Home
Read our
Blog
Our
Products
Home
and Business Software Tools and Utilities | Page1 | Page2 | Page3 | Page4 | Page5 |
*
Financial
and Administrative Tools for different Business
and Home Uses: Sale Tracking, Estimating, PDA
Estimating, Innovative Thinking, Real Estate
Purchase Evaluator, Rental Property Manager,
Personal Debt Repayment Accelerator and Control,
Personal Budgeting and Payment Scheduling,
Financial Family Health Care Control
*
More
Optimizers & Diagnostics Utilities for
Registry Errors, Disk Cleaners and System
Cleaners
*
File Lock
Software, Privacy and Identity Protector,
Password Decryptor and Recovery, File Search and
Recovery
*
Salus
File Access Monitoring, Employee Control, Child
and Teen Computer Monitoring, Password Recovery
|
Privacy Protector - Spy
Ware Alert - Spy and AdWare Remover - Anti Virus
- Emergency Virus Reponse - Internet Evodenmce
Elimonator - Lap Top Theft Tracking Software |
Ringtone
Makers for your iPhone and other Mobile Devices-
Monophonic, Polyphonic and Music Ringtones
explained- Video to iPhone Converters |
Voice
Chat Line Utilities, Video Chat Utilities, Voice
and Webcam Morphers, File Sharing Centers for
Films and Music |
ACD
Audio and MP3 Products
MP3
Educator (Normalizer Utility)
Advanced
Equalizer
CD/DVD
ROM Tester
|
Audio
Applications: Audio Players, Rippers &
Encoders , Video to iPod Encoders, Jukeboxes and
MP3 Utilities |
Audio
Players, Karaoke, CD, DVD and Audio Rippers, iPod
utilities (Rippers), LAN Music Systems |
BlackBerry
Video Converters - iPad/iPhone to Computer
Transfer - DVD Cloner - MP3 to WAV Converters and
other Utilities - Acustica Powerpack - MP3
Converter - CD Burner |
DVD
Converters and Rippers, AVI, MPEG, HD DivX
Converters, Mobile Phone Bundle, DVD Copy
Software |
Games:
Action, Adventure, Lotto, Board Games for
Windows, Money Games, Strategy and War
*
Games:
Battlefleet, Snooker and Pool, Arcade Games |
Sites
for Shareware, Software Evaluation and Tests, and
Download Sites for Free Software |
End User Purchase
Agreement
Privacy Policy
Copyright
©2000-2021
interpublishgroup
|
|
is a security
application which allows the owner or
user of a desktop or laptop computer to see which
files are accessed, when, for how long, which
Internet sites are being connected to, who sends
e-mail to where, and so on. |
In fact,
the program keeps a detailed log of
all the activities perfomed on the computer.
It is a security application
which allows the owner or user of a desktop or
laptop computer to see which files are accessed,
when, for how long, which Internet sites are
being connected to, who sends e-mail to where,
and so on. In fact, the program keeps a detailed
log of all the activities perfomed on the
computer. The program
can be made invisible to the user of the computer, giving
access only to authorized persons. It is
therefore an ideal security program for companies
or within the family, where one might want to
have a record of your computer activity or,
alternatively, watch over the activites of a
child's or employee's computer use. |
Some
selected Examples
for the Use of are :
- To
find out what the user, employee or your children
are doing in your computer.
- To
detect abuses, non authorized accesses, Internet
pages visited, etc.
- To
discover what programs are being used when and
for how long.
- To
recover lost or forgotten passwords.
- To
recover information that was written or copied to
the clipboard.
- To
recover information when a program or the whole
system hangs up.
- To
recover the address of an internet page from a
key word, such as a date it was visited, etc
- To
control employees activities such as employees
engaged in telework, sales or technical support
functions.
- If
the user is himself a person authorized to access
the program, then it can serve as record of what
he/she did on a particular day or time (e.g.
consultants or employees whose time is being
billed to third parties.
The program is totally hidden from the
user and does not require Internet access. Since it does
not accept remote instructions, it is safe from hackers
and other unauthorized access.Only the person installing
the program, can decide who has access to its
information. That is why you will not see any reference
to the program in the start-up menu of Windows.
The program has been tested on a multitude
of systems, running a vast array of application programs
and games to verify its compatibility. It offers complete
stability and does not interfere with any other program
running on the system. Although, it controls and records
access to programs, it does not modify these programs in
any way.
Minimum system requirements:
486-66 or Pentium I with 32Mb or
Memory and 2Mb free hard disk space
CD-ROM
Windows 95, 98, NT 4.0 (SP3, SP4,
SP5, SP6), 2000 and ME, XP
is Multi Lingual
and offers a choice of languages
ENGLISH
SPANISH
GERMAN
FRENCH
Despite its technical
sophistication, the installation and set up of is very easy and
requires only minimal computer literacy. There are only
two control windows, the viewer and the setup window.
which offer the authorized operator all the options. One
can select the language and set the number of days one
wishes the program to keep information (for up to 999
days, if you want!).
|
A
password is activated and short cut keys from the
keyboard may also be selected. In addition, there
is a clip board capture option. To
install the program place the CD in the CD-Rom
and the installation will normally automatically
start or download the file into a temporary
folder and then proceed to install from there. You
should note: Because it is intended to keep the
program away from the eyes of the unauthorized
user, the Salus program will not be appearing as
an option on your Windows Start up Program, nor
amongst the install/uninstall option when you go
to the Settings and Control Panel.
|
This module allows the authorized
operator to see the activity performed on the computer
day by day, chronologically, incorporating a series of
special facilities when clicking on specific information:
The use of various filters organizes the activity log
into an easy readable record of the work performed on the
computer. By putting the captured information into the
clipboard you can make a print out and keep a record on a
day by day basis
To Purchase the
Product as a Single User
System with a Credit Card on a Secure
Server click here |
Purchase an on-line download
of
(3,688.9 kb) (v 1.0.17)
|
on CD-ROM |
|