Internet Access Controller v220.127.116.11
Internet Access Controller is a leading software tool for controlling, blocking web sites and restricting internet & network access.
Internet Access Controller can restrict internet access at specified times or on demand. You can password protect an internet connection. Protect your computer from viruses, trojans, worms that can be contracted from malicious websites or programs. Great for parental control or to prevent employess from inappropriate internet usage. You can block, limit or allow which programs and services have access to the internet. The timer feature allows you to disable the internet connection after a specified amount of time. IAC gives you complete control over your computer's network connection.
Key features and benefits
- Restrict internet and network access automatically at specified times
- Password protect internet and network connection
- Enable and disable internet on demand
- Allow internet access for a specified amount of time
- Allow only specified services or programs such as e-mail
- Allow only specified web sites
- Block specific web sites and allow the rest
- Set daily internet usage limits applied to all users or only specific users
- For Parents - Protect your children from the dangers of the web and limit online usage
- For Businesses - Keep employees from online abuse at work
Parents: Protect your children
- Limit time spent online
- Automatically turn off internet at night or at any other inappropriate time
- Block harmful programs, such as chat and online games
- Protect your computer from malicious websites or programs.
Businesses: Increase employee production at work
- Increase productivity by limiting temptation for inapporpriate web surfing.
- Only allow websites needed for daily tasks.
- Block unwanted websites or games.
- Only allow access to programs such as email, file sharing and business related programs.
WinXP, WinVista, WinVista x64, Win7 x32, Win7 x64, Win2000, Windows2000, Windows2003, Windows Vista Ultimate, Windows Vista Ultimate x64, Windows Tablet PC Edition 2005, Windows Media Center Edition 2005, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, Windows Vista Home Basic x64, Windows Vista Home Premium x64, Windows Vista Business x64, Windows Vista Enterprise x64
Programs similar to Internet Access Controller
|Logon Sentry||November 25, 2013|
Recognize the person that endeavors to enter your computer
|File size: 6.97Mb||License: Shareware||Details|
|D-Guard Anti-DDoS Firewall||September 10, 2010|
D-Guard Anti-DDoS Firewall is an accurate protection against DDoS attacks with built-in Intrusion Prevention System. Features protection against SYN, TCP Flooding and other types of DDoS attacks. Stops over 2, 000 types of hacker activities, such as Port scan, and SQL injection.
|File size: 6.4Mb||License: Shareware||Details|
|UltraVNC||December 07, 2009|
Access multiple PCs remotely from one machine.
|File size: 1.8Mb||License: Freeware||Details|
AirStop Endpoint Security Software prevents data leakage via I/O port control.
|File size: 3.37Mb||License: Commercial||Details|
Get remote control software that used 'DirectX' and 'GDI+'.
|File size: 0.1152Mb||License: Freeware||Details|
Quality Time lets you limit PC usage to particular times of the day
|File size: 0.37Mb||License: Shareware||Details|
|Visionapp Remote Desktop||August 24, 2010|
Manage and access multiple servers and desktops.
|File size: 95Mb||License: Shareware||Details|
|True System Security Tweaker||March 24, 2013|
It is a security utility for tweaking and optimizing Windows operating system
|File size: 1.18Mb||License: Freeware||Details|
|AAA PC Remote Control Software||August 31, 2002|
Control remote computer via mouse &keyboard
|File size: 1.1Mb||License: Commercial||Details|
|USB Devices Monitoring Software||December 03, 2008|
LAN USB drive blocker tool prevent unauthorized pen drive access and data theft
|File size: 2.91Mb||License: Shareware||Details|
administrate, Time, block, connection, exchange, open, Bridging, Scheduling, Enforcement, communication, blocker, Keyloggers, Firewire, file transfer, software, control, Passwords, protection, source, authentication