TypeTeller 2006 1.45
TypeTeller 2006 is a free keyboard logger for Windows. It allows you to keep a chronological record of everything that is typed on the keyboard, including chat, email and passwords. In addition, TypeTeller identifies and reports the title of the active window. You can use TypeTeller to recall your own keyboard entries or to monitor the online and offline activity of your children or your employees.
See also: logging security password monitoring keyboard children kids employees
PC Security Explorer 1
PC Security Explorer highly improves your computer's security. You get powerful tool
that monitors loaded programs and Internet traffic, and also cleans your computer up
from security threats and make backup of your documents.
"Computer Control" section provides four applications.
"Internet Security" section provides seven applications.
"Additional Tools" section provides four additional applications
See also: password, clean, popup, anti, analyzer, protection, blocking, optimize, optimizer, scanner, autostart, monitoring, whois, firewall, explorer, security
Internet Deadbolt 6.0
?The Internet Deadbolt is more than security software. It allows network administrators, and upper management to get control of their corporate networks by restricting employees downloading of software that may have viruses or worms,? said Anthony Johnson, president of ICC Software. ?It has been on the market since 2002. It?s currently in use in banks and financial institutions to help increase security. ?
See also: administering, monitoring employees, monitoring, network, network monitoring, access control software, monitoring software, network security, Internet Deadbolt, internet, control, download, activity recorder, password, secure, protect
WinSyslog is an enhanced syslog server for Windows. It works much like a Unix syslog daemon but offers enhanced features. Among others, it writes syslog messages to a flat file, database or sends them as email-alerts. Runs as a background service or Windows GUI application. Basic features are free to use, enhanced features require a registration. The enhanced features can be tried for free for 30 days.
See also: logging, network, security, events, syslog, monitoring
WinSyslog is an enhanced syslog server for Windows. Receives messages from routers and firewalls (e.g. PIX, NetGear, ...). Writes messages to file, database, sends them as email, alerts, starts programs on message reception and much more. Supports UDP and TCP syslog, compression and SNMP. Comes with a web interface for remote message viewing. Helps troubleshoot network problems quickly and easily. Runs as a background service.
See also: monitoring, syslog, events, security, network, logging, database, snmp, rfc3164, rfc3195, compression
Safetica BUSINESS 3.1.5
Your staff can threaten security of sensitive corporate data. Firewalls and antivirus software do not protect you from internal threats. Protect yourselves from data leakage from corporate computers and disks. Gain control over the staff?s access to sensitive data and increase their working attitude by monitoring their activity. Save access data safely and do not allow spyware to log your passwords. Administer your company?s security centrally.
See also: security, encryption, shredder, disk encryption, activity monitoring, parental lock, access block, usb lock, pc lock, application lock, usb token, password manager, key manager, privacy, private key, secret, secret key, protection, public key, DLP
Rohos Welcome 1.3
Rohos establishes a new login way into Windows - by using a USB flash drive. It's just like carrying a key for your house. Whenever you temporarily steps away, you can lock the computer by simply unplugging the USB key. Advantages: Estimates work hours spent on the computer; Add or remove specific users to the welcome screen; personalizing login screen with your digital photos and caption text; Good for security and time save;
See also: flash drive authentication, USB flash authentication, USB flash drive authentication, flash drive login, USB flash login, USB flash drive login, network security, domain, access, usb flash drive, windows password, login, logon, welcome screen, shares, authentication, USB flash drive logon, USB flash logon, flash drive logon, Ctrl+Alt+Del
Reliable data security tool for advanced access right control, encryption and audit, which extends them much beyond the scope of the standard Windows security services. R-Guard enables the user to control access rights to various file systems objects for users, for applications and system processes as well. R-Guard prevents data from disclosure, theft, modification, corruption, and deletion by another user or various malicious programs.
See also: Audit, Data Protection, File Encryption, Data Security, File Monitoring
IE Internet Security 6.51
It customizes different features of the Internet Explorer Web browser, lets you disable changing your web browser settings, restrict access to certain tabs of Internet Options dialog box, as well as specific settings from each tab, disable certain menu items and buttons, and prevent others from editing your Favorites. Multi-user support allows you to apply security restrictions for each user personally. Password protection is also offered.
See also: free, screen, lock, restrict, privacy, protect, control, access, administrator, security, password, download
Data Nuker 188.8.131.52
Shreds sensitive files so they cannot be recovered or undeleted. Includes disk free space shredder - destroy previously deleted files on your hard drive. Shred Files, Folders, Recycle bin, drag & shred, DoD conform. Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover the files! Also includes a scheduler & integrates with windows explorer for right click shred.
