Computer Security Programs for Windows
by Leithauser Research


    Leithauser Research provides a variety of computer security programs. Most of these are designed to help you control who has access to your computer, what programs they can run, and what Web sites they can visit. All of these programs are distributed as shareware, which means that you can try them for 30 days for free before you pay for them. Below is a list of programs.

Internet Password Lock

Internet Password Lock is a Windows  2000/XP/Vista (does not work on 95/98/Me/NT) Internet security program that locks all Internet access (Web, email, Instant Messaging, etc.). Useful in for parents to protect their children by controlling their Internet access and business to control Internet use. For more information on Internet Password Lock, click here .

Clock Guard

     Clock Guard is a Windows program that prevents tampering with the computer clock. It can be used for various purposes. A few examples are:
1) Preventing files from being given falsified time/date stamps by manually resetting the system clock and then saving the file.
2) Prevent employees who are using a computer-based time clock from altering the time to allow themselves to "punch in" at a falsified time.
3) Prevent users who have time limited programs (programs that can only be used at certain times) from accessing these programs at improper times.
4) Prevent people who are paying for computer use on a time basis from resetting the clock to reduce the amount of time they pay for.
5) Prevent people who are restricted to a certain amount of computer time per day (usually children) from resetting the computer clock to give themselves more time.
     Unlike other clock control programs, Clock Guard does not require an Internet connection. It does not automatically set the computer clock to the correct time by dialing up an atomic clock somewhere. It works by preventing sudden changes in the computer clock. You can deactivate clock protection with the password you select when you install it. This allows you to set the clock if it becomes wrong. Click here for more information on Clock Guard.

Drive Blocker

    Drive Blocker is a software program for Windows XP computers (does not work on Windows 95/98/Me/2000/NT) that allows your computer to block  access to removable drives to prevent people from using any removable drives or media, such as flash drives (sometimes called thumb drives), CD's, or floppy drives on your computer. A password (selected by you when you install Drive Blocker) is required in order to reactivate the removable drives. This allows you to prevent theft of sensitive information from your conmputers and also to prevent employees from installing unauthorzed software on company computers. Click here for more information on Drive Blocker.

Web Site Zapper

    Web Site Zapper is a Windows 95/98/2000/ME/XP/Vista software program (does not work on NT) that closes Web browsers that are displaying undesirable Web sites. It can be used for several purposes:
1) Blocking your browser from being redirected to dangerous or undesirable sites, such as those infected with viruses.
2) Blocking popups
3) Access control, to allow parents, schools, and employers to prevent children, students, or employees from going to undesirable sites, such as pornography or gambling sites.
4) Controlling when people can access the Internet. Web Site Zapper has a password protected switch to turn off blocking, so you simply have Web Site Zapper block all Web sites until you are present and can turn off the blocking. Parents can use this to control how much time children spend on the Internet.
    With Web Site Zapper, you compile a list of good and bad Web site titles and/or URLs (Web addresses). You can add Web site titles and URLs to these lists manually, or have Web Site Zapper build these lists automatically in learning mode (explained in the instruction manual).
    Once you have built a list of Web sites, Web Site Zapper can either close down any site on the bad site list (Block mode), or close down any site NOT on the good site list (Allow mode). Web Site Zapper provides the same function as Web Padlock, but operates differently. It has some advantages and some disadvantages. We suggest that you try both, and see which one best suits your needs. For more information on Web Site Zapper and to download a trial copy, click here.

Software Time Lock

    Allows you to block access to the Web, individual programs, or the entire computer during selected time periods for each day of the week. Also allows you to control for how long the Internet, individual programs, or the computer itself can be used in total for each day of the week. For more information, click here.

Settings Lock

Settings Lock is a software program for Windows 95/98/Me/2000/XP/NT/Vista computers that allows you to password protect 13 Windows settings and functions. These settings are:

Settings Lock protects these functions by blocking the Windows programs that allow you to access them. For example, if you password protect the System Restore, Settings Lock will not allow the System Restore program to run until you deactivate the Settings Lock protection. There is a button on the Settings Lock control panel that allows you to temporarily turn off all protections, provided you know the supervisor or administrator password. You an also permanently turn of any one or more of the protections if you know the administrator password. For more information on Settings Lock, click here.

Computer Payment Enforcer

Computer Payment Enforcer is a computer program that helps you to collect payments for computers that you have sold on credit or are renting out. Installed on a computer you are selling or leasing, it will lock down the computer when payments are overdue. In order to unlock the computer, the person must input a payment code, which you supply once they have made their payment. For more information, click here.

Hide-A-File

Hide-A-File is a Windows 95/98/NT/2000/ME/XP computer security software program that allows you to hide files and folders so they cannot be accessed. You then need a password to retrieve the hidden files or folders.For more information, click here.

Trojan Slayer

    Protect your computer from Trojans (a common form of computer virus). Trojan Slayer learns what programs belong on your computer, then blocks or eliminates any programs that invade your system. For more information on Trojan Slayer, click here.

