|
|
|
Steel RunAs 1.5 - Author Info Page
Description: Steel Run-As can run programs under a different user account credentials... (more)
|
Author Info for Steel RunAs 1.5
Author/Company Name: SteelSonic Technical Services
Country: India
Web Site: http://www.steelsonic.com
Programs listed: 4
|
Other listings by this author |
Steel USB Sentry 2.0 (Downloads: 235)
Control and prevent usage of USB drives, Memory cards and any portable storages. Steel Usb Sentry offers an simple yet effective control of portable media usage in the corporate network. It helps in preventing data theft and cyber crime possibilities through misuse of corporate data. Steel Usb Sentry effectively keeps a tight control of the portable media usage by preventing the users from copying confidential data from their workstations.
Steel Usb Sentry actively prevents users from using portable medias such as
...
|
Steel Network Inventory 2.6.18 (Downloads: 487)
Ultra simple Network Inventory. Track hardware and software inventory with ease. Simplified network inventory application. Track hardware and software inventory with ease.
The application has been designed keeping in mind the exact requirement of system managers. Steel Inventory helps you keep a good control over the IT assets you maintain. All the required features in the simplest form is our goal. Steel Inventory lets you take a snapshot of the original configuration and informs you when there is a change in the configuration eith...
|
Remote Screenshot 1.1.4 (Downloads: 241)
Capture screenshots of remote computers with out any manual client installation Capture screenshots of remote computers in the network with immediate view. The screenshot is saved locally for later reference. Timed intervals for automatic screenshots at defined intervals.Take full sized screenshots of any remote computer with in matter of 3 seconds. Helpful in enforcing strict computer usage policy in the network. Useful to track inappropriate usage of computers by users.
Silent stealth mode operation makes it completely invisible ...
|
|
|
|
|