Categories
Security

CYBERsitter Security Related Security for Windows

A full-featured content management product that keeps kids safe by restricting access to millions of objectionable websites
CYBERsitter was designed to be a full-featured content management product that keeps kids safe by restricting access to millions of objectionable Internet websites, providing detailed logs of all Internet access. New categories include social networking sites such as MySpace, FaceBook and others

Here are some key features of “CYBERsitter”:

· Microsoft Vista Compatible – Vista compatibility required a complete rewrite of the CYBERsitter core functions. Microsoft introduced new and highly restrictive security system with Vista and because CYBERsitter is designed to be a secure and stealthy product, it was a considerable effort to provide the same functionality while complying with the Vista security requirements.

· CYBERsitter V-Token Technology – With this release, we are introducing our patent pending V-Token technology. This is a new and extremely useful feature that is only available in CYBERsitter. Basically, whenever CYBERsitter is in an active filtering mode, it transmits a special code whenever a web site is accessed. This lets the website know that the user is restricted from accessing potentially inappropriate content. Responsible web site operators can then deny access or adjust their content offerings so that inappropriate content will not be displayed to children. Our new V-Token technology is extremely powerful. In the future you will be able to specify numerous restrictions or permissions with respect to what you allow your children to do online.

· Granular Filter File Categories – New filters have been added and will be added in the future to disable selected content on web sites. For example, you might not want your kids to be able to create personal profiles on social networking web sites like FaceBook and MySpace. However, it might be ok for them to browse others profiles. This new capability will allow you to restrict access to certain functionality available from online services, without completely blocking the sites themselves.

· Plug-in Support – Many of our customers have requested additional features over the years that may not be appropriate for all circumstances. With this release, we have made provisions for plug-in support so we can offer additional functionality to customers that need additional capabilities. The first plug-in we will be offering is the CYBERsitter Keyboard Monitor. This will allow parents to monitor whatever their children type on the keyboard. It integrates directly into the CYBERsitter logging and reporting functions and will allow you to see what was typed into various programs. This plug-in will be available on December 1st, 2007.

· Secure Web Page Blocking – You can now block access to all “Secure” web pages by checking a single box. While this may not be appropriate for every installation, it may be useful for younger children. This will basically prevent access to secure web pages where personal information may be collected, new accounts opened for various goods or services, or even phishing sites set up to collect personal information that could be used for illegal purposes.

· Anti-Zombie Detection – Did you know that over 90% of email spam sent on the Internet comes from unknowing users like yourself? This is especially common in households where children use the computer and download games or music programs. Small, hidden programs are secretly install on your computer that spammers can access to send their spams out so that they can harness the power of thousands of computers simultaneously. CYBERsitter now monitors unusual levels of activity from hidden programs and will shut them down automatically preventing your computer from being used as a spam machine.

· Built-in Remote Control – If you have CYBERsitter installed on more than one computer on your local network, you can have full access to the CYBERsitter settings just as if you were sitting at the computer. No additional software is required. Whether you have 2 or 200 CYBERsitter protected computers on your network, you can simply select the the computer you want to access from a list, enter the CYBERsitter password, and you will be able to change settings, view logs, and perform other operations just as if you were sitting at that computer.

· Same Familiar Interface, New Look – Unlike many programs that just move everything around and call it a new version, we always try to maintain the same basic user interface so you don’t have to waste your valuable time learning how to use a new program. CYBERsitter 10 has a new, more up-to-date style, but we have maintained the same basic layout so previous users will be able to find everything easily using an interface they are already familiar with.

Limitations:

· The trial version will expire and cease to function 10 days after installation. Certain other features like password protection are disabled.

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!