy PC Pandora is your very own personal PC and Internet detective that hides on your hard drive and monitors all computer and Internet activity. This program will al...
License:Shareware USD 49.95
Size:10 MB
6)
MailScan 4 for NetNow
MailScan 4 for NetNow is the world's first "Real-Time" e-mail scanner for the NetNow Mail Server. This server is published by RedRock Technologies. MailScan 4 for NetNow acts like a Content-Security a...
License:Shareware USD 39.52
Size:11.06 MB
7)
LockEnd
Ultimate Protection Management of Personal Documents or Information! Lockend (Trademark Registration No. 0616956) is a compound word containing Lock and End which means The End of Security Problems!. ...
License:Shareware USD 49
Size:16.27 MB
8)
Folder Security Personal
Folder Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only ,preventing modification or deletion by other...
License:Shareware USD 39.95
Size:0.79 MB
9)
1st Security Administrator
Protect PC, restrict access to Windows applications and password-protect boot with 1st Security Administrator. This is the best password-protected security utility to apply access restrictions to PC, ...
License:Shareware USD 69
Size:1.85 MB
10)
CHAOS' Doors
Comprehensive privacy tools including file/folder encryption, e-mail encryption, file/folder shredder. The program is compact, efficient and user friendly. Required cryptographic procedures are enforc...
License:Shareware USD 39.95
Size:0.4 MB
Tags: protect, key, safety, shredder, stream, chaos, public key, public, cipher
|
1)
Secret Password Keeper
Tired of trying to remember all your different passwords? Sick of Internet Explorer's built in password saving that lets anyone using your computer access your password protected accounts? Now you can...
License:Shareware USD 19.95
Size:2.34 MB
2)
Clipboard Assistant
Clipboard Assistant is intended for an acceleration and a simplification of text operations via the Clipboard. You can use it while you are writing programs, filling Web forms, making sections of rela...
License:Shareware USD 25
Size:0.72 MB
3)
AffiliateHQ Meta Tag Wizard
Meta Tags are special HTML Tags that describe the contents of a web page. Search engines use Meta Tags to catalog and categorize the contents of a web page. If your website does not contain Meta Tags ...
License:Freeware USD 0
Size:2.12 MB
meta tags, meta tag, meta, tag, tags, affiliate, wizard,
4)
Ariolic NetSend 9x
With this small console utility you can send messages over your network on Windows 9x/Me/NT/2000. Using of the program is similarly to the command 'net send' from Windows NT or Windows 2000, but Ariol...
License:Shareware USD 9.95
Size:0.30 MB
5)
Cipherlok
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by ...
License:Shareware USD 45
Size:2.38 MB
6)
Usage Monitor
Usage Monitor lets you set watch limits on processes to know when your process is using too much. Watch limits can be placed on Memory Usage, GDI Objects, and USER Objects. This is a great tool for an...
License:Freeware USD 0
Size:1.78 MB
7)
FolderClone Professional Edition
FolderClone Professional provides fast, flexible and easy backup, synchronization, replication, and mirroring of important files on most storage media. FolderClone pro includes all of the capabilities...
License:Shareware USD 44.95
Size:6.07 MB
8)
'Span Floppies' Floppy disk backup and restore
[ASP] A program that allows backup and restore of files that span multiple floppy disks. It is not dependent upon the version of the DOS or Windows(tm) operating system. Any size file can be saved on ...
License:Shareware USD 20.00
Size:1.2 MB
9)
DPlus+Software Cleaner
D-Plus+Software Cleaner 2007 can permanently delete the history of your Internet and past computer activities. Why do you need to delete history? Maybe you don't realize that Windows and other softwar...
License:Shareware USD 19.95
Size:0.91 MB
10)
Crazy Ball
Crazy Ball is a compact and convenient toolbar that gives you the opportunity to launch the most frequently used applications from a highly unusually organized set of buttons. Adding, deleting or movi...
License:Shareware USD 14.95
Size:0.38 MB
Tags: desktop, tool, launcher, application, toolbar, buttons, ball, launch, compact
|
|
More tags: computer security, computer access control, password protect programs, password protection, computer use control, control access,
|
|