Logo
 
   
 
     
 
 

The Lock

More tags: the lock, thelock, pc, desktop lock, computer lock, computer protection, security, pc security, system, windows security, folder security, file security, user monitor, access control, audit log, regulation compliant, nispom, sarbanes-oxley, hippa, protecection,
 Sponsored links
The Lock

The Lock
  Category : Utilities -  Security
 Sponsored links
 
  Platform : Win98,  WinME,  WinNT 4.x,  Windows2000,  WinXP,  Windows2003,  Windows Vista Home Basic,  Windows Vista Home Premium,  Windows Vista Business,  Windows Vista Enterprise,  Windows Vista Ultimate  
  Price : USD 45  
  Developer:  
  Rating :  
  License : Shareware  
  Limitations: 60 Days  
  Date : 2008-05-05  
  Size : 22.06 MB  
Download
Software Description:
Software In :
Utilities
Security
the lock, thelock, pc, desktop lock, computer lock, computer protection, security, pc security, system, windows security, folder security, file security, user monitor, access control, audit log, regulation compliant, nispom, sarbanes-oxley, hippa, protecection,
   The Lock provides user audit, access control, Internet and system security for any computer running Windows 2000, Windows XP (with or without Fast User Switching), Windows Server 2003, and now supports Windows Vista. Running on Windows 9x/ME will work, but is no longer supported. The Lock is PL-1 compliant to Chapter 8, NISPOM. It also meets Sarbanes-Oxley Access Control, Intrusion Detection, and PC Auditing requirements, as well as meets HIPPA, Access, Authorization, and Security control requirements. All user security is group based configurable by any members of the Administrators group. User security can define system policy, logon times, internet access times, web site restrictions, and access to local resources such as programs and files and folders, including removable media (USB, flash, etc.), that can be restricted as it is plugged into the system. Restrict printer access in any Windows application. Restrict access to screen capture via the Print Screen key. Logging features will record web sites visited, programs run, and any security violations occurring while the user is logged in, and now supports the Firefox browser. User security data is stored locally or on a shared network folder. The Lock the local Windows system, a Netware Server, a Windows NT server, or a remote Lock Security Manager server, can verify user passwords. The Lock has a built in cloning feature designed to make network installations a simple one step process. When used in conjunction with the Lock Security Manager Server, all remote systems may be kept up to date when The Lock has been updated on the SMS system. Tools are included with the Security Manager that will allow remote monitoring of any systems running The Lock and connecting to the Security Manager. Active Password monitoring is used to combat modification of Windows 2000/XP/2003 user passwords (usually with a bootable hacking disk) outside of the Windows GUI. Interface is now skinnable.


CMUcalculator
Бронепоезд Победы

 Sponsored links

Also See

Ss Data Eraser 1)    Ss Data Eraser
 Data Eraser is a permanent way to securely delete files, folders and disk free space. Data Eraser completely implements the US Department of Defense DOD 5220.22 M clearing and sanitizing standard, to ...
License:Freeware USD 0 Size:0.62 MB

LastBit VBA Password Recovery 2)    LastBit VBA Password Recovery
 Password recovery utility to reset passwords to password-protected VBA projects. The program has two password recovery engines: one is designed for Word, Excel documents and Access databases. It suppo...
License:Demo USD 39 Size:1.342 MB

SafeHouse Explorer USB Disk Encryption 3)    SafeHouse Explorer USB Disk Encryption
 FREE SafeHouse Explorer provides total privacy and protection for your sensitive files and folders using passwords and super-strong 256-bit encryption. This software is amazingly simple to use and fea...
License:Freeware USD 0.00 Size:3.45 MB encryption, security, privacy, disk, file, usb, memory stick, flash, hard drive, hard disk, encrypt, lock, vault, lock, safe, email, folder, protect, protection, secret, hide, private,

Hidetools Parental Control 4)    Hidetools Parental Control
 Hidetools Parental Control protects your children online and offline. The program is all-in-one solution which combines powerful computer monitoring software with Internet filter and games/application...
License:Shareware USD 39.95 Size:1.95 MB

Hidetools Spy Monitor 5)    Hidetools Spy Monitor
 Hidetools Spy Monitor is powerful spy software that secretly monitors your children's or employees' computer activity: typed keystrokes, Hidetools Spy Monitor is powerful spy software that secretly mo...
License:Shareware USD 39.95 Size:1.44 MB

Petsyb PSYBEncrypter 6)    Petsyb PSYBEncrypter
 PSYB Encrypter - Encryption Software designed to protect all your files safely and securely with strong and secure encryption algorithms. Aimed at those with large amounts of pictures, photographs, im...
License:Demo USD 9.40 Size:1.69 MB

