New Security Software for Leithauser Research
Record which Web sites have been viewed on your computer. Web Surfer Watcher operates hidden in the background, recording Web site titles and URLs (addresses) of Web sites viewed using Internet Explorer or America Online. The program can record only the...
Protect your computer from Trojans. Let Trojan Slayer learn what programs you use on your computer, then switch to one of several enforcement modes, where it blocks or eliminates any program that it has not learned is a good program. Enforcement modes are...
Block and disable removable drives (flash drives) and drives that use removable disks (CD's, floppies). User selected password required to access removable media. Stop data theft, installation of unauthorized software. Reduce infections of viruses, worms,...
Hide files or entire folders on your hard drive. You can not only hide files such as documents or spreadsheets, but you can hide the executable program files to restrict use of the programs. A password set up by you is necessary to unhide files or folders...
Password protect all access to the Internet (Web surfing, Instant Messaging, and email). Protect children by making sure they do not use the Internet without a parent present or lock out unauthorized Internet use on business computers. Once Internet...
Sell or lease computers and have customers not paying on time. Install Computer Payment Enforcer (CPE) on the computers. Input information on when payments are due. Each day, CPE displays a small screen telling the customer how many days are left until...
Program Sentry provides computer-access control and usage management. It allows you to create either a list of blocked programs or of allowed programs. In the blocked programs mode, any program on the list you create is blocked. In the allowed programs...
Web Site Zapper closes Web browsers that are displaying undesirable Web sites. It can be used either for popup control, or to control Internet access. It can also control when people can access the Internet. Create lists of good and bad Web sites, either...
Clock Guard prevents tampering with the computer clock. It insures integrity of file time or date stamps, employee sign-in or sign-out times, and computer use registration. You have several levels of protection, including simply blocking access to the...
Software Time Lock controls when and how long various computer functions can be used each day of the week. Set blocks of time during which you cannot access the Web, set blocks of time during which specific programs cannot be used, set blocks of time...