|
More tags: logging, user activity, restriction, audit, ban list, disable programs, security, parental control, security audit, logging, user activity, restriction, audit, ban list, disable programs, security, parental control, security audit,
|
Category : |
Utilities - Security |
|
|
|
Platform : |
WinXP, Windows2000, Windows2003, Windows Tablet PC Edition 2005, Windows Media Center Edition 2005, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, Windows Vista Ultimate, Windows Vista Home Basic x64, Windows Vista Home Premium x64, Windows Vista Business x64, Windows Vista Enterprise x64, Windows Vista Ultimate x64 |
|
|
Price : |
USD 24.95 |
|
|
Developer: |
|
|
|
Rating : |
|
|
|
License : |
Shareware |
|
|
Limitations: |
15 Days |
|
|
Date : |
02/14/2008 |
|
|
Size : |
4.06 MB |
|
|
Software In :
Utilities
Security
logging, user activity, restriction, audit, ban list, disable programs, security, parental control, security audit, logging, user activity, restriction, audit, ban list, disable programs, security, parental control, security audit,
|
The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and using removable media. Using this software to become possible to receive the anformation about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole. Also you can restrict access to some programs (using file tame or keyword) or to CD/DVD/Zip and other removable media. This is very useful for the rigid control over use of computer systems in business and for the parental control over children's actions. The program is NOT keylogger and does not write any keystrokes! This is a principle position. The information, collected by the program is more enough for the control over use of a computer and without recording of the user's passwords. Using this software you can: - record user's activity; - record actions only the selected users or all users; - record the restricted actions or all actions; - use a ban list for prevention of some actions; - rectrict access to removable drives end execute some actions when the restriction occur; - rectrict access to programs end execute some actions when the restriction occur; - rectrict access by keywords end execute some actions when the keyword found; At access to removable drives you can set the following actions: - write information about this event to log and continue; - eject removable media and continue; - shutdown Windows. At access to programs you can set the following actions: - write information about this event to log and continue; - kill restricted program and continue; - shutdown Windows.
DH2012Logos CaptionPaoloToldo.IT App[무협]천검제(전9권,완)-에피루스 베스트소설
|
|
Also See
1)
Program Sentry
Provides access control and usage management. When installed, it allows you to either create a list of blocked programs or a list of allowed programs. In the blocked programs mode, any program on the ...
License:Shareware USD 25
Size:0.49 MB
2)
PerfectGuard
PerfectGuard helps you to protect your Operating System from viruses, hackers and unauthorized access of ill-wishers. PerfectGuard lets to increase labor productivity of your company's stuff as it pre...
License:ShareWare USD 14.99
Size:4 MB
3)
Content Scanner
Free parental control software to scan, filter, content watch and detect porn and objectionable content on user's PC. User can also clean, delete, remove and erase pornography and objectionable Conten...
License:Demo USD 29.99
Size:2 MB
content, audit, parental, controls, delete, remove, erase, clean, ography, control,
4)
Kernel Access Password Recovery Software
Kernel Access Password Recovery tool is a Microsoft Access MDB password recovery software designed to recover lost and forgotten passwords from Microsoft Access Database (.mdb) files. Kernel Access Pa...
License:Demo USD 27
Size:0.54 MB
5)
Internet SPY PC Detective
PC Pandora - PC Detective and Web Spy PC Pandora is your very own personal PC and Internet detective that hides on your hard drive and monitors all computer and Internet activity. This program will al...
License:Shareware USD 49.95
Size:10 MB
6)
MailScan 4 for NetNow
MailScan 4 for NetNow is the world's first "Real-Time" e-mail scanner for the NetNow Mail Server. This server is published by RedRock Technologies. MailScan 4 for NetNow acts like a Content-Security a...
License:Shareware USD 39.52
Size:11.06 MB
7)
LockEnd
Ultimate Protection Management of Personal Documents or Information! Lockend (Trademark Registration No. 0616956) is a compound word containing Lock and End which means The End of Security Problems!. ...
