FULL CONTROL 2.0
http://www.bardon.com/fullctl.htm
M020300000200000
Full Control is a complete Windows 95/98/NT systems
management solution. It includes security access control,
time limits, logging, web-browser tracking, remote
administration, helpdesk support, and many flexible
configuration options. Full Control provides effective,
reliable access management and remote administration
while still allowing use of the regular Windows desktop.
With Full Control, businesses can let employees use
authorized applications, yet monitor all activities and
prevent them from accessing or installing other programs
... stores, schools, and libraries can allow public
access to their computers, yet safeguard computers
against tampering ... and parents can control which
programs and websites their children use.
Access control: Full Control provides reliable security
coverage, even in Safe Mode. It lets you specify exactly
what programs can be run, by whom, and for how long --
even communications programs for the Internet or online
services. It allows full access to authorized software,
yet prevents accidental or malicious system modifications.
The user is validated at logon, can't run other programs,
can't change the computer's setup, can't get to
restricted files or folders. Full Control can also
control the number of pages that can be printed,
keyboard and mouse activity, boot-time behavior,
shutdown options, file-save directories, and more.
Year 2000 Solution: After you finally get your systems
Year-2000 compliant, what will keep them compliant? What
prevents the re-installation and use of the same
non-compliant software, as soon as you turn your back?
Full Control can log all usage, prevent unauthorized
installation, monitor and reconfigure settings remotely.
If you don't have time to do your Y2K updates more than
once, you need Full Control.
Reduce Total Cost of Ownership: The Gartner Group has
estimated an annual Total Cost of Ownership of $13,187
per year per Windows PC, in part due to the cost of
repairing configuration damage caused by unsophisticated
or malicious users. Full Control can eliminate this cost
by controlling user access to configuration options,
allowing companies to reduce the total cost of owning
PCs while maintaining their existing investments in
industry-standard hardware and software.
Web browser and application oversight: Full Control
monitors all World Wide Web browser activity by name,
location, and time. It also logs all software usage, the
number of pages printed from each workstation, attempts
to access locked files or folders, attempted password
hacking, and more. Its built-in reports and graphs can
analyze this information, or the data can be exported to
any database or spreadsheet.
Helpdesk support: When a computer acts oddly or crashes
for no reason, wouldn't it be handy if support staff
could call up a minute-by-minute list of all running
programs? That's what the Diagnostic Snapshot Logging is
all about. It even lists hidden programs that won't
show up on the Close Programs (Ctrl+Alt+Del) screen.
And after the problem is identified, have you ever
thought, "if only I could roll back the system
configuration to before I installed that program"? Well,
you can. This "Rollback" feature allows you to undo any
unintended or malicious system configuration changes
when misguided users, flawed applications or incomplete
uninstallers make a mess of your computer. Configuration
checkpoints are saved on your schedule, and can be
restored even if Windows won't run.
Remote administration: Full Control includes
network-based remote monitoring, control, and updating.
Its system administration capabilities can maintain any
size setup, from a single home PC to multi-computer
networked installations. All networked computers can be
managed from one central location. This includes the
ability to remotely monitor, update, logoff, shut down,
reboot or reconfigure Full Control stations. Full
Control also includes network-based license metering.
This lets you purchase only a few licensed copies of
some program, yet allow that program to be run from any
station on your network.
Remote installs, uninstalls, and management:
Administrators can remotely manipulate the Registry, see
and change the status of remote computers, and more,
all from one central location. Administrators can also
run commands remotely -- installers, uninstallers,
maintenance programs, batch files, or any other software.
Logon validation: Full Control can validate users at
logon, even on laptops and other stand-alone Windows
computers -- no network or NT server required. Unlike
the standard-issue Windows logon screen, which is easily
bypassed by pressing Escape or in other ways, Full
Control ensures that only valid users can log on. If you
do have a server, Full Control can ensure that no user
can log on, even just at the local computer, unless
validated by your server.
What's included: Some vendors charge extra for
historical-data logging, centralized administration, or
other modules. Full Control already includes everything
you need: access control software, central
administration utilities, event logging, built-in
reports, web-browser monitor, license metering, and more.