Windows XP Security Console 3.5

Doug Knox in Security & Privacy \ Access Control

When you're outside of a domain environment, XP has some features missing. XP Home leaves you completely without the Group Policy Editor, while XP Pro lacks the ability to use the Group Policy Editor to selectively apply policies to specific users. Only one user profile, either the currently logged on user, or a "loaded" user profile, can be loaded at one time. However, with the licensed version, you can create a "default"...


   
 
Related Software

WinGuard 10.2.1 WinGuard  Access Control

WinGuard locks your Desktop programs and Store apps using password protection. It does this by scanning for programs you add to its blacklist. If a match is found, WinGuard stops the application and displays a password prompt. Lock any app with password; Lock Software Installations; Lock MS...

GlassWire Firewall 2.0.123 GlassWire  Firewalls

GlassWire's free firewall software helps protect your privacy & security by monitoring your network activity for suspicious activity. You'll be shocked by how many applications on your computer are sending your private data over the Internet without you knowing. Once suspicious activity is...

GlassWire Data Usage Monitor 1.2.303r GlassWire  Anti-Spam & Anti-Spy Tools

Instantly see which apps are wasting your data, acting suspiciously, slowing your phones Internet speed, or causing you to go over your carrier data limits. GlassWire makes it easy to keep track of your mobile carrier data usage and WiFi Internet activity. Key features: See a live graph of...

UFS Explorer Standard Access 5.25 SysDev Laboratories LLC  File & Disk Management

The software enables fast and easy access to blocked data. With the support of a wide variety of operating systems, UFS Explorer Standard Access allows you to open an inaccessible file from Windows, Apple macOS, Linux and FreeBSD working on a device, that is running on Windows OS. The software...

Comodo Internet Security 11.0.0.6606 Comodo Security solutions, Inc.  Anti-Virus Tools

Comodo Internet Security is the awarding winning and free security solution for Windows that uses a powerful combination of antivirus, firewall, auto-sandbox, host intrusion prevention and website filtering to immediately protect your computer from all known and unknown malware. Our real-time...

objectiF RPM 4.3 microTOOL GmbH  Project Management

Software for Application Lifecycle Management. It combines model-based requirements engineering and management, system design, agile and classic project management approaches and agile testing in one solution. The tool offers visual requirements analysis and specification (use case modeling,...

SSuite Agnot StrongBox Security 2.2.1 SSuite Office Software  Encryption Tools

Now this is what I call real security!... You may use any one of nineteen, industrial and military strength, encryption ciphers to secure your most precious private information. There is BlowFish, TwoFish, CAST-128, Cast-256, DES, 3DES, ICE, Thin ICE, ICE2, IDEA, MARS, Misty1, RC2, RC4, RC5,...

SSuite Picsel Security 2.8.1.1 SSuite Office Software  Encryption Tools

Ever wanted to sidestep the Overlords of the internet with some real military grade encryption?... Well... today is your lucky day... our Picsel application is a single, stand-alone, non installing, portable application that encrypts any and all plain text messages or text files with just one...

Top Lead Extractor 3.1.17 Ahmad Software Technologies  Search Tools

Top Lead Extractor is an easy-to-use, fast and result-oriented contact(i.e. email, Phone, Skype, MSN, AOL, Yahoo, and ICQ IDs) extractor software. It extracts your targeted customer's contact information from your selected search engines like Bing, Google, Yahoo, Ask, Yandex, Baidu, Mail RU,...

SoftPerfect WiFi Guard 2.0.2 SoftPerfect  Network Monitors

SoftPerfect WiFi Guard is an essential tool for everyone running a small wireless network and striving to keep it secure. Generally, modern WiFi networks are well protected, but they have a few weaknesses that can compromise your WiFi password; this includes vulnerabilities in encryption and...