Your Ad Here

Tuesday, September 8, 2009

Salfeld User Control 2009 v6.186


Salfeld User Control 2009 v6.186 | 14.4 MB

Computers are great tools. However, a computer cannot, on its own, control the way in which it is used. However, this may be necessary to prevent problems, as when employees download pirated software from the web, or when students use a school computer for unintended purposes, or trade show attendees change the settings on a public computer. Our software is designed for small and medium-size companies, schools, public agencies, and, of course, also for individuals who are interested in protecting their computer.User Control can prevent specified applications from starting and block access to blacklisted websites. It can also prevent access to operating system components. This keeps users from altering system stettings and changing the appearance of the desktop.

User management: Determine at a glance what limits have been set for any user or user group. It’s easy: just click the last column to see which users belong to a given group.

Improved software filter: For any application, establish whether it is always available, never available, or restricted by time. User Control shows both the application name and the name of the executable file. An application can be made available only at specified times.

Controlling window titles: You can set restrictions not only for individual applications, but also for specified window titles. Window titles can be blocked system-wide or for individual applications.

Desktop Protection: To prevent changes to a desktop once it has been set up, you can lock in its appearance. This means that you can stop individual icons from being moved, deleted, or renamed. You can also prevent hiding of the start menu or the taskbar.

Internet Safety: Use filter categories, such as ”sex” or ”chat” to determine the types of web content you would like to allow or prohibit. You can also prevent downloading of .exe and .zip files.

Say yes to the web, but...: Define which web pages (URLs) or keywords you dont want to see on your computer. Users who surf to one of these pages will see a warning message displayed. You can also import or export lists of restrictions.

Websites: You could create a list of the URL’s that your users need to do their work. Once this is done, any other pages can be completely blocked. You can also make certain sites available only during restricted times (such as lunchtime).

Settings: You can configure whether users will see warning messages, how often the log files are to be reset, or if User Control is to run in ”hidden” mode.

Protecting the start menu and desktop: You can restrict access to a large number of Windows system settings. For example, you can prevent the display of individual items on the start menu, restrict access to Control Panel, prevent logging off or shutting down, and much more.

System Protection for Internet Explorer: In addition to the general Internet settings, there are some special restrictions that can be set especially for Microsoft ™ Internet Explorer. You can use these to prevent downloading and block access to settings and configurations.

Network system protection: Use this page to limit access to the principal settings for your network environment. For example, you can establish which parts of the network are visible for a particular user and which ones are not.

Log files: Use this page to see what happened while your computer was online, and which user was logged on. The logs show you both a list of started applications and of websites that were visited. The list can be exported into formats such as Excel or text.

No comments:

Post a Comment

Your Ad Here

Disclaimer

This site does not infringe any Copyrights. It only lists through Freedom of Information Act what is listed on Search Engines.All files are found using legitimate search engine techniques. This site does not and will not condone hacking into sites to create the links it list. We will and do assume that all links found on the search engines we use are obtained in a legal manner and the webmasters are aware of the links listed on the search engines. If you find a URL that belongs to you, and you did not realize that it was "open to the public", please email on to notify the blogmaster of your request to remove it. This is not an invitation for webblog haters to spam with requests to remove content they feel that is objectionable and or unacceptable. Proof of URL ownership is required. None of the files shown here are hosted by this server. I do not upload any file , links are provided by users of this site and other websites. If you do not have enough rights to download them please don't download.

User Agreement

The creator of THIS PAGE or the ISP(s) hosting any content on this site take NO responsibility for the way you use the information provided on this site. These Ebooks here are for educational purposes only and SHOULD BE VIEWED ONLY. If you download any files to view them, you are agreeing to delete them within a 24 hour period. If you are affiliated with any government, or ANTI-Piracy group or any other related group or were formally a worker of one you CANNOT enter this web site, cannot access any of its files and you cannot view any of the HTML files. All the objects on this site are PRIVATE property and are meant for previewing only. If you enter this site without following these agreements you are not agreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files, cannot prosecute any person(s) affiliated with this page which includes family, friends or individuals who run or enter this web site. IF YOU DO NOT AGREE TO THESE TERMS THEN LEAVE.