Security

General Security (User Management)

Page 1  Page 2

 

Software Spotlight!

Message To Developers: We are looking for one developer for the Software Spotlight position in this category. If you feel that you have one of the better products and are interested, please contact barter[at]thebusinessjunction.com If you would like to see what a Software Spotlight looks like please click here!
 
Note To Readers: Below you find links to what our staff considers to be the best software available in this category. Efforts have been made to assure a good selection while eliminating software that we do not feel is worthy of consideration. If you do not see it listed here you probably should not consider purchasing the product. If our readers or a developer feels that a particular piece of software should be listed please contact us with specifics and we will make every effort to give it our attention and, if worthy, we will include it in our next update.
 

12Ghosts ProfileCopy version 7.0

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Backup and Transfer Windows User Settings!

With 12-ProfileCopy you can save and restore Windows user profiles. A profile includes all user defined settings in Windows like your, wallpaper, desktop settings, sound and cursor schemes, desktop icons and layout, start menu items, and so on. You can add files, folders, and even registry keys to backup yourself!

What’s different from a normal backup program? Not only does it save the registry settings like a normal backup program, it also copies the files referred to by these settings. The wallpaper bitmap, the screen saver file, the sound and cursor files themselves are copied from different locations into a new folder. Then you need only to handle this one folder.

Use 12-ProfileCopy instead of a full backup. You no longer need to backup the complete Windows folder every time, but save only your personal settings. 12-ProfileCopy has been vastly enhanced with this version to work fully unattended and integrates with 12-Zip to compress the profile folder after saving. It now supports the addition of wildcards to the list of files and folders. And it runs completely silent for automatic backups.
spacer

Read More...>>




Aquarius Soft PC Lock Up Professional

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


The simplest software to control access to your PC!

Want to restrict your kid's time on the PC? PC Lock Up can be used as a PC parental control software.

Need to control your public PCs access hours? For example, you may want to control access to school library PCs to only during the library opening hours.

Want to prevent others from powering up your PC after office hours? PC Lock Up can be use to secure your company PCs after office hours. 

Want to block others from accessing your PC when you are away from your desk for a while? 

PC Lock Up Professional may be the PC access control and PC parental control software for you! It can even help you to save power if you enable the automatic shutdown feature during lock up times! 

Aquarius Soft PC Lock Up Professional is an easy to use, elegant and yet powerful PC access control and parental control software that lets you control the usage hours of your PCs. With PC Lock Up, you can set up hourly lock up time slots that will display a customizable Lock Up Screen to stop people from continuing using the PC. You also have the option to let PC Lock Up automatically shut down the PC during lock up times to save power. A voice message can be set to alert the user of upcoming PC lock up so that they can save their work prior to lock up times. Password protection is available to prevent others from changing the software settings. For personal PC, the Lock Up Screen can be activated anytime with a hotkey to prevent others from accessing your PC while you are away for a while.

spacer

Read More...>>




Computer Security V1.52

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Security should be a very important and concerning issue in you every day activity. No matter you are part of a company or a home user, it is very important to protect your work. You need a good security software. Computer Security protects you encrypting sensitive data, hiding it in innocent carriers, allowing safe transfer through encrypted self-extracting package, delete files beyond recovery and even locking application from your children or " welcomed quests". 

Features:
  • over 20 encryption algorithms like 3Way, Twofish, Cast 128 , Saphire , Blowfish, Rijndael, Diamond II and many more. 
  • crypt and decrypt files no matter their size. 
  • hide files into innocent carriers. 
  • easy to use explorer like interface. 
  • special algorithm to delete files, the files can't be recovered with any kind of hardware or software! 
  • create self-extract package containing encrypted information. 
  • lock personal applications and access them with a mouse click. 
  • multi-language user interface support, including: English, French, German, Dutch, Spanish, Swedish, Portuguese, Italian, Turkish and Romanian 
spacer

Read More...>>




Deskman 5.5

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Deskman allows you to configure your system in terms of security. Block access to important system features. Protect your desktop icons and settings. 

Use Deskman to restrain access to your system on shared computer environments. 

Key Features:
  • Tight control over desktop components. 
  • Combine options for different security levels.
  • Stop users from messing up the desktop. 
  • Control access to system settings.
  • Configure access to the Internet Explorer. 
spacer

Read More...>>




DeviceLock« Version: 5.71

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Are Open USB and FireWire Ports Your Greatest Vulnerability? Close Them Now with DeviceLock«!

Firewalls and antivirus software are no defense against acts of data theft and corruption from within your organization at local endpoints. You don't have to be an administrator to connect a small digital camera, MP3 player, or flash memory stick to the USB and begin uploading or downloading whatever you want. If you are a system administrator, you know you can't manage such device-level activity via Group Policy.

