User Time Control 6.1.2.1

"User Time Control" snapshot

User Time Control Center lets you specify when exactly and how long the computer can be used. Schedule time intervals and the number of hours each child can use the computer per day a week.

Advertising
Software information
Platform:
Windows Vista/XP/2000/Server
Publisher:
Security Software Center
Price:
$15
File size:
4.72 Mb
Date added:
October 13, 2004
Screenshot:
Product page:
Description from the Publisher
User Time Control Center lets you specify when exactly and how long the computer can be used and define users which will be allowed to use the computer without any limits. You can schedule time intervals and the number of hours each child can use the computer per day a week. It automatically logs your child out of their computer when it's time for lights out. Also you can prevent the PC usage until the specified date and after the specified date.
Users reviews & testimonials

This software is not reviewed yet.

Advertising
Other downloads from this publisher

Chrome Privacy Shield protects your chrome browser private data from malware and unwanted persons. It makes any browser data (cookies, temporary files, databases, etc) unreadable for any application except the Chrome browser.

The Stop Software Installation Tool allows you to prevent users of your computer from installing unwanted software with password protection. You can specify rules according files masks to block software installers execution.

The Network Recycle Bin Tool allows you to recover deleted files. Once you have this tool in your system, it will automatically keep a track of all the network deleted files and you can easily recover them.

The Network Shared Recycle Bin allows you to backup and recover deleted files on the server side. Once you have this tool in your system, it will automatically keep a track of all the network deleted files and you can easily recover them.

Dark Files can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control".