|
More tags: eagleeyeos, logging, datasecurity, filesecurity, filemonitoring, storages, devices,
|
Category : |
Utilities - Security |
|
|
|
Platform : |
Windows2000, WinXP, Windows2003 |
|
|
Price : |
USD 67.00 |
|
|
Developer: |
|
|
|
Rating : |
|
|
|
License : |
Shareware |
|
|
Limitations: |
30 Days |
|
|
Date : |
03/02/2006 |
|
|
Size : |
27.83 MB |
|
|
File Lifecycle Tracking (FLT) Who did what and when did it with the file? Where and under what name can the file be found? FLT is a specially developed feature to trace what kind of operations happened with the file since its creation. This function marks the parallel life-tracks of the file with branches, it is also possible to search the files lifecycle directly from the queried Reports. Device handling Possibility to establish the access policy of a general purpose communication media. Such Devices can be Floppy-, CD-, DVD drives, Infrared, COM, LPT, USB, Bluetooth, Wireless ports, etc. The most important feature of it is to block the devices irrespectively of whether at the moment there is a Device connected to the host or not. Quarantine A special document area protection can be created, which provides the possibility to creat separate territories. Data movement can be controlled within this area, as well as beyond. It has the important ability to define approved users, applications, printers in the area, and specify the path to where the data can be exported to. It has the ability to separate the information from the Local and Domain Administrator, and the separation of the same application - running in the Quarantine and outside of it. Notebook handling - Running on the kernel level offers the possibility to keep the defined rules after losing the connection with the network, and to make them impossible to by-pass. It is possible to disable the Bluetooth devices, pen-drives on a notebook removed from the network. Furthermore it is an important property that the users processes will be logged locally together with the date and time of the disconnection and reconnection. At the next network connection to the Server, the rules and the logs will be synchronized. Printer - Printer rules can also be predefined. With their help, it can be determined which printers can be used or blocked on a certain host to maintain the control of the printed.
Flappy GAqua Medispa & Vein StudioParty in BeijingMylan Printer 1040أشهى الأكلات التركيةVevaCallHow to Draw Pokemonฝึกท่องจำกอไก่ 3D
|
|
Also See
1)
Encryption Xpert
Want to know what the easiest and the safest way to protect your data is? It's encryption. You can encrypt your files manually, as well as one hundred years ago, or using modern software. Encryption X...
License:Shareware USD 24.95
Size:0.92 MB
2)
VB AntiCrack
VB AntiCrack is used to make it more difficult to crack your programs written in Visual Basic 6.0. Most crackers will not be able to crack your program because they will not find a single text strings...
License:Shareware USD 39
Size:1.47 MB
3)
S.O.S.Automation
Baby - Medical monitor and alarm system. Implemented in software for a home PC. constantly monitor the surroundings and call you upon emergency. This is extremely useful for infants and dependent. Cal...
License:Shareware USD 18
Size:3 MB
baby alarm, security, pc alarm, home monitor, ils servers,
4)
CDDVD Lock
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. ...
License:Shareware USD 29
Size:0.92 MB
5)
WinDentify
Windentify is a voice biometric source code for desktop clients. Visit www.windentify.com for live server demo. Includes fully working voice verified windows logon. Now start your machine with your vo...
License:Shareware USD 29
Size:8.77 MB
6)
Outlook Express Protector
Outlook Express Protector is designed for controlling access to Outlook Express and its e-mail and address data bases. It does not encrypt protected files and folders, however no programs can get acce...
License:Shareware USD 29
Size:0.62 MB
7)
IDFile
File verification utility, uses SHA-2 algorithm....
License:Freeware USD 0
Size:0.22 MB
8)
CHAOS Public Key
CHAOS+PK uses the newest chaos. It is high speed and allows variable-length keys, making protection very reliable and suitable for use in working. Uses the Public Key for encryption CHAOS keys by send...
License:Shareware USD 59.95
Size:0,4 MB
9)
ANTITHIEFWARE
ANTITHIEFWARE is a program that eliminates all adwares, spywares, viruses, Dialers, and hijackers that might exist on your PC. ANTITHIEFWARE is a program that uses a database with tens of thousands fi...
License:Shareware USD 29.99
Size:0.45 MB
10)
asquared HiJackFree
a-squared HiJackFree is a detailed system analysis tool which helps advanced users to detect and remove all types of HiJackers, Spyware, Adware, Trojans and Worms. Manage all types of Autoruns on your...
License:Freeware USD 0
Size:1.54 MB
Tags: spyware, browser, tools, adware, toolbar, scripts, virus, trojan, malware, worm, dos, horse, worms, viruses, trojan horse, objects
|
1)
IntelliLogin
IntelliLogin logs you into Web sites and fills forms faster, easier, and more securely. IntelliLogin memorizes each user ID and password the first time you log into a site and automatically supplies t...
License:Shareware USD 19.95
Size:5.43 MB
2)
Anasoft Helena
Anasoft Helena is a productivity enhancing tool pack including Anasoft Autowork and Anasoft Scheduler. Autowork is a system level instruction engine, or you can call it an extended macro tool. You can...
License:Shareware USD 35
Size:2.04 MB
3)
Keep Your Privacy
Keep Your Privacy is powerful privacy software to erase online Internet tracks and program activity. Keep Your Privacy is a safe and easy-to-use privacy protection tool that securely deletes online In...
License:Freeware USD 29.95
Size:6.8 MB
privacy, keeper, eraser, remove tracks, privacy guard, guard, personal information, error fixer, internet activity,
4)
RestoreIT
RestoreIT 7 is a powerful data recovery utility that automatically backs up all files on a computer. In case of a malware attack, a Windows crash, or a problem caused by human error, RestoreIT lets yo...
License:Demo USD 29.99
Size:74.86 MB
5)
Battery Monitoring For Laptop
Laptop battery monitoring. Alert if battery is low. Show the battery status of remaining. You are free to download it....
License:Freeware
Size:0.48 MB
6)
PrintMonitor
PrintMonitor is a handy print monitoring and management tool. It is widely used as by large and small businesses, printing companies, and Internet cafes for printing administration, statistics gatheri...
License:Shareware USD 119
Size:2.80 MB
7)
SpyNoMore?, The Only AntiSpyware buildi
Computer hackers seeking financial gain rather than thrills or notoriety are increasingly flooding the Internet with malicious software code (spyware, adware, key loggers, trojans). They are infecting...
License:Shareware USD 39.95
Size:6.20 MB
8)
Absolute StartUp
Absolute StartUp manager and Absolute startup monitor optimize and help control Windows configuration, managing the programs that start automatically after Windows is booted. You can enable or disable...
License:Shareware USD 29.95
Size:2.25 MB
9)
Paq Keylogger (family key logger)
Paq keyloggers, family key logger keystroke logger is a keylogger spy program newly produced in 2003. It can log and spy all keyboard events and view it conveniently. It also has ability of invisibly ...
License:Freeware USD 0
Size:0.46 MB
10)
Moleskinsoft Clone Remover Free
Clone Remover will detect file duplicates on your hard drives. Including zip and rar archives. This duplicate file finder will help to searches for exact file duplicates. Clone Remover will also find ...
License:Freeware
Size:0.88 MB
Tags: mp3, file, files, find, duplicate, finder, duplicate files
|
|
More tags: eagleeyeos, logging, datasecurity, filesecurity, filemonitoring, storages, devices,
|
|