Using DeviceLock«, network administrators can lock out unauthorized users from USB and FireWire devices, WiFi and Bluetooth adapters, CD-Rom and floppy drives, serial and parallel ports and many other plug-and-play devices. Once DeviceLock« is installed, administrators can control access to any device, depending on the time of day and day of the week.

The USB white list allows you to authorize only specific devices that will not be locked regardless of any other settings. The intention is to allow special devices (e.g. smart card readers) but lock all other devices.

DeviceLock« allows you to generate a report concerning the permissions that have been set. You can see which users are assigned for what device and what devices are on the USB white list on all the computers across your network.

Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock« is a best solution to secure NT and protect your network computers against attack from the inside. 

With DeviceLock« you can: 
  • Control which users or groups can access USB and FireWire ports, WiFi and Bluetooth adapters, CD-ROMs, floppy drives, other removable devices 
  • Control access to devices depending on the time of day and day of the week 
  • Create the white list of USB devices which allows you to authorize only specific devices that will not be locked regardless of any other settings 
  • Set devices in read-only mode 
  • Protect disks from accidental or intentional formatting 
  • Control it remotely using the centralized management console 
  • Deploy permissions and settings via Group Policy in an Active Directory domain 
  • Install and uninstall it automatically. 
spacer

Read More...>>




GFI LANguard Portable Storage Control

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


The need to control entry and exit of data via USB sticks and other devices
You have invested in network anti-virus software, firewalls, email and web content security. Yet any user can come into the office, plug in a USB stick the size of the average keychain and take in/out 1GB of data. This poses a tremendous threat: Users can take confidential data or they can introduce viruses, Trojans, illegal software and more – actions that can affect your network and company severely. Yet, as an administrator you have no way to control this! Group policy offers no control.

Technology analyst Gartner warns that portable devices containing a USB or FireWire connection are a serious new threat to businesses. In a July 2004 report, Gartner named removable media devices as a significant security risk in the workplace and advised that these can be used both to download confidential data, and also to introduce a virus into the company network. Gartner’s report listed pocket-sized hard drives that connect using FireWire or USB hard drive or keychain drive, disk-based MP3 players such as the iPod, and digital cameras with smart media cards, memory sticks, compact flash and other memory media as potential security threats.

Regain control with GFI LANguard Portable Storage Control (P.S.C.)
GFI LANguard Portable Storage Control (P.S.C.) offers you network-wide control of which users can:
  • Plug in a USB stick 
  • Connect a smartphone, MP3 player, handheld 
  • Download/upload data to a digital camera 
  • Access CDs 
  • Access floppies 
spacer

Read More...>>




Indigo Secure Lite

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Access Control and Internet Filtering

Indigo Secure Lite delivers advanced security features at a budget price and is perfect for restricting access to family and home office computers systems. 

With sophiscated user management and access control features in one package, Indigo Secure safeguards your computer against tampering, malicious users and restricts access to programs and the Internet.

Key Features:
  • Internet Filtering 
  • Content Control 
  • Destkop Lockdown 
  • Access Control 
spacer

Read More...>>




InTouch Lock 2.5

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Restrict access to your PC and private data. 

InTouch Lock is an award-winning, versatile and comprehensive security solution for home users and system administrators alike to restrict access to the PC and sensitive information on it. This password-protected security utility allows you to block access to files, folders, disks, applications, Web resources, Control Panel modules, Internet Explorer parameters, Desktop, Start menu and much more. Multi-user and multi-profile support. Built-in scheduler. Event logging. Stealth-mode support. Multilingual convenient and friendly interface. 

InTouch Lock allows you to:
  • Administrate access to more than 80 most important parameters of the operating system, including your Desktop, Start menu, drives, Control Panel and all its modules, and much more
  • Lock your private files and folders to prevent them from being copied, removed or modified 
  • Prevent any program from launching 
  • Lock your system in one click for preventing unauthorized access to your computer and private data when you are away from the PC. Now with customizable background!
  • Block any windows and prevent any processes from executing on the system 
  • Prevent users from installing new or removing existing software on the system 
  • Restrict access to Web resources 
  • Set up Internet-related restrictions 
  • Disable system hot keys (like WINDOWS key, PRINT SCREEN key, etc.) and key combinations (like ALT+TAB, CTRL+ESC, etc.) 
  • Quick activate and deactivate InTouch Lock protection 
  • Import/Export security profiles. It is extremely useful to clone restrictions between computers on the net 
  • Schedule a dozen different actions like shutdown of your computer, lock screen, run external programs, etc., which will be performed at the specified time or when Windows starts 
spacer

Read More...>>




Limit Logins 2.0

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Windows does not have an integrated way of effectively restricting the amount of concurrent logins for a user. Limit Logins effectively restricts the amount of concurrent logins for any given user. 

