Enforcer Icon

Enforcer

Enforcer protects systems that are accessible to many people.

EnforcerOverview

Enforcer protects systems that are accessible to many people and require a consistent configuration and a consistent, limited selection of services such as public displays or computer labs.

It is also great for child-proofing individual systems and securing and limiting internet access. This is accomplished by insuring that user specified tasks either never run, always run, or are allowed to run. It is easy to configure and requires Little to no modifications to your current system configuration. Enforcer is being used successfully by school systems and corporations, Big And Small, around the world to effectivily protect their investment and keep their support costs low. A set of examples in the helpfiles and associated configuration files are provided to get you up to speed quickly.

You can enjoy it in .com

NEW

Fixed some bugs.

EnforcerInformation

Version
6.2
Date
12.15.08
License
Trial
Language
English
File Size
1.53MB
Developer
Category
Operating Systems
Windows XP, 2000, 98, Me, NT
System Requirements
No additional system requirements.
WorkStation Lock Icon
WorkStation Lock provides simple and effective security to password protect y...
Trial
More
Phone Spy Pro Icon
Phone Spy Pro - For iPhone, iPad, Android, Windows Mobile, Symbian OS Phones
Trial
Mandiant Red Curtain Icon
Red Curtain is free software for Incident Responders
Free
Microsoft Forefront Security for SharePo Icon
Security for SharePoint helps businesses protect their Portal Server.
Free
N-Stalker Web Application Security Scanner 2009 Icon
Scan and protect your Web applications from various attacks.
Free
USB Log & Lock Icon
Monitor, control, and log usage data of your USB devices.
Demo
Deep Freeze Enterprise Icon
Deep Freeze Enterprise protects and preserves baseline computer configuration.
Trial
Mandiant Web Historian Icon
MANDIANT Web Historian are stored in the history files
Free
Nsauditor Network Security Auditor Icon
Audit your network security for possible vulnerabilities.
Demo
More