License:Shareware USD 49
Size:16.27 MB
8)
Folder Security Personal
Folder Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only ,preventing modification or deletion by other...
License:Shareware USD 39.95
Size:0.79 MB
9)
1st Security Administrator
Protect PC, restrict access to Windows applications and password-protect boot with 1st Security Administrator. This is the best password-protected security utility to apply access restrictions to PC, ...
License:Shareware USD 69
Size:1.85 MB
10)
CHAOS' Doors
Comprehensive privacy tools including file/folder encryption, e-mail encryption, file/folder shredder. The program is compact, efficient and user friendly. Required cryptographic procedures are enforc...
License:Shareware USD 39.95
Size:0.4 MB
Tags: protect, key, safety, shredder, stream, chaos, public key, public, cipher
|
1)
Invisible Private Folder
The Invisible Private Folder can help you keep your files protected from kids, friends and co-workers. It allows you to add any folders to the virtual invisible private folder. It enables you to block...
License:Shareware USD 14.95
Size:1.01 MB
2)
Serial Port Terminal
Advanced Serial Port Terminal is a session-based, multi-purpose application that provides simple communication interface to connect to any serial port device (modem;fax;GPS;mouse;printer and so on). W...
License:Shareware USD 39.95
Size:2.17 MB
3)
Spam Reader
Spam is a disease. It is a plague of the modern Internet. Is there a cure? Various techniques were developed and tried. But spammers quickly make them obsolete using even newer tricks. Fortunately, Re...
License:Shareware USD 29
Size:1.13 MB
outlook, spam, filter, anti-spam, spamblocker, spamfilter, bayesian, software, blocker, blocking, utility, anti,
4)
EZ Backup WordPerfect Basic
EZ Backup WordPerfect Basic makes it easy to backup your WordPerfect, Quattro Pro and Presentation files to any local, network or removable drive. The application creates a self-restoring backup archi...
License:Shareware USD 9.95
Size:2.6 MB
5)
Fresh Diagnose
Fresh Diagnose is a utility designed to analyze and benchmark your computer system. It can analyze and benchmark many kinds of hardware, such as CPU performance, hard disk performance, video system in...
License:Freeware USD 0
Size:1.76 MB
6)
AutoZIP Backup
AutoZIP Backup is professional software that lets you automate the backup of your precious files to a ZIP archive. 27 pre-defined file sets including Outlook Mail, IE Favorites, and Palm handheld data...
License:Shareware USD 34.95
Size:1.17 MB
7)
Recovery for Lotus Notes
Recovery for Lotus Notes is data recovery program for Lotus Notes databases (.nsf). LotusNotesRecovery recovers damaged Notes/Domino databases on both server and client side, therefore it is a must ha...
License:Demo USD 299.00
Size:2.25 MB
8)
SpiderArmor
If you own a web site with imporant information, this software is the only product available today (to the best of our knowledge) that can secure your data from spidering programs. This software is ma...
License:Shareware USD 99
Size:0.83 MB
9)
Keylogger Stopper
Keylogger Stopper is a sophisticated software to disable keylogger from working on your PC. Using highly efficient technology, Keylogger Stopper will monitor all keylogging activities and disable them...
License:Shareware USD 16
Size:0.65 MB
10)
File Encrypter
:File Encrypter: -- Arpan Jati -- ArpanTECH (C) 2007 -- Microsoft .NET Framework 2.0 Required to run this program. Please Install it from the microsoft's download site. Encrypting: To encrypt a file, ...
License:Freeware USD 0
Size:0.36 MB
Tags: file, encrypt, encode, decrypt, md5, hash, decode, decryption
|
|
More tags: logging, user activity, restriction, audit, ban list, disable programs, security, parental control, security audit, logging, user activity, restriction, audit, ban list, disable programs, security, parental control, security audit,
|
|