|
More tags: the lock, thelock, pc, desktop lock, computer lock, computer protection, security, pc security, system, windows security, folder security, file security, user monitor, access control, audit log, regulation compliant, nispom, sarbanes-oxley, hippa, protecection,
|
Category : |
Utilities - Security |
|
|
|
Platform : |
Win98, WinME, WinNT 4.x, Windows2000, WinXP, Windows2003, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, Windows Vista Ultimate |
|
|
Price : |
USD 45 |
|
|
Developer: |
|
|
|
Rating : |
|
|
|
License : |
Shareware |
|
|
Limitations: |
60 Days |
|
|
Date : |
2008-05-05 |
|
|
Size : |
22.06 MB |
|
|
Software In :
Utilities
Security
the lock, thelock, pc, desktop lock, computer lock, computer protection, security, pc security, system, windows security, folder security, file security, user monitor, access control, audit log, regulation compliant, nispom, sarbanes-oxley, hippa, protecection,
|
The Lock provides user audit, access control, Internet and system security for any computer running Windows 2000, Windows XP (with or without Fast User Switching), Windows Server 2003, and now supports Windows Vista. Running on Windows 9x/ME will work, but is no longer supported. The Lock is PL-1 compliant to Chapter 8, NISPOM. It also meets Sarbanes-Oxley Access Control, Intrusion Detection, and PC Auditing requirements, as well as meets HIPPA, Access, Authorization, and Security control requirements. All user security is group based configurable by any members of the Administrators group. User security can define system policy, logon times, internet access times, web site restrictions, and access to local resources such as programs and files and folders, including removable media (USB, flash, etc.), that can be restricted as it is plugged into the system. Restrict printer access in any Windows application. Restrict access to screen capture via the Print Screen key. Logging features will record web sites visited, programs run, and any security violations occurring while the user is logged in, and now supports the Firefox browser. User security data is stored locally or on a shared network folder. The Lock the local Windows system, a Netware Server, a Windows NT server, or a remote Lock Security Manager server, can verify user passwords. The Lock has a built in cloning feature designed to make network installations a simple one step process. When used in conjunction with the Lock Security Manager Server, all remote systems may be kept up to date when The Lock has been updated on the SMS system. Tools are included with the Security Manager that will allow remote monitoring of any systems running The Lock and connecting to the Security Manager. Active Password monitoring is used to combat modification of Windows 2000/XP/2003 user passwords (usually with a bootable hacking disk) outside of the Windows GUI. Interface is now skinnable.
CMUcalculatorБронепоезд Победы
|
|
Also See
1)
Ss Data Eraser
Data Eraser is a permanent way to securely delete files, folders and disk free space. Data Eraser completely implements the US Department of Defense DOD 5220.22 M clearing and sanitizing standard, to ...
License:Freeware USD 0
Size:0.62 MB
2)
LastBit VBA Password Recovery
Password recovery utility to reset passwords to password-protected VBA projects. The program has two password recovery engines: one is designed for Word, Excel documents and Access databases. It suppo...
License:Demo USD 39
Size:1.342 MB
3)
SafeHouse Explorer USB Disk Encryption
FREE SafeHouse Explorer provides total privacy and protection for your sensitive files and folders using passwords and super-strong 256-bit encryption. This software is amazingly simple to use and fea...
License:Freeware USD 0.00
Size:3.45 MB
encryption, security, privacy, disk, file, usb, memory stick, flash, hard drive, hard disk, encrypt, lock, vault, lock, safe, email, folder, protect, protection, secret, hide, private,
4)
Hidetools Parental Control
Hidetools Parental Control protects your children online and offline. The program is all-in-one solution which combines powerful computer monitoring software with Internet filter and games/application...
License:Shareware USD 39.95
Size:1.95 MB
5)
Hidetools Spy Monitor
Hidetools Spy Monitor is powerful spy software that secretly monitors your children's or employees' computer activity: typed keystrokes, Hidetools Spy Monitor is powerful spy software that secretly mo...
License:Shareware USD 39.95
Size:1.44 MB
6)
Petsyb PSYBEncrypter
PSYB Encrypter - Encryption Software designed to protect all your files safely and securely with strong and secure encryption algorithms. Aimed at those with large amounts of pictures, photographs, im...
