Filters
Categories
Top downloads
- Kindle for PC 2.5.70951
- Windows Installer Cl...
- Opera Mini for Java ...
- Avast Virus Definiti...
- Trojan Remover 6.9.6...
- Windows 7 Service Pa...
- PlayStation Portable...
- Total Commander 11.03
- VMware Workstation P...
- SmartSniff 2.30
- UC Browser for Java ...
- Unlocker 1.9.2
- Microsoft Zune 4.8.2...
- AutoCorect 4.1.5
- AAMS Auto Audio Mast...
Recommended downloads
LUPC: Set time limits and monitors child 5.08 | iProtectYou Pro 8.8 | |
LUPC monitors and limits user time on your computers. Once you have set up all the users accessing the PC(s) in your home, you can then set maximum daily or weekly time limits for each person. LUPC limits the used time on internet, programs or... | Internet filtering / parental control and network monitoring software that protects kids from harmful information on the Internet | |
Download here | Download here Buy full version |
Access Control
Sort by:
ID Firewall 1.2
ID Firewall is a specialized firewall application designed to ensure safe and controlled network access as well as acting as a checkpoint against attacks from outside and inside your computer.
ID Firewall is a specialized firewall application designed to ensure safe and controlled network access as well as acting as a checkpoint against attacks from outside and inside your computer.
Shareware,
Updated 14 February 2016
Downloads
238
238
Last week
1
1
Privacy Inspector 2.00
Privacy Inspector is a program to to clean up the history of your activities on a computer and protect your privacy online.
Privacy Inspector is a program to to clean up the history of your activities on a computer and protect your privacy online.
Shareware,
Updated 27 September 2007
Downloads
216
216
Last week
1
1
Private Data Safe 1.0
Private Data Safe guarantees data protection and data safety for data files, folders and program files - including data on removable data carriers and data shared and exchanged with other users
Private Data Safe guarantees data protection and data safety for data files, folders and program files - including data on removable data carriers and data shared and exchanged with other users
Demo,
Updated 12 October 2013
Downloads
170
170
Last week
2
2
Access Denied XP 1.2
Security program that request username and password on boot-up and lock your desktop by one mouse click. All unwanted people are getting away from your computer. It is stronger what Windows XP security. Track of used programs.
Security program that request username and password on boot-up and lock your desktop by one mouse click. All unwanted people are getting away from your computer. It is stronger what Windows XP security. Track of used programs.
Shareware,
Updated 2 December 2021
Downloads
323
323
Last week
1
1
Active System Locker 3.2
Use System Locker to restrict access to your PC by locking keyboard and mouse. It has startup and automation options, supports audit and scheduling features. Protects your system when you are away. Extremely effective for home and office use.
Use System Locker to restrict access to your PC by locking keyboard and mouse. It has startup and automation options, supports audit and scheduling features. Protects your system when you are away. Extremely effective for home and office use.
Shareware,
Updated 4 February 2023
Downloads
347
347
Last week
5
5
Content Scanner 1.0
Free parental control software to scan, filter and detect porn and objectionable content on user's PC. User can also clean, delete, remove and erase pornography and objectionable Content.
Free parental control software to scan, filter and detect porn and objectionable content on user's PC. User can also clean, delete, remove and erase pornography and objectionable Content.
Demo,
Updated 14 October 2022
Downloads
1,674
1,674
Last week
1
1
R-Guard 2.2
R-Guard is a reliable data security tool for advanced access right control, encryption and audit, which extends them much beyond the scope of the standard Windows security services.
R-Guard is a reliable data security tool for advanced access right control, encryption and audit, which extends them much beyond the scope of the standard Windows security services.
Shareware,
Updated 2 October 2006
Downloads
310
310
Last week
1
1
Dekart Logon for Citrix ICA Client 2.02
Stop memorising logins, passwords, Citrix servers and manually entering them; store all your Citrix connections on one USB flash drive, smart card, or token; enjoy automated access - simply insert the USB drive and pass convenient identification.
Stop memorising logins, passwords, Citrix servers and manually entering them; store all your Citrix connections on one USB flash drive, smart card, or token; enjoy automated access - simply insert the USB drive and pass convenient identification.
Shareware,
Updated 19 July 2018
Downloads
421
421
Last week
2
2
Unlock Administrator 2.00
Administrative program that allows you to specify which users can access a locked Windows workstation. Can also be configured to prevent non-administrative users from unlocking an administrator’s session and restrict program configuration.
Administrative program that allows you to specify which users can access a locked Windows workstation. Can also be configured to prevent non-administrative users from unlocking an administrator’s session and restrict program configuration.
Shareware,
Updated 22 October 2013
Downloads
991
991
Last week
1
1
Dekart Logon for Lotus Notes 1.02
Protect access to Lotus Notes with smart cards, USB disks and biometrics. Dekart Logon for Lotus Notes performs high level user authentication, ensuring that only authorized users can access Lotus Notes data and resources.
Protect access to Lotus Notes with smart cards, USB disks and biometrics. Dekart Logon for Lotus Notes performs high level user authentication, ensuring that only authorized users can access Lotus Notes data and resources.
Shareware,
Updated 19 July 2018
Downloads
365
365
Last week
3
3
AlertMobile Pro 4.0.2
AlertMobile is a special software for computer security incidents response. It monitors all attempts of unauthorized computer activity, sends SMS alerts to mobile device, receives and handles response commands.
AlertMobile is a special software for computer security incidents response. It monitors all attempts of unauthorized computer activity, sends SMS alerts to mobile device, receives and handles response commands.
Shareware,
Updated 4 April 2006
Downloads
488
488
Last week
2
2
ShadowIMSniffer 4.01
ICQ/MSN Monitor-Sniffer is a handy network utility to capture and log/monitor ICQ/MSN Instant Messages from computers within the same LAN. ICQ/MSN Monitor Sniffer supports messaging through ICQ/MSN server with formats of plain text,RTF or HTML.
ICQ/MSN Monitor-Sniffer is a handy network utility to capture and log/monitor ICQ/MSN Instant Messages from computers within the same LAN. ICQ/MSN Monitor Sniffer supports messaging through ICQ/MSN server with formats of plain text,RTF or HTML.
Shareware,
Updated 29 January 2023
Downloads
12,773
12,773
Last week
3
3
FileGhost 1.0
Security tool used to protect your files, folders or even whole volumes in various ways. You will be able to lock, hide, deny file reading and writing, prevent deleting, copying, moving. FileGhost is excellent supplement to antivirus and firewalls.
Security tool used to protect your files, folders or even whole volumes in various ways. You will be able to lock, hide, deny file reading and writing, prevent deleting, copying, moving. FileGhost is excellent supplement to antivirus and firewalls.
Shareware,
Updated 26 June 2013
Downloads
282
282
Last week
1
1
ShadowSecurityScanner 7.55
Shadow Security Scanner (network vulnerability scanner) has earned the name of the fastest — and best performing — security scanner in its market sector, outperforming many famous brands.
Shadow Security Scanner (network vulnerability scanner) has earned the name of the fastest — and best performing — security scanner in its market sector, outperforming many famous brands.
Shareware,
Updated 29 January 2023
Downloads
354
354
Last week
2
2
Secure Folders XP 3.0
This application combines the ultimate power of industry-standard strong data protection algorithms with unique stealth technologies to shelter your confidential information from both unauthorized access and destruction by malicious programs.
This application combines the ultimate power of industry-standard strong data protection algorithms with unique stealth technologies to shelter your confidential information from both unauthorized access and destruction by malicious programs.
Shareware,
Updated 27 November 2014
Downloads
359
359
Last week
1
1