|
|
|
Steel Network Inventory 2.6.18 - Author Info Page
Description: Ultra simple Network Inventory. Track hardware and software inventory with ease... (more)
|
Author Info for Steel Network Inventory 2.6.18
Author/Company Name: SteelSonic Technical Services
Country: India
Web Site: http://www.steelsonic.com
Programs listed: 4
|
Other listings by this author |
Remote Screenshot 1.1.4 (Downloads: 241)
Capture screenshots of remote computers with out any manual client installation Capture screenshots of remote computers in the network with immediate view. The screenshot is saved locally for later reference. Timed intervals for automatic screenshots at defined intervals.Take full sized screenshots of any remote computer with in matter of 3 seconds. Helpful in enforcing strict computer usage policy in the network. Useful to track inappropriate usage of computers by users.
Silent stealth mode operation makes it completely invisible ...
|
Steel USB Sentry 2.0 (Downloads: 235)
Control and prevent usage of USB drives, Memory cards and any portable storages. Steel Usb Sentry offers an simple yet effective control of portable media usage in the corporate network. It helps in preventing data theft and cyber crime possibilities through misuse of corporate data. Steel Usb Sentry effectively keeps a tight control of the portable media usage by preventing the users from copying confidential data from their workstations.
Steel Usb Sentry actively prevents users from using portable medias such as
...
|
Steel RunAs 1.5 (Downloads: 275)
Steel Run-As can run programs under a different user account credentials. Steel Run-As helps you in executing audit commands or any kind of application which runs properly when run only with administrator privileges without having to give the user full rights to his machine. For example "Nero CD writing" application runs properly only when run in administrator mode or with any other username with those credentials. Steel Run-As lets you give access to the user to run that application with administrator credentials without making...
|
|
|
|
|