Logo
 
   
 
     
 
 

HSLAB Logger

More tags: logging, user activity, restriction, audit, ban list, disable programs, security, parental control, security audit, logging, user activity, restriction, audit, ban list, disable programs, security, parental control, security audit,
 Sponsored links
HSLAB Logger

HSLAB Logger
  Category : Utilities -  Security
 Sponsored links
 
  Platform : WinXP,  Windows2000,  Windows2003,  Windows Tablet PC Edition 2005,  Windows Media Center Edition 2005,  Windows Vista Starter,  Windows Vista Home Basic,  Windows Vista Home Premium,  Windows Vista Business,  Windows Vista Enterprise,  Windows Vista Ultimate,  Windows Vista Home Basic x64,  Windows Vista Home Premium x64,  Windows Vista Business x64,  Windows Vista Enterprise x64,  Windows Vista Ultimate x64  
  Price : USD 24.95  
  Developer:  
  Rating :  
  License : Shareware  
  Limitations: 15 Days  
  Date : 02/14/2008  
  Size : 4.06 MB  
Download
Software Description:
Software In :
Utilities
Security
logging, user activity, restriction, audit, ban list, disable programs, security, parental control, security audit, logging, user activity, restriction, audit, ban list, disable programs, security, parental control, security audit,
   The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and using removable media. Using this software to become possible to receive the anformation about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole. Also you can restrict access to some programs (using file tame or keyword) or to CD/DVD/Zip and other removable media. This is very useful for the rigid control over use of computer systems in business and for the parental control over children's actions. The program is NOT keylogger and does not write any keystrokes! This is a principle position. The information, collected by the program is more enough for the control over use of a computer and without recording of the user's passwords. Using this software you can: - record user's activity; - record actions only the selected users or all users; - record the restricted actions or all actions; - use a ban list for prevention of some actions; - rectrict access to removable drives end execute some actions when the restriction occur; - rectrict access to programs end execute some actions when the restriction occur; - rectrict access by keywords end execute some actions when the keyword found; At access to removable drives you can set the following actions: - write information about this event to log and continue; - eject removable media and continue; - shutdown Windows. At access to programs you can set the following actions: - write information about this event to log and continue; - kill restricted program and continue; - shutdown Windows.


DH2012
Logos Caption
PaoloToldo.IT App
[무협]천검제(전9권,완)-에피루스 베스트소설

 Sponsored links

Also See

Program Sentry 1)    Program Sentry
 Provides access control and usage management. When installed, it allows you to either create a list of blocked programs or a list of allowed programs. In the blocked programs mode, any program on the ...
License:Shareware USD 25 Size:0.49 MB

PerfectGuard 2)    PerfectGuard
 PerfectGuard helps you to protect your Operating System from viruses, hackers and unauthorized access of ill-wishers. PerfectGuard lets to increase labor productivity of your company's stuff as it pre...
License:ShareWare USD 14.99 Size:4 MB

Content Scanner 3)    Content Scanner
 Free parental control software to scan, filter, content watch and detect porn and objectionable content on user's PC. User can also clean, delete, remove and erase pornography and objectionable Conten...
License:Demo USD 29.99 Size:2 MB content, audit, parental, controls, delete, remove, erase, clean, ography, control,

Kernel Access Password Recovery Software 4)    Kernel Access Password Recovery Software
 Kernel Access Password Recovery tool is a Microsoft Access MDB password recovery software designed to recover lost and forgotten passwords from Microsoft Access Database (.mdb) files. Kernel Access Pa...
License:Demo USD 27 Size:0.54 MB

Internet SPY PC Detective 5)    Internet SPY PC Detective
 PC Pandora - PC Detective and Web Spy PC Pandora is your very own personal PC and Internet detective that hides on your hard drive and monitors all computer and Internet activity. This program will al...
License:Shareware USD 49.95 Size:10 MB

MailScan 4 for NetNow 6)    MailScan 4 for NetNow
 MailScan 4 for NetNow is the world's first "Real-Time" e-mail scanner for the NetNow Mail Server. This server is published by RedRock Technologies. MailScan 4 for NetNow acts like a Content-Security a...
License:Shareware USD 39.52 Size:11.06 MB

LockEnd 7)    LockEnd
 Ultimate Protection Management of Personal Documents or Information! Lockend (Trademark Registration No. 0616956) is a compound word containing Lock and End which means The End of Security Problems!. ...
License:Shareware USD 49 Size:16.27 MB

