Categories
|
Audio & Multimedia
Audio Encoders/Decoders, Audio File Players, Audio File Recorders, CD Burners, CD Players, Multimedia Creation Tools, Music Composers, Other, Presentation Tools, Rippers & Converters, Speech, Video Tools Business
Accounting & Finance, Calculators & Converters, Databases & Tools, Helpdesk & Remote PC, Inventory & Barcoding, Investment Tools, Math & Scientific Tools, Office Suites & Tools, Other, PIMS & Calendars, Project Management, Vertical Market Apps Communications
Chat & Instant Messaging, Dial Up & Connection Tools, E-Mail Clients, E-Mail List Management, Fax Tools, Newsgroup Clients, Other Comms Tools, Other E-Mail Tools, Pager Tools, Telephony, Web/Video Cams Desktop
Clocks & Alarms, Cursors & Fonts, Icons, Other, Screen Savers: Art, Screen Savers: Cartoons, Screen Savers: Nature, Screen Savers: Other, Screen Savers: People, Screen Savers: Science, Screen Savers: Seasonal, Screen Savers: Vehicles, Themes & Wallpaper Development
Active X, Basic, VB, VB DotNet, C / C++ / C#, Compilers & Interpreters, Components & Libraries, Debugging, Delphi, Help Tools, Install & Setup, Management & Distribution, Other, Source Editors Education
Computer, Dictionaries, Geography, Kids, Languages, Mathematics, Other, Reference Tools, Science, Teaching & Training Tools Games & Entertainment
Action, Adventure & Roleplay, Arcade, Board, Card, Casino & Gambling, Kids, Online Gaming, Other, Puzzle & Word Games, Simulation, Sports, Strategy & War Games, Tools & Editors Graphic Apps
Animation Tools, CAD, Converters & Optimizers, Editors, Font Tools, Gallery & Cataloging Tools, Icon Tools, Other, Screen Capture, Viewers Home & Hobby
Astrology/Biorhythms/Mystic, Astronomy, Cataloging, Food & Drink, Genealogy, Health & Nutrition, Other, Personal Finance, Personal Interest, Recreation, Religion Network & Internet
Ad Blockers, Browser Tools, Browsers, Download Managers, File Sharing/Peer to Peer, FTP Clients, Network Monitoring, Other, Remote Computing, Search/Lookup Tools, Terminal & Telnet Clients, Timers & Time Synch, Trace & Ping Tools Security & Privacy
Access Control, Anti-Spam & Anti-Spy Tools, Anti-Virus Tools, Covert Surveillance, Encryption Tools, Other, Password Managers Servers
Firewall & Proxy Servers, FTP Servers, Mail Servers, News Servers, Other Server Applications, Telnet Servers, Web Servers System Utilities
Automation Tools, Backup & Restore, Benchmarking, Clipboard Tools, File & Disk Management, File Compression, Launchers & Task Managers, Other, Printer, Registry Tools, Shell Tools, System Maintenance, Text/Document Editors Web Development
ASP & PHP, E-Commerce, Flash Tools, HTML Tools, Java & JavaScript, Log Analysers, Other, Site Administration, Wizards & Components, XML/CSS Tools |
|
DEKSI USB Security 2.8.1
|
DEK Software International
|
|
Description:DEKSI USB Security allows you to block unauthorized USB devices from any PC or your entire network. DEKSI USB Security will prevent unauthorized USB devices from being connected to your computer. DEKSI USB Security blocks unauthorized USB devices such as memory card readers and USB flash drives, removable storage and USB hard disks while allowing devices such as keyboards, mice and printers to be used as they would normally be. DEKSI USB Security is effective at small offices or in corporations with very large networks. DEKSI USB Security offers centralized deployment and management, and DEKSI USB Security is essential for enforcing security policies on removable storage devices, and it helps control file transfers as well as prevents infections from viruses that can bring your network operations to a halt. Blocking unauthorized USB devices is a small fraction of what DEKSI USB Security offers. DEKSI USB Security makes it possible to white-list USB devices that are considered safe such as printers, scanners, keyboards and mice, as well as any other devices that are allowed by the system administrator or network administrator.
To allow access to removable storage devices, you can assign passwords specifically to them. If the device is connected to a computer running DEKSI USB Security, it can be used if the correct password is used.
DEKSI USB Security operates completely in the background, and is undetectable to computer users. There are no pop-up windows and warning messages unless you want them to be configured that way. Running without being visible, DEKSI USB Security logs all attempts to connect authorized and disallowed USB devices, allowing system administrators to perform comprehensive audits of DEKSI USB Security whenever they want to check to make sure their operations are safe and secure. Now with encryption!
|

|
USB Security, USB Security Software, USB Lock, Disable USB, USB port Lock, lock USB drives |
|
|