Must Have | TOP 100 | Authors | Reviews | RSS | Submit

Recommended Software

UnHackMe

UnHackMe 7.80.0.481

The main difference between UnHackMe and other antirootkit software is its detection method. Precise double-checking for a Windows-based PC, which allows identifying and eliminating any types of malicious software. Instant tracking of malicious code in the system. UnHackMe was initially...

DOWNLOAD
 
 

HSLAB Logger

HSLAB Logger 3.6.504.2010

Category: Utilities / Security & Encryption | Author: Handy Software Lab

The advanced program for the background audit and storing the users activity. This software allows to record actions of the user (users) of a computer on start the access to the Internet, applications, opening documents and removable media.

DOWNLOAD GET FULL VER Cost: $23.15 USD, 17.50 EUR
License: Commercial
Size: 4.1 MB
Download Counter: 9

The complete solution for the background audit and storing the users activity. This software allows to record actions of the user (users) of a computer on start the access to the Internet, opening documents, applications and using removable media. Using this software to become possible to receive the anformation about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole. Also you can restrict access to some programs (using file tame or keyword) or to CD/DVD/Zip and other removable media. This is very useful for the rigid control over use of computer systems in business and for the parental control over children's actions. The program is NOT keylogger and does not write any keystrokes! This is a principle position. The information, collected by the program is more enough for the control over use of a computer and without recording of the user's passwords. Using this software you can: record actions only the selected users or all users; rectrict access by keywords end execute some actions when the keyword found; use a ban list for prevention of some actions; record the restricted actions or all actions; record user's activity; rectrict access to removable drives end execute some actions when the restriction occur; rectrict access to programs end execute some actions when the restriction occur At access to removable drives you can set the following actions: eject removable media and continue; shutdown Windows; write information about this event to log and continue. At access to programs you can set the following actions: write information about this event to log and continue; shutdown Windows; kill restricted program and continue.

Requirements: 95/98/Me/NT/2000/XP
OS Support: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows Tablet PC Edition 2005,Windows Media Center Edition 2005
Language Support: English

Released: April 10, 2010 | Added: May 04, 2010 | Viewed: 1572
 

Related Software

Activity Logging | Audit | Audit ip mac | Audit Pc | Audit Pro | Ban List | Disable Programs | Logging | Network Security Audit | Parental Control | Pc Audit | Restriction | Security | Security Audit | Security Control | User Activity | User Security

  • Infiltrator Network Security Scanner Icon Infiltrator Network Security Scanner - Infiltrator is an easy to use, intuitive network security scanner that can quickly audit your network computers for vulnerabilities, exploits, and information enumerations.
  • The Lock XP Icon The Lock XP - Provides user audit, access, Internet and system security for any computer running Windows 2000, 2003 , XP or Vista. Meets requirements outlined in NISPOM, Chapter 8, as well as system security and auditing required by Sarbanes-Oxley and HIPPA.
  • No Icon R-Guard - R-Guard is a reliable data security tool for advanced access right control, encryption and audit, which extends them much beyond the scope of the standard Windows security services.
  • Windows Security Tweaker Icon Windows Security Tweaker - Windows Security Tweaker enables you to protect and totally control access to your personal computer. It offers administrative support for controlling which users are allowed to access your computer and the level of access each user may have.
  • Windows Security Officer Icon Windows Security Officer - Windows Security Officer enables you to protect and totally control access to your personal computer. It offers administrative support for controlling which users are allowed to access your computer and the level of access each user may have.
  • Acunetix Web Vulnerability Scanner Icon Acunetix Web Vulnerability Scanner - Is your website hackable? Acunetix Web Vulnerability Scanner automatically scans your web applications (shopping carts, forms, dynamic content, etc.) for vulnerabilities to SQL injection, Cross site scripting, Google hacking & other web attacks.
  • ID Parental Adviser Icon ID Parental Adviser - ID Parental Advisor is a top quality access-monitoring program, providing action-limitation to third parties according to your personal preferences.
  • Control Kids Icon Control Kids - Control Kids filters all the website objectionable Internet content.Control Kids works all the internet browsers, not require any configuration and is compatible with Windows XP/Vista/7. Block any kind of unsolicited web site.
  • No Icon Proactive Security Auditor FE - A program to assist system administrators and ordinary users to keep their computers secure by performing an audit of Windows computers for installed security updates, and allowing to download and install missing patches from Microsoft web site.
  • Nsauditor Network Security Auditor Icon Nsauditor Network Security Auditor - Nsauditor is a network security scanner that allows to audit and monitor network for possible vulnerabilities,checks methods that a hacker might use to attack it. Over 45 network tools for scanning,sniffing,enumerating and gaining access to machines.
 

Actual Software | Link To Us | Links | Contact

Must Have | TOP 100 | Authors | Reviews | RSS | Submit