Folder Security Personal 8)    Folder Security Personal
 Folder Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only ,preventing modification or deletion by other...
License:Shareware USD 39.95 Size:0.79 MB

1st Security Administrator 9)    1st Security Administrator
 Protect PC, restrict access to Windows applications and password-protect boot with 1st Security Administrator. This is the best password-protected security utility to apply access restrictions to PC, ...
License:Shareware USD 69 Size:1.85 MB

CHAOS' Doors 10)    CHAOS' Doors
 Comprehensive privacy tools including file/folder encryption, e-mail encryption, file/folder shredder. The program is compact, efficient and user friendly. Required cryptographic procedures are enforc...
License:Shareware USD 39.95 Size:0.4 MB
Tags: protect, key, safety, shredder, stream, chaos, public key, public, cipher

Invisible Private Folder 1)    Invisible Private Folder
 The Invisible Private Folder can help you keep your files protected from kids, friends and co-workers. It allows you to add any folders to the virtual invisible private folder. It enables you to block...
License:Shareware USD 14.95 Size:1.01 MB

Serial Port Terminal 2)    Serial Port Terminal
 Advanced Serial Port Terminal is a session-based, multi-purpose application that provides simple communication interface to connect to any serial port device (modem;fax;GPS;mouse;printer and so on). W...
License:Shareware USD 39.95 Size:2.17 MB

Spam Reader 3)    Spam Reader
 Spam is a disease. It is a plague of the modern Internet. Is there a cure? Various techniques were developed and tried. But spammers quickly make them obsolete using even newer tricks. Fortunately, Re...
License:Shareware USD 29 Size:1.13 MB outlook, spam, filter, anti-spam, spamblocker, spamfilter, bayesian, software, blocker, blocking, utility, anti,

EZ Backup WordPerfect Basic 4)    EZ Backup WordPerfect Basic
 EZ Backup WordPerfect Basic makes it easy to backup your WordPerfect, Quattro Pro and Presentation files to any local, network or removable drive. The application creates a self-restoring backup archi...
License:Shareware USD 9.95 Size:2.6 MB

Fresh Diagnose 5)    Fresh Diagnose
 Fresh Diagnose is a utility designed to analyze and benchmark your computer system. It can analyze and benchmark many kinds of hardware, such as CPU performance, hard disk performance, video system in...
License:Freeware USD 0 Size:1.76 MB

AutoZIP Backup 6)    AutoZIP Backup
 AutoZIP Backup is professional software that lets you automate the backup of your precious files to a ZIP archive. 27 pre-defined file sets including Outlook Mail, IE Favorites, and Palm handheld data...
License:Shareware USD 34.95 Size:1.17 MB

Recovery for Lotus Notes 7)    Recovery for Lotus Notes
 Recovery for Lotus Notes is data recovery program for Lotus Notes databases (.nsf). LotusNotesRecovery recovers damaged Notes/Domino databases on both server and client side, therefore it is a must ha...
License:Demo USD 299.00 Size:2.25 MB

SpiderArmor 8)    SpiderArmor
 If you own a web site with imporant information, this software is the only product available today (to the best of our knowledge) that can secure your data from spidering programs. This software is ma...
License:Shareware USD 99 Size:0.83 MB

Keylogger Stopper 9)    Keylogger Stopper
 Keylogger Stopper is a sophisticated software to disable keylogger from working on your PC. Using highly efficient technology, Keylogger Stopper will monitor all keylogging activities and disable them...
License:Shareware USD 16 Size:0.65 MB

File Encrypter 10)    File Encrypter
 :File Encrypter: -- Arpan Jati -- ArpanTECH (C) 2007 -- Microsoft .NET Framework 2.0 Required to run this program. Please Install it from the microsoft's download site. Encrypting: To encrypt a file, ...
License:Freeware USD 0 Size:0.36 MB
Tags: file, encrypt, encode, decrypt, md5, hash, decode, decryption

More tags: logging, user activity, restriction, audit, ban list, disable programs, security, parental control, security audit, logging, user activity, restriction, audit, ban list, disable programs, security, parental control, security audit,
 
 
Copyright © 2013 Appcolt.com    iOS - iOS
Privacy Policy and Terms of Use   All rights reserved.