License:Demo USD 9.40
Size:1.69 MB
7)
LastBit Zip Password Recovery
Zip Password is able to recover lost or forgotten password to pkzip/WinZip archives. Zip Password supports brute-force, smart-force attack and dictionary search. Zip Password features unprecedented se...
License:Shareware USD 39
Size:0.77 MB
8)
Rohos Disk Encryption
Easy-to-use and smart disk encryption program that lets you create encrypted disk partitions (volumes) to keep your private data secure. Rohos Disk hides your programs and data, and restricts access t...
License:Shareware USD 35
Size:1.06 MB
9)
Child Control
The most optimal parental control for all Windows-PCs (incl.Vista). Set time limits for the PC and/or the Internet and block/filter unwanted Internet contents. Limit access to internal Windows compone...
License:Shareware USD 29.90
Size:11.55 MB
10)
Svchost Process Analyzer
Svchost Process Analyzer is a quick and easy freeware product that inspects your Svchost.exe process. The Svchost.exe process, which is visible in Windows Task Manager, is often misused by spyware or ...
License:Freeware USD 0
Size:0.25 MB
|
1)
Abacre IWorm.Sobig Virus Remover
In response to resent attack of I-Worm.Sobig email virus, Abacre Corporation released own antivirus called: Abacre I-Worm.Sobig Virus Remover. It periodically checks pop3 mailboxes and removes infecte...
License:Shareware USD 14.99
Size:0.77 MB
2)
NoClone Home Find Duplicate Files, Emails
NoClone - file mangement utility software to find and delete TRUE duplicate files Features: * True Byte-to-byte comparison , not by CRC/MD5. Why most accurate? http://support.reasonablesw.com/forums/9...
License:Shareware USD 32.90
Size:1.43 MB
3)
HSLAB Prefetch Manager RE
Faster XP/2003/Vista Boot and Application Launch with Prefetch Manager! Software home page Software download Windows XP has a Prefetcher component, which shortens the amount of time it takes to start ...
License:Shareware USD 31.38
Size:2.76 MB
system monitor, system tweaking, memory tweaking, system optimize, system tweaking,
4)
Wiperaser Ultra
Wiperaser Ultra is the most complete, powerful and innovative secure deletion software. Its primary goal is to eliminate files and folders beyond every chance of recovery, as stated in many internatio...
License:Shareware USD 140
Size:9,00 MB
5)
Delete Unwanted Files
Is your PC spying on you? Will your Internet history expose your privacy? Did you know that all your surfing history is being recorded in secret hidden files on your PC? Every website, files, movies, ...
License:Shareware USD 29.95
Size:0.82 MB
6)
DiskLogon
DiskLogon adopts the latest identification and authentication technologies, allowing you to use your memory card or USB Pen Drive to log on to your computer. For an enterprise user, DiskLogon provides...
License:Shareware USD 19.95
Size:2.37 MB
7)
Remove (Delete) Last Character(s) of Each Line Software
Remove ending characters from each line in one or more files....
License:Shareware USD 19.99
Size:0.74 MB
8)
EZ Backup Palm Premium
EZ Backup Palm Premium makes it easy to backup your Palm Desktop data to a local drive, network folder, CD/DVD and even to a remote FTP server! The scheduling feature can provide a completely automate...
License:Shareware USD 19.95
Size:3 MB
9)
1st Smart Encryptor
SmartEncryptor uses the most powerfull encryption algorythms existing. AES - the US Government standard symmetric encryption algorythm and Blowfish. Encrypt files and folders Send files over the Inter...
License:Shareware USD 19.90
Size:0.36 MB
10)
Rizone's Power Tools
Like any computer technician, I love tools and utilities. I can spend weeks looking for and downloading tools I think I will need someday (kinda obsessive). Now and then when I have to do something sp...
License:Freeware USD 0.00
Size:12.82 MB
|
|
More tags: the lock, thelock, pc, desktop lock, computer lock, computer protection, security, pc security, system, windows security, folder security, file security, user monitor, access control, audit log, regulation compliant, nispom, sarbanes-oxley, hippa, protecection,
|
|