by VRCP Soft
The program complex 'Accounting of Admissions' is intended for the organization of the automated work with the electronic database containing information on admissions (constant, temporary or single) on the protected objects for the purpose of implementation of additional control of the entering/leaving persons, and also the driving/leaving motor transport. The program complex mostly is intended for installation and operation on the automated workplace in 'Bureau of admissions' or on a post of protection of the organization (enterprise) of any size, for the purpose of delivery and implementation of further control of electronic or paper admissions of employees and visitors.
See history of changes
Released:February 1, 2016
Platforms:Windows 2000, Windows XP, Windows Vista, Win7 x32,Win7 x64,WinOther,WinServer
Requrements:HDD:32mb, RAM:80mb, DPI:24(25%),48(50%),72(75%),96(100%),120(125%),144(150%)
Install:Install and Uninstall
PCAA review by Jacqueline (Feb 9, 2017)
This application can be implemented on any organization where keeping records of everyone's entry is an important issue whether it is employee or visitor. This is fully automated electronic system helpful for preparing reports based on admission and exit time.
Lobby Track Access Control Software is a new secure tracking, access control, and visitor management software system. This innovative new technology allows organizations to track employees and equipment with detailed activity logs by individual or groups
Media Access Control Address Update is a useful package that was designed in order to provide a quick means of updating the Network Adapter EEPROM MAC address for Lenovo systems.
This Media Access Control Address Update is especially tailored
Management of Access Control in the Enterprise is a handy utility that is aimed at system admins. The purpose of the application is to facilitate data collection and it can target one or more servers.
After the information is gathered, administrators
RDMC Swap Access Control Entries is an easy to use application that you can use to replace an existing ACE with a new one.
This is useful when you want to find and replace specific users and groups with other ones, thus assuring data security
RDMC Access Control List Restore allows you to recover the backup files that you generate using RDMC Access Control List Backup.
The files are restored in the same folder structure. You just have to select the backup file and press the 'start'
RDMC Access Control List Backup is an application that allows you to backup all file and folder access control list to a text file.
The application is useful when trying to capture the security settings on data servers. Then, if you migrate
HSLAB Access Control is a advanced and flexible software for the tracking of the staff working hours usage in a corporate networn or on a terminal servers. There are a many programs to resolve a similar problems. Part from them - simply spyware programs
CD Access Control Professional checks all inserted compact disks againts a set of rules.
these rules determine whether the disk is allowed to be run or ejected from the system.
When a CD is ejected a message is displayed.
Schedule when a disk can
This tool enables customers with Windows Azure Access Control Service 1.0 namespaces to migrate them to Access Control Service 2.0.
When using the ACS 1.0 Migration Tool to copy data between an ACS 1.0 namespace and an ACS 2.0 namespace, the
Smart Database Viewer has features which helps you to become mobile with your database. On your Microsoft windows based SmartPhone view MS Access, Oracle, Foxpro, dBase, MS Excel, MySQL and Any ODBC Compliant Database. You can view the database records
Most popular Access Control
Are you afraid that one day somebody will steal your expensive Series 60 smartphone or you may just leave it and someone can use your confidential data? Just stop worrying and secure your phone with Phone Guardian.
Phone Guardian for Series 60
myWIFIzone blocks Freeloaders from using your WIFI network to access the internet. Features real-time intruder alerts and logging. Compatible with WEP/WPA security tools. Can be upgraded to support WIFI hotspot services.
Easy Drive Lock is a fast drive lock & green software that can lock any Harddisk drives in seconds. Without your password, nobody can access files on locked drive. This guarantees the program will never lose your data. Download and try it to make sure
Most everyone has files or folders on their computer that they do not want to share with others. The best way to protect your personal information is to make the folders visible ONLY to you. Free Hide Folder is a free computer security software to hide
Multi-Screen Remote Desktop (MSRD) displays screens of other computers on your screen. Allows you to use your keyboard and mouse to control the other computers remotely.
MSRD is fast, secure and affordable remote-control software that enables you to
FREE Parental Control Filter software program that helps parents to monitor and control the child's use of the Internet.
With our FREE Parental Control Filter you can filter-out websites, blogs, e-mails and instant messages if they contain inappropriate
Intertraff Parking Manager is an ANPR (Automatic Number Plate Recognition) software which allows keeping track of vehicles entering and exiting a Parking Lot. Once installed and running Operator has the ability to monitor each vehicle's registration plate
Internet Password Lock is a software program for Windows 2000/XP/NT computers (does not work on Windows 95/98/Me) that allows you to password protect all access to the Internet. This includes Web surfing, Instant Messaging, and email. Parents can use
XP Tweak allows you to customize your access control settings for your Windows software. Lots of people using your computer? Don't want them changing your settings? XP Tweak is the program for you. And it's free! XP Tweak also comes with an Internet
Palm PR, Intertraff number plate recognition software, runs on any Microsoft Windows 2003 PDA.
Through a Compact Flash Camera, Palm PR analyses continuously the live picture looking for number plates. Once a vehicle plate is detected, the number is recognized
PCAA Author's Software
The utility is intended for start of process on behalf of other user (use example: isrunas.exe -u user_name -p password c:/path_name/process_name.exe).
Dizzy-smileys (smiles, emotions, emoticons) are small graphic (animated or static) images of the main character, his friends and relatives from the computer game of the same name developed by the Code Masters company. Dizzy represents a cheerful yaytsepodobny
The small multinotepad disappearing in a tray of an operating system, allowing to store, look through, create and to change small text, graphic, sound and file records. Will help to keep quickly and always to have near at hand links to often used documents
The screen ruler by means of which it is possible quickly and with ease to measure in pixels any objects on the screen of the monitor (desktop). As the tool can it is useful to the webmaster for creation of pages of websites, to the programmer for creation
Summary of all data carriers connected to the computer (to FDD, HDD, FlashDrive, CD/DVD/Blu-Ray, network, virtual, RAM disks, etc.). Data of the fields 'S/N' (in a DEC format) and 'Label' can be used for a filtration of the processed disks in utilities
Visual monitoring (control) of availability of a host (network resource) in the local computer network, the Internet, etc. to its IPv4-address, by periodic sending to it inquiries under the ICMP protocol. In the course of work the LOG file containing
Visual monitoring (control) of a network traffic from all network interfaces (devices) which are available in system, and also providing the main statistical information on the data transmitted through them. Display of the current entering and proceeding
Configuration and start with necessary parameters of the UnrealSpeccy emulator (emulation of the personal ZX Spectrum computer). There is an opportunity to store some configurations. Thin control of the main timings of the emulator, installation and control
Automatic removal of unnecessary files (garbage, temporary files, viruses and other harmful programs) from the removable data carriers connected to the computer (a flash disks, removable hard drives, etc.). By results of work detailed record (in the LOG
Updating of date and time of creation, change and opening of the chosen group of files and folders. Can be useful for the programs determining an order (priority) of work with files by their freshness. Use: to determine necessary system date and time