(Page 5 of 5)   < Prev  1 2 3 4 5 

Category: Access Control » Applications

Folder Guard Jr.
Added 2001-10-22
by WinAbility.Com
Folder Guard Jr. hides and restricts access to any file folder of your choice. Makes the folder invisible to Explorer and other Windows and DOS applications.

Added 2001-10-22
by Grover Industries, info@groverind.com
VoiceSecureIt is a simple easy-to-use voice authentication utility for Windows 95, Windows 98, and Windows NT 4.0 (Workstation or Server). This application allows you to logon your computer system with just your voice.

Added 2001-10-22
by rpuckett@cisco.com
Replaces the command interpreter values for jsefile, jsfile, vbefile, vbsfile, wsffile, wshfile types under HKCR with the one from txtfile (NOTEPAD). In this way the file extensions are opened in NOTEPAD and not with the WSCRIPT or CSCRIPT .EXEs The script also creates a .INI that stores the previous values before overwriting them (for restore purposes). This is a useful preventative measure to keep "worms" of the ILOVEYOU type from propagating. Requires kix32 scripting program. (www.Kix32.com)

Advanced Security Control
Added 2001-10-22
by SmartLine, Inc., asc@protect-me.com
Advanced Security Control (ASC) lets administrators set rules for a local computer, defining when any program can be executed and by whom. You control access to any 32-bit software (games, internet browsers, etc.) depending on the time of day and day of the week. Configuration is easy. Simply select a program, define its users to be restricted, then choose when to enable or disable its access on a one-week grid. If a user tries to access the program outside its allowed hours, that user is given an access-denied message. ASC enhances access control for Windows NT Systems Administrators and helps maintain a more secure environment.

RASLock Millennium Edition
Added 2001-10-22
by SmartLine, Inc.
RASLock Millennium Edition is a client/server tool that enables to set user-level security for the Internet Dial-Up (RAS) connections. Using RASLock Me you can limit incoming and outgoing traffic, limit time online and set allowed/denied time periods for any user on a Windows 95/98/Me. It enhances the standard Windows security by allowing you to control the Internet access via modems (standard, ISDN, etc.).

Added 2001-10-22
by Movilogic
CryptoHack is a HackMaster extension, which encrypts the databases from any application. The user chooses a password and the application that he wants to keep safe, and immediately, CryptoHack encrypts the database. When the application runs, CryptoHack requires the password. If it's valid, CryptoHack decrypts the database, and the user gains access to it. Then, when the program shuts down, the database is encrypted again. In the case that the device shuts down while the protected application is being used, CryptoHack will encrypt the database and let the program shut down normally. The password will be keep in the system only during the processes of encryption and decryption.

VisualSoft FileSecure
Added 2001-10-22
by VisualSoft Technologies
VisualSoft FileSecure 1.0 is a cute cryptographic product that helps encrypt/decrypt files and/or folders using symmetric key mechanism. It incorporates powerful Blowfish algorithm for the process of encryption and decryption. It supports file compression and secure file transfer using FTP. It encrypts selected files and/or folders and produces a self-decryption archive. The encrypted file can be decrypted simply by double clicking the archive with the given passphrase.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus