Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1621)
- Business (4268)
- Communications (1275)
- Desktop (189)
- Development (614)
- Education (177)
- Games & Entertainment (714)
- Graphic Apps (690)
- Home & Hobby (107)
- Network & Internet (579)
- Security & Privacy (529)
- Servers (65)
- System Utilities (11778)
- Web Development (291)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
Activity and Authentication Analyzer 1.64.0.11
Security & Privacy :: Access Control
Your PC keeps records of both your online and off-line activity. Any of the Web Pages, Movies, Pictures, Sounds, E-mail and Everything Else you have ever viewed could easily be recovered - even after many years passed! This is a serious threat to the legitimate user's privacy. Activity and Authentication Analyzer is a solution to this problem. AAAnalyzer is the powerful security software, which has been primarily destined to comprehensive search, analysis, the user activity traces left after work. The activity analysis and authentication or how it is called in brief ?statistics?, as the method of information (intelligence data) collection is applied either for the preliminary exploring or when the access to information (posted message, telephone talk) is impossible or unwanted. As applied to the computer security topics the activity analysis and authentication is performed when it is impossible to get documents? copies, which user worked on, for example, stored either on ciphered or dismounted disk containers. Nevertheless, ?nothing is disappeared without any trace? and it is possible, therefore, to disclose much useful data from the documents? names, Internet addresses, which were visited, the applications? names which were launched or file names which were searched, last user?s logon name. Windows 95/98/NT/2000/XP/2003/Vista/7/8/8.1/10/11 has the system registry database, which is useful, for the first, to the very OS, but, for the second, for keeping many traces (evidences in other words) left by routine work and for either exploration, or for reconstruction of user?s activity. Its built-in functionality allows to search the traces left in system registry, stored in registry keys related to the activity and authentication analysis
Specifications:
Version: 1.64.0.11 |
Download
|
Similar Products:
FOLDER PASSWORD LOCK PRO 11.8.0.1214
Security & Privacy :: Access Control
Folder Password Lock Pro is a professional security tool to lock, hide and protect your folders and files. With very easy to use interface, just a few click, you can lock your folder and keep it safe, no one can open it without a password. This tool also provide protect for your folder and files to avoid delete, modify by mistake. You can also monitor a specified folder, any file created, modified and deleted will be logged.
Windows | Shareware
Read More
Security & Privacy :: Access Control
abylon LOGON protects your computer against illegal access in a comfortable kind. You need only to train a smart card, a USB stick or a CD with your login data. In future you need only this physical key for the login authentication. If you leave the computer you need only to pull the smart card or the USB stick and your computer automatically lock or logoff. Thus protect your computer against snoopier views and data theft without large training.
Windows | Shareware
Read More
CAYO | SUSPEND? FOR ACTIVE DIRECTORY 1.0.1
Security & Privacy :: Access Control
Deleting and disabling Active Directory user and group objects is simply not-enough. Permanent or temporary SUSPENSION retains these objects for critical Audit, Compliance and Security purposes. Suspension can also be used for accounts that will be re-activated when an employee or contractor arrives to work. Watch a demo or buy a permanent license at Cayosoft.com.
Windows | Freeware
Read More
Security & Privacy :: Access Control
Prevent data loss using USB Block. It lets you protect your files, documents, presentations and more stored on your PC. You can Block all such devices and drives that you do not trust and whitelist only the trusted, known devices you use. USB Block works on 32-bit and 64-bit versions of Windows 10/ 8/ 7/ XP and more. Protect the ownership of your files and folders by all means necessary.
Windows | Shareware
Read More




