Tuesday, September 8, 2009
Network LookOut Administrator Professional v2.6.7
Network LookOut Administrator Professional v2.6.7 | 4.73 MB
Windows 98/Me/NT4/2000/XP/2003/Vista
The Network LookOut Administrator Professional allows you to see live screens of remote computers. This way, you can always watch what users are doing on the remote computer. Additionally, you have the ability to take control of a remote computer by controlling the mouse and keyboard; this is especially useful when you need to assist the person who uses the remote computer. If you are an administrator, you can easily administer remote computers from your computer. To increase your efficiency the console now include several tolls that can be executed on all or just selected remote computers. Application works through Internet, LAN, WLAN or VPN. Agent can be remotely installed. Communication uses encrypted data streams.
What does it do?
It allows you to see live screens of remote computers. This way, you can always watch what users are doing on the remote computer. Additionally, you have the ability to take control of a remote computer by controlling the mouse and keyboard; this is especially useful when you need to assist the person who uses the remote computer. If you are an administrator, you can easily administer remote computers from your computer.
What is new in this release?
- Agent can be remotely installed.
- Encrypted data streams
What is it useful for?
- For monitoring your children’s activities on a remote computer.
- For monitoring students in the classroom to achieve better discipline or, just to assist them (by using the remote control feature) when they are in trouble.
- For lowering your business costs by monitoring what your employees are doing on their computers and helping them when they call you. Using the remote control feature enables you to fix problems remotely without visiting them; this saves you precious time.
- For administrating all computers just from one location – your computer.
- Turning off, restarting, hibernating .... remote computers with one click.
What are the major benefits of using Network LookOut Administrator Professional?
- Installation and use of the application is very easy since all of the functions can be accessed with a few mouse clicks.
- You have complete control over what remote users are doing.
- Unlike other similar applications, this application provides you with a live picture of the remote computer screens. The live screen (due to some optimizations) does not use a high bandwidth, but even when the lower network bandwidth is required the refresh interval can be enlarged using one mouse click.
- Unlike other similar applications, this application allows you to take over the remote computer by controlling its mouse and keyboard.
- The remote computers´ screens are represented in the table with a customizable number of rows as thumbnails.
- Using this application, you can always see which user is actually logged on to the remote computer.
- Execute several actions on all remote computers with on click
Main Features:
- Displaying a live picture of a remote computer.
- You can take control of a remote computer by controlling its mouse and keyboard.
- More remote screens can be displayed in a table.
- A remote screen can be zoomed to an actual size.
- The name of the connected user is displayed.
- When lower bandwidth is required, the refresh interval can be enlarged.
- Power off, restart, hibernate, suspend remote computers
- Log off desktop users
- Lock workstation
- Control screensaver
- Automatic connection to a remote computer is optional.
- Settings for the agent are encrypted and password protected.
- Connection to a remote computer is password protected.
- Access to monitoring the console is password protected. If more users use the same computer, different profiles and access passwords can be set.
- More monitoring consoles can be connected to the same remote computer.
- Agent can run as an NT service (for Windows NT, 2000, XP, 2003).
- Agent can run as a process (Windows 95, 98, Me).
- Application can optionally use encrypted communication.
- Agent can be remotely installed.
System Requirements:
Windows 98/Me/NT4/2000/XP/2003/Vista
Subscribe to:
Post Comments (Atom)
Disclaimer
This site does not infringe any Copyrights. It only lists through Freedom of Information Act what is listed on Search Engines.All files are found using legitimate search engine techniques. This site does not and will not condone hacking into sites to create the links it list. We will and do assume that all links found on the search engines we use are obtained in a legal manner and the webmasters are aware of the links listed on the search engines. If you find a URL that belongs to you, and you did not realize that it was "open to the public", please email on musichimusic@gmail.com to notify the blogmaster of your request to remove it. This is not an invitation for webblog haters to spam with requests to remove content they feel that is objectionable and or unacceptable. Proof of URL ownership is required. None of the files shown here are hosted by this server. I do not upload any file , links are provided by users of this site and other websites. If you do not have enough rights to download them please don't download.
User Agreement
The creator of THIS PAGE or the ISP(s) hosting any content on this site take NO responsibility for the way you use the information provided on this site. These Ebooks here are for educational purposes only and SHOULD BE VIEWED ONLY. If you download any files to view them, you are agreeing to delete them within a 24 hour period. If you are affiliated with any government, or ANTI-Piracy group or any other related group or were formally a worker of one you CANNOT enter this web site, cannot access any of its files and you cannot view any of the HTML files. All the objects on this site are PRIVATE property and are meant for previewing only. If you enter this site without following these agreements you are not agreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files, cannot prosecute any person(s) affiliated with this page which includes family, friends or individuals who run or enter this web site. IF YOU DO NOT AGREE TO THESE TERMS THEN LEAVE.
No comments:
Post a Comment