This free program searches for protected Excel files on the disk of a computer or laptop. The result of the application is a list of all encrypted Excel files in the specified folder or on the selected drive. The program can be useful in cases where the user has forgotten the name of the encrypted file. The resulting list of protected documents makes it much easier to find the right Excel document.
Eusing Maze Lock uses a pattern based technique to lock your computer. You need first to set your own unlock pattern by connecting some of the nine dots together or keep the default unlock pattern. The next time you need to unlock the pc, the pattern and image must be entered correctly. It can lock your computer with a single click on the tray icon or using a custom hotkey. It can change the lock screen background image, the pattern size etc.
The most optimal parental control for all Windows-PCs (incl.Vista). Set time limits for the PC and/or the Internet and block/filter unwanted Internet contents. Limit access to internal Windows components and personal folders. A protocol informs you at any time as to what happened on your computer and when. Access is protected via password. Several safety steps for young computer freaks that are too smart.
ECS Safe Lock is a handy utility that you can use to create a protected environment and put inside it all the files and folders you want to have secured. The privacy of your documents is ensured at all times, as soon as you press 'Lock' in the vault's main area. You will have to remember and keep well the password after changing the default one because there is no other way of accessing the items inside the safe.
The 'USB Safe Guard' product converts regular USB to secure USB. This secure USB can have an expiration date and expiration count policy. Secure USB can be opened with read-only or read/write privileges. In addition, administrators can remotely control the use of secure USB. You can also receive USB usage logs by email.
This small and very simple utility will help to remove password from zip archive if the user has forgotten it or lost it. With this software you can very quickly find the required password, no matter how many files are included in the ZIP archive. The program interface is intuitive and contains several tinctures for the most effective search.
Can't you remember all your passwords and write them on slips of paper? The alternative solution is the software abylon LOGON SSO Home. During the Windows login you must insert only a smart card, a CD or a USB flash drive and an optional password. The windows login and all further password and user-name inputs will be done automatically by the software. And when you remove your key, the computer will be logoff or shutdown immediately.
TekRADIUS LT is a RADIUS server for Windows. You're free to use freeware version for both commercial and personal use. TekRADIUS LT tested on Microsoft Windows (Vista, Windows 7/8/10, 2008-2019 Server).
WebAllow turns your browser into a kiosk type software. WebAllow integrates with Internet Explorer and allows to block all but approved URLs to be visited on the PC. Block questionable content from your kids eyes! Only allow a set of selected domain names to be viewed in Internet Explorer. Block adult sites, violent material, objectable content or anything you want to block on a PC. Blocked web pages are not even downloaded on to your computer.
Each visit to the Internet discloses your identity to Web providers – often, without you noticing or wanting this. And also your Internet provider can exactly see which Web sites you visit and what kind of data you upload or download. When you use a WLAN (Wireless Local Area Network) or a hot spot to access the Internet wirelessly, for example at a train station, an airport, or in an Internet café, it won't be a problem for anyone to spy on you.
Today in the engineered world many users have major problems with the multitude of passwords. With the software abylon LOGON SSO Pro, the user only authenticate once at the windows logon and have additionally an automatic access to password protected applications. The program boasts with high flexibility, centralized administration and enhanced protection against keyloggers and phishing attacks.