Home  >  Security & Privacy  >  Access Control  >  USB Log & Lock
USB Log & Lock
USB Log & Lock allows you to control operations with USB devices on computers connected to the local area network of an organization or enterprise. With USB Log & Lock, you can forbid USB devices with the help of flexibly customizable rules both for separate devices and users and for groups of users.What problems can be solved with USB Log & Lock?It is hard to imagine a company without a computer and a compute without a USB port in it. The larger the company is, the m ore difficult it is to control the staff and the devices they use. At the same time, uncontrolled use of removable devices results decreases information security in a company. The risk of infecting computers with viruses and information leaks increases. USB Log & Lock allows you to decrease the risks and organize controlled access to USB devices. How? The program monitors operations with USB devices and saves information about their use to the database.
Program Selector Pro 2000/XP
Replaces standard Windows 2000/XP user interface (task bar, Start button, and icons) with user-configurable password-protected list box of program names. Individual programs can also be password protected. Provides access control for computers.
Provides access control and usage management. Allows you to either create a list of blocked programs or a list of allowed programs. Individual programs can be password protected.
Program Selector Pro 98/ME
Replaces standard Windows 95/98/ME user interface (task bar, Start button, and icons) with user-configurable password-protected list box of program names. Individual programs can also be password protected. Provides access control for your computer.
Web Site Zapper
Web Site Zapper closes Web browsers displaying undesirable Web sites. It can be used either for popup control, or to control Internet access. It can either close down any site on the bad site list, or close down any site NOT on the good site list.
1st Security Center Pro
1st Security Center is a security utility that allows you to restrict access to Windows important resources. This utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy.
Software program that prevents tampering with (changing) the computer clock
#1 Smart Protector - Internet Eraser
Erase history, cache (temporary Internet files), recycle bins, cookies, typed URLs, auto-complete addresses. Using Save/Restore State capability you are able to leave the computer in exactly the same state as it was.
Software Time Lock
Control when and how long the Internet, specific computer programs, and the computer itself can be used each day of the week
Web Padlock lets you controlÂ what Web pages can be viewed on your computer. It blocks other Web browsers ( Internet Explorer, etc.) from running. Only Web sites on Web Padlock's password-protected user-defined authorized list can be vis
CD DVD USB Locker
CD DVD USB Locker allows a user can Lock and unlock USB Drive, CD Drive.
TCP Splitter is a software tool that can split a TCP or UDP data stream into two or three identical data streams
GSM Guard allows you to control remote sites and objects equipped with security alarms, controllers, or surveillance systems that send alerts about specific events or issues via GSM, SMS, or GPRS.