See also: tmp, swapfile, swap file, strong, stream cipher, source, ShredXP, shredding, Shredder, Shred, shareware, sensitive files, security, secure delete utility, secure, sanitize, sanitization, safety, remove, recursively, random, purge, protecting, protect, programs, privacy, permanent, perfect, password, paper, overwrite, numbers, number, NSA, microsoft, magnetic, line, kill, key, hard drive, generator, freeware, free, forensic, folders, folder, files, file wiper, file utility, file, Expert, Evidence Eliminator, evidence, EugeneSoft, Eugene, eraser, erase, encryption system, encrypt, eliminator, editor, edit, drive protect, drive, DOD-5220.22M, DOD 5220.22-M, documents, document, disk, directory, destroy, Deletor, delete, data wiper, data recovery, data, cryptography, cryptographic algorithms, crypto, compress, command, code, clean, chaos, cache, business, BRAUN, batch, Basta, backup, appz, application, app, undelete, unerase, warez, washer, win32, windoez, wipe, wipe disk, wipe files, word
Perfect Admin 1.0
A powerful and easy in usage program for system administrators which allows to fulfil remote monitoring and control of the work of users in a local area network. Features automatic control of launching of the applications by the users, blocking of launching of the prohibited applications under the title of the window, automatic locking of Active Directory account, on behalf of which the prohibited application was launched and many others.
See also: screenshot retrieving, Active Directory accounts, launching of applications, automatic locking, remote control, remote monitoring, prohibited applications, event logging
Network Password Manager 2.2
Network Password Manager is a program created especially for the enterprise. It helps employees to safely store and use passwords within the company, manage passwords and set access rights. It also provides the reliable security using 256-bit AES encryption. It works in multi-user mode and creates a common environment. Support of Windows user groups is included. A clear, user-friendly interface considerably simplifies the installation process.
See also: user, administrator, multi-user, access, login, storage, protection, encryption, 256 AES, enterprise, security, management, network, manage, password, keep
PC PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When the stolen computer goes online it will send a stealth message containing its location. Recovery agents at MacPhoneHome will work with our customer, the local ISP and the investigating law enforcement agency to recover the stolen computer.
See also: asset tracking, tracking, surveillance, computer theft, laptop theft, stolen laptop, stolen computer, computer security, laptop security, mac security, ipod security, ipod, monitoring, tracing
Keywarden is an easy-to-use and highly secure password manager which stores your different passwords, login-information, credit card numbers and other security related data in a clearly arranged place. Keywarden optimally protects your data with the generally accepted Blowfish encryption.
Your advantage with this: You simply use a single master password to access all your different passwords. You only need to remember this single password!
See also: Java, Deutsch, English, Browser Integration, Password Generator, Security, Secure, Blowfish, Encryption, Manager, Safe, Password Safe, Password Keeper, Passwords, Password, Account, Key, Key Manager, Password Manager, Linux, Mac
Artumsoft Universal Password Generator 2.0
Program multiple accelerate recovery of password to any object protected with password by minimization of passwords amount for selecting on basis of any possessed or suggested information. Visually assigning common passwords structure composed from discrete blocks with their own flexible adjusted features. Generated list of passwords can be used as dictionary to any program selecting passwords to the object.
See also: generate, drive, disk, archive, ZIP, RAR, artumsoft, intellectual, clever, universal, smart, advanced, protected, crypt, ciphered, security, basis, former, mask, pattern, template, visual, restoration, remember, parole, generator, lost, forget, forgotten, recovery, password, word
Program Sentry 1.0.0
Provides access control and usage management. Allows you to either create a list of blocked programs or a list of allowed programs. In the blocked programs mode, any program on the list is blocked. In the allowed program mode, any program NOT on the list is blocked. Individual programs can be password protected.
See also: password protect programs, computer access control, computer security, password protection, computer use control, control access
Folder Protection 2.1
Folder Protection lets you control access to your folders. Secure your documents to prevent people from viewing, printing, or altering them. You can protect folders located on your hard drive, as well as on external USB and removable drives. Folder Protection is ideal for notebooks. Prevent confidential information from ending up in the wrong hands. A folder can be protected simply by right-clicking on it within Windows Explorer.
See also: security, protection, lock, protect, password, folders, folder
Public PC Desktop 3.31
Setup an Internet kiosk or a public access PC; disable access to vital files and allow only necessary applications to be run including Internet Explorer. Lock access to the desktop using username and password authentication, time-locked code (allows users to access PC for a given period of time only) or a combination of both. The program is ideal for public libraries, Internet cafes, information terminals or homePCs to limit childrens
See also: password, security, administrator, access, control, protect, privacy, restrict, lock, screen, free, download
SafeIT File Encryption 2006
SafeIT File Encryption is a user-friendly program that allows you to prevent unauthorized access to restricted documents. Encrypt sensitive documents and other private digital information you have on your computer. The encrypted files are are only accessible by entering the correct password.
Ideal for encrypting e-mail attachments as it doesn't require any additional software from the recipient. Multiple secure formats to choose from.
See also: Encrypt, Secure, Attachment, Safe, Encryption, Password, Lock, Security
PrefixNE - Power and control over your network assets all wrapped up in one complete solution. With PrefixNE you?ll know exactly what software is running on your network, and whether it's properly licensed. You?ll know precisely what hardware is installed on each of your network PCs, (including removable devices). You can be alerted in real time upon changes, and enforce PC utilization policies.
See also: network, management, hardware audit, pc management, usb security, license tracking, software metering, asset inventory, asset tracking, network security, data leakage, endpoint security, hardware inventory, monitoring, software inventory, system administration