Program Selector Pro

    Program Selector Pro is a computer security program that provides access control and usage management. When installed, it replaces the standard Windows 95/98/2000/NT/XP/ME user interface (task bar, Start button, and icons) with a convenient user configurable list box of program names. The person who installs Program Selector Pro decides which programs to include in the list box, giving this person complete control over which programs can be run on that computer. In addition, each program on the list can be password protected, and a password can also be assigned to access Windows itself. A supervisor level password is required to add programs to (or remove programs from) the program list box. An administrative level password is required to restore the original Windows interface. This provides the person who installs Program Selector Pro with the ability to completely control the use of a computer. This program is most useful in a business setting, where the supervisor needs the ability to control who can do what on each company computer. It can also be useful in a family setting, however, to give parents control of the computer to block children from using certain programs. Virus protection and a program uninstall feature are also provided by Program Selector Pro. Click here for more information on Program Selector Pro.

Program Sentry

    Program Sentry is a less intrusive (although somewhat less thorough) alternative to Program Selector Pro. This Windows 95/98/Me/2000/XP (does not work on NT computers) computer security program that provides access control and usage management. When installed, it allows you to either create a list of blocked programs or a list of allowed programs. In the blocked programs mode, any program on the list is blocked. In the allowed program mode, any program NOT on the list is blocked. Which mode you choose to use depends on whether you have a few programs you want to block (in which case you would use the blocked program mode), or you have a few programs you want to allow people to use (in which case you would use the allowed program mode).
    In both modes, you can assign optional  passwords to the programs on the list. In blocked program mode, if no password is assigned to a program, it cannot be individually unblocked. If a password is assigned to a blocked program, it can be unblocked using the password. In the allowed program mode, if no password is assigned to the program, it is never blocked. If a password is assigned to the program, it is blocked until someone enters the password for that program. passwords are useful if several people use the computer, and you want each to be allowed to use different programs. You can give each person the passwords to the programs they are allowed to use.
    An administrator password is required to add or remove programs from the lists or change their passwords. This provides the person who installs Program Sentry with the ability to completely control the use of a computer. All blocking can be temporarily turned off using supervisor level password. This password cannot be used to add programs to (or remove programs from) the program lists.
    This program is most useful in a business setting, where the supervisor needs the ability to control who can do what on each company computer. It can also be useful in a family setting, however, to give parents control of the computer to block children from using certain programs. Click here for more information on Program Sentry.

Web Surfer Watcher

     Web Surfer Watcher is a software program for Windows 95/98/Me/2000/XP (does not work on NT computers) that records what Web sites have been viewed on your computer. Web Surfer Watcher operates hidden in the background, recording Web site titles and URLs (addresses) of Web sites viewed using Internet Explorer or America Online. It can only record the titles of Web sites viewed with other Web browsers, such as Netscape, Opera, or Mozilla. You can configure Web Surfer Watcher to either record this limited information form these browsers, or block these browsers from running to force people to use Internet Explorer or America Online.
     When you run the viewer, you will see a list of the titles of Web sites that have been visited. The list displays the Web site titles. You can click on any title on the list to see the URL of the site, and also when the site was viewed. You can then click on the View Web Site button to actually see the Web site if you like. You can search the list of viewed sites for specific words to simplify checking for objectionable sites. This program can easily be run on a network, allowing you to monitor Internet activity on multiple computers from one computer. For more information on Web Surfer Watcher, click here.

Computer Use Reporter

    Find out what your employees or children are doing on the computer. Computer Use Reporter covertly monitors what programs are used on the computer, what files or Web sites these programs access, when they are accessed, and which user is on the computer at the time.
    This program can easily be run on a network, allowing you to monitor Internet activity on multiple computers from one computer. For more information on Computer Use Reporter, click here.

Autobackup

    AutoBackup allows you to easily back up critical files. It is particularly useful if you have a specific set of files you need to back up frequently, although it can also perform more general backups. It is also useful if you simply want to routinely copy certain files to a floppy for transport to another computer. You can input a specific list of files that you want to back up. This list can also include general file masks, such as C:\My Documents\*.* (all files in the "My Documents" folder), when you want to backup up an entire group of files. Once you have input this list of files and/or file masks, you can easily make backup copies of all these files at the click of a mouse button. You can even tell AutoBackup to automatically back up all your critical files when you exit Windows (hence the name AutoBackup). Although AutoBackup is particularly useful if you have a specific group of files that need to be backed up regularly, it can also be used as a general backup program. You can tell AutoBackup to simply back up all the files on any drives you select that have changed today, or since any other date you select. Click here for more information on AutoBackup.

   If you have any questions, please send email to Leithauser@aol.com. You can also call (386) 738-0418 between the hours of 11 AM and 5 PM Eastern time.

   If you prefer to write, the address is

Leithauser Research
3624 Royal Fern Circle
DeLand, FL 32724-1223

Return to Leithauser Research home page

This site is a member of WebRing.
To browse visit Here.

 

Hits since 6/11/2004

Powered by counter.bloke.com