Описание: With iNet Protector you can restrict access to the Web and password protect Internet connection. You can restrict internet access at specified times or on demand. You can disable connection completely or limit Internet to work with allowed programs and services only. In order to fully enable Internet access, user defined password must be entered. You can easily schedule Internet availability. Timer allows you to disable Internet connection after specified amount of time. Very useful for parents and business owners.
* Restrict Internet access at specified times
* Password protect Internet connection
* Enable and disable Internet on demand
* Allow Internet access for a specified amount of time
* Allow only specified services or programs such as e-mail
* For Parents - Protect your kids from using Internet too much
* For Businesses - Keep employees from online entertainment at work
AeroTags HTML Password Protector - Use this unique HTML and TXT files password protection utility to turn HTML and text files into new HTML files with customizable password verification form! Command line and wizard modes along with one-click power protection make it a must-have!
Webmaster Password Generator 1.20 - Вышла новая версия генератора паролей. Эта утилита представляет собой мощный инструмент для создания псевдослучайных комбинаций паролей. Для генерации последовательности
Password Boss 1.3 - Вышла новая версия удобного и многофункционального хранителя паролей. Password Boss обеспечит вам безопасное хранение и использование любых паролей и другой
Lizard Protector Web Content Security: By Invitation Only! - The web is a very convenient media for conveying information to the masses. However, not all information is made to be shared by everyone, especially where information is confidential and privy only to certain parties. The easiest way to shield sensitive information from prying eyes is to password-protect
Wireless Protector - a smart security tool for corporate networks - Corporate networks are usually a mix of standard and wireless connections with varying levels of security. The average corporate user rarely thinks about this aspect of the company’s infrastructure and uses any available connection to log in to the network. However, when a Wi-Fi enabled device is connected (via