LastBit Zip Password Recovery 7)    LastBit Zip Password Recovery
 Zip Password is able to recover lost or forgotten password to pkzip/WinZip archives. Zip Password supports brute-force, smart-force attack and dictionary search. Zip Password features unprecedented se...
License:Shareware USD 39 Size:0.77 MB

Rohos Disk Encryption 8)    Rohos Disk Encryption
 Easy-to-use and smart disk encryption program that lets you create encrypted disk partitions (volumes) to keep your private data secure. Rohos Disk hides your programs and data, and restricts access t...
License:Shareware USD 35 Size:1.06 MB

Child Control 9)    Child Control
 The most optimal parental control for all Windows-PCs (incl.Vista). Set time limits for the PC and/or the Internet and block/filter unwanted Internet contents. Limit access to internal Windows compone...
License:Shareware USD 29.90 Size:11.55 MB

Svchost Process Analyzer 10)    Svchost Process Analyzer
 Svchost Process Analyzer is a quick and easy freeware product that inspects your Svchost.exe process. The Svchost.exe process, which is visible in Windows Task Manager, is often misused by spyware or ...
License:Freeware USD 0 Size:0.25 MB

Abacre IWorm.Sobig Virus Remover 1)    Abacre IWorm.Sobig Virus Remover
 In response to resent attack of I-Worm.Sobig email virus, Abacre Corporation released own antivirus called: Abacre I-Worm.Sobig Virus Remover. It periodically checks pop3 mailboxes and removes infecte...
License:Shareware USD 14.99 Size:0.77 MB

NoClone Home Find Duplicate Files, Emails 2)    NoClone Home Find Duplicate Files, Emails
 NoClone - file mangement utility software to find and delete TRUE duplicate files Features: * True Byte-to-byte comparison , not by CRC/MD5. Why most accurate? http://support.reasonablesw.com/forums/9...
License:Shareware USD 32.90 Size:1.43 MB

HSLAB Prefetch Manager RE 3)    HSLAB Prefetch Manager RE
 Faster XP/2003/Vista Boot and Application Launch with Prefetch Manager! Software home page Software download Windows XP has a Prefetcher component, which shortens the amount of time it takes to start ...
License:Shareware USD 31.38 Size:2.76 MB system monitor, system tweaking, memory tweaking, system optimize, system tweaking,

Wiperaser Ultra 4)    Wiperaser Ultra
 Wiperaser Ultra is the most complete, powerful and innovative secure deletion software. Its primary goal is to eliminate files and folders beyond every chance of recovery, as stated in many internatio...
License:Shareware USD 140 Size:9,00 MB

Delete Unwanted Files 5)    Delete Unwanted Files
 Is your PC spying on you? Will your Internet history expose your privacy? Did you know that all your surfing history is being recorded in secret hidden files on your PC? Every website, files, movies, ...
License:Shareware USD 29.95 Size:0.82 MB

DiskLogon 6)    DiskLogon
 DiskLogon adopts the latest identification and authentication technologies, allowing you to use your memory card or USB Pen Drive to log on to your computer. For an enterprise user, DiskLogon provides...
License:Shareware USD 19.95 Size:2.37 MB

Remove (Delete) Last Character(s) of Each Line Software 7)    Remove (Delete) Last Character(s) of Each Line Software
 Remove ending characters from each line in one or more files....
License:Shareware USD 19.99 Size:0.74 MB

EZ Backup Palm Premium 8)    EZ Backup Palm Premium
 EZ Backup Palm Premium makes it easy to backup your Palm Desktop data to a local drive, network folder, CD/DVD and even to a remote FTP server! The scheduling feature can provide a completely automate...
License:Shareware USD 19.95 Size:3 MB

1st Smart Encryptor 9)    1st Smart Encryptor
 SmartEncryptor uses the most powerfull encryption algorythms existing. AES - the US Government standard symmetric encryption algorythm and Blowfish. Encrypt files and folders Send files over the Inter...
License:Shareware USD 19.90 Size:0.36 MB

Rizone's Power Tools 10)    Rizone's Power Tools
 Like any computer technician, I love tools and utilities. I can spend weeks looking for and downloading tools I think I will need someday (kinda obsessive). Now and then when I have to do something sp...
License:Freeware USD 0.00 Size:12.82 MB

More tags: the lock, thelock, pc, desktop lock, computer lock, computer protection, security, pc security, system, windows security, folder security, file security, user monitor, access control, audit log, regulation compliant, nispom, sarbanes-oxley, hippa, protecection,
 
 
Copyright © 2013 Appcolt.com    iOS - iOS
Privacy Policy and Terms of Use   All rights reserved.