English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by access control tool

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: Dial-Up Lock Me 2.1
Download Dial-Up Lock Me 2.1
more info
4you CST Knob ActiveX Control 3.6 by Century Soar Technology Co.Ltd.
2006-11-04
CST Knob ActiveX Control: a multi-purpose knob interface component The CST Knob ActiveX Control is a multi-purpose and highly customizable graphic component which can be designed for a knob interface. It provide a powerful alterable tool includes m
2013-03-14
It customizes the Internet Explorer Web browser, lets you apply access restrictions to web browser, restrict access to certain tabs and features of Internet Options, disable certain menu items and buttons and prevent others from editing your Favorite
CD-DVD Lock 3.03 by Getfreefile
2013-02-16
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives.
2013-02-19
Internet kiosk public access PC software to restrict access to system; allow only certain applications and features such as Internet Explorer. Ideal for Internet cafes, public libraries, information terminals or kiosks.
2007-06-16
Net Control 2 is a powerful remote control and administration tool for administrators of school, office, home and other local networks
2008-04-06
Tattoos for women, screen saver, cadillac ranch pictures taken over the winter of 08
2008-06-10
Security software used for protecting Windows-based workstations over a corporate network. It lets you remotely restrict access to all PC workstations in your network, apply executable patches to them, and schedule reboots, shutdowns, and etc.
2016-04-21
Axence nVision Free is a tool for professional network monitoring. Completely free of charge, both for home and commercial use.
2017-08-01
Metadefender Cloud Client is a free malware analysis tool that investigates the sanity of your system. It uses 40+ anti-malware engines, anti-malware log file analysis, and multiple IP reputation sources to identify any potential threats on a device.
0.030