Features:
  • Limit concurrent logins for specified users or groups on the network 
  • Ability to see where all users are currently logged into 
  • Log's all login/logout, time restriction, scheduled time, and denied access activity 
  • Ability to set the user to automatically logout/restart/shutdown after a specified time of being logged in (ex. after 5 minutes of being logged in) 
  • Ability to set a specific time to logout/restart/shutdown. (A very important security and power saving feature that you cannot set without Limit Logins!) 
  • Can send notifications (Email/Text Pager) on all login/logout/time restriction/scheduled time/denied access activity. 
  • Ability to send Messages to multiple users 
  • Send remote file execution commands to one or multiple users. Very useful for os updates, software installs, etc. 
  • Ability to remotely logout/restart/shutdown any logged in computer. 
  • Ability for client's to see which computers they are logged into. They can also remotely logout/restart/shutdown any computer they are logged into. (Configurable in security settings) This saves on Helpdesk calls. 
  • Ability to play any wav file just before logging out to get the attention of the user.
spacer

Read More...>>




NetExec 2.0

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


NetExec is a multisession extension for Windows NT and Windows 2000. Using NetExec it is possible to log on to a system with multiple accounts at the same time. So you can work with more than one user account simultaneously and switch between them without logging off and on.

Key Features:
  • Desktop-Manager
    The Desktop-Manager lets you create addition login-sessions, each running on its own desktop. This brings the Windows XP "Fast user switching" feature to your Windows NT/Windows 2000 box. But even Windows XP users will love it, as Desktop-Manager is much simpler to use and consumes fewer (a lot fewer!) system resources.
  • Create your own clients
    Using the CustomClient-Creator add-on, you can create special .EXE-files, that run a predefined command line under a different account. The command line and the password are stored encrypted inside the .EXE.
  • No special privileges needed
    Some su-tools require that certain, high power privileges like SeTcbPrivilege ("Act as part of operating System") are assigned to user accounts. This is very dangerous because it gives users the power to make themselves a member of the Administrators group! NetExec does not need such privileges.
  • Extended security features
    NetExec contains even more features for enhanced security. Additional sessions can be closed automatically, desktops can be password protected and much more.
  • Extended network support
    NetExec was designed for optimal usage in client server environments. Roaming profiles are full supported. Novell- or Windows networks are supported by special functions.
  • Complete command line interface
    Besides a very comfortable GUI NetExec is completely usable from the command line. Some special command line options make NetExec a first choice in advanced batch file scenarios like automatic software rollouts.
  • Temporary Administrator group memberships
    Another feature that make NetExec a excellent choice for software installation scenarios are extended group memberships. Using this feature it is possible to run a process under a non-privileged user account, but inside this process the user becomes also a member of the Administrators group. Therefore the app uses the profile, settings and home directory of the non-privileged user account, but runs with Administrator privileges.
  • Multilanguage support
    User interface and help files are available in English and German languages. The preferred language can be changed at runtime and is stored as a per user setting.
  • Runs on Terminal Services
    Most su-tools fail completely, if used from a terminal session hosted on Windows 2000 Advanced Server. The same problem applies to Windows XP's additional logon session created by "Fast user switching". NetExec works even well in such scenarios.
spacer

Read More...>>

 

Page 1  Page 2

space
Translate Page!
Espa˝olFranšaisDeutschNederlands


 

 

 

 

Newsletter

Sign-Up for The Business Junction Newsletter and Get "FREE" Newsletter Sign-Up Software, Specials Updates, Product Updates and MUCH MORE!


 

| Home | AdvertiseAffiliates | Contact Us | Contents | Disclaimer & Terms Of Use |

Free Bonus Gifts | Free Software | Hot Software | JV Giveaways | Link Partners |

Link To Us | Newsletter | Newsletter Articles (The Best From Our Archives) |

Privacy Policy | Site of the Week | Software Directory | Software Spotlights | Special Offers | Turnkey Web Sites |

The World's Largest Digital Package!
SUPER COMBO PACKAGE
(16,090+ Products & Getting Bigger Daily)

Our Other Premium Packages!
EXTREME Niche Combo Package (8,585+ Products)
Private Label Rights Package (3,230+ Products)
Graphics & Web Design Package (3,915+ Products)
Internet Marketing Package (2,615+ Products)
Sports, Leisure, and Health Package (2,540+ Products)
Social Media Marketing & SEO Package (1,265+ Products)
Affiliate Marketing Package (825+ Products)
Blog, Podcasting, & RSS Package (745+ Products)
Article Marketing Package (260+ Products)
Auction Marketing Package (210+ Products)
Joint Venture Marketing Package (65+ Products)
Pop-Ups Package (35+ Products)

Copyright 1996 - 2015 TheBusinessJunction.Com

Protected by Copyscape Plagiarism Finder
(All Rights Reserved: No material from this site may be copied for use on another site or
used for any commercial purpose without prior written permission. Violators will be prosecuted!)

The Business Junction does not offer technical assistance with any software sold from our website. All software comes with its own instructions, help and/or 
installation files. Note that most software is designed for Windows platform. If it does not specifically state that it is compatible with Mac platform, do not purchase.