Internet Filter &
 
Monitoring Software
    Reviews
Protecting Your Family While They Are Surfing Online!
Home  |   About Us   |   Articles/Links   |   Other News   |   Contact Us


  • Articles/Links

    » Chilnet International
    » CyberAngels
    » Enough-Is-Enough Safeguards
    » FBI Publication - A parent's Guide to Internet Safety
    » GetNetWise
    » Internet Rules
    » Internet Watch Foundation
    » Safe Surfing


  • Archive for February, 2008

    BlazingTools Secure Office

    21st February 2008

    Secure Office is an affordable, compact monitoring solution, designed for local networks. It captures keystrokes, websites visited, chats from instant messengers and takes screenshots. The user logs are stored on the admin’s PC. The user logs can be viewed using any web browser. Online access to the logs can be protected with a password. The program is simple to install and deploy. It takes just minutes to start monitoring your network. Secure Office monitors multiple users and multiple computers and archives each user’s activity. This is an ideal tool for an employer or network administrator. Secure Office – when you need to know what your employees are doing when you are paying for their time! Tag:secure office covert surveillance monitoring keylogger keylogging recording spy software network LAN admin

    AntiSpam

    21st February 2008

    Anti Spam automatically identifies and moves spam mails into a special Spams folder and ensures that only legitimate mail reaches your Inbox. As the mail arrives in the Process folder, it is immediately scanned for all the SPAM signature sets in the XMicro database and is scored accordingly by the Spam Blocker plug-in. This spam score then decides whether the email is SPAM or legitimate. All the emails which have more than XMicro’s preset score as the spam score, will be delivered to the SPAM folder and rest of the mails (legitimate ones) will as usual reach your inbox. How spamblocker works: The plugin automatically updates itself and gets the latest spam signatures. It uses the keywords in the message headers and message body, domain, Spam blacklists and also the internal Banned and Safe Lists to determine the probability of a mail being Spam and assigns the mail a score. Mails with scores above a preset threshold are marked as spam. Mails from people you correspond with are safely delivered to your Inbox. Any email address from your safe list will override the spam-score rule and the mail will be delivered to your inbox Tag:anti spam filter spam blocker spamblocker email spam filter anti spam monitoring software spam blacklists SPAM signature filter spam filter mail plug-in email plug-in spam plug-in email monitor email tools email security email software

    Computer Use Reporter

    21st February 2008

    Find out what your employees or children are doing on the computer. Computer Use Reporter convertly monitors what programs are used on the computer, what files or Web sites these programs access, when they are accessed, and which user is on the computer at the time. Computer Use Reporter is a software program for Windows computers that records what programs are used on a computer. Specifically, it records the text in the title bars of any programs that are run on a computer. The title bar is the blue bar at the top of most windows. This title bar almost always contains the title of the program (hence the name, title bar) such as ‘Internet Explorer’ or ‘MicroSoft Word’. In addition, on most programs it also contains information about what file the program is currently accessing. Of particular importance is that Web browsers include the title of the Web page being viewed in that browser. For example, if you were viewing the Leithauser Research home page in Internet Explorer, the title bar would be ‘Shareware Software by Leithauser Research – Internet Explorer’. This means that you can track what Web sites are viewed on a computer that has Computer Use Reporter installed. Computer Use Reporter records the date and time the title bar is opened, and the date and time each time it changes. If there are several users who have access to the computer, it records which user is using the computer at the time the program is used. Tag:covert surveillance computer monitor computer monitor use

    AllSpyMonitor

    21st February 2008

    AllSpyMonitor is a stealthy computer monitoring software which allows you to secretly record all activities of computer users including Web sites visited, every keystroke (including login/password of ICQ, MSN, AOL, AIM, and Yahoo Messenger or Webmail), file operations, online chat conversation, and take screen snapshot at set intervals just like a surveillance camera directly point at the computer monitor.AllSpyMonitor lets you know EXACTLY what others do on your PC while you are away. AllSpyMonitor secretly monitors all activity while it is completely hidden from others–No trace in Add/Remove Programs, Start menu, Applications, and no icons. AllSpyMonitor is designed for the hidden computer monitoring and the monitoring of the computer activity.AllSpyMonitor is the perfect tool for catching a cheating spouse, it is also perfect for long-term child monitoring. Imagine being able to see EXACTLY what your child is doing online. Are they being safe online? Now you’ll be able know for sure so you can take action. Tag:monitoring software spy software computer monitoring pc monitoring keystroke log

    72 Of Illicit Sex Reported Last Year (BruDirect.com)

    21st February 2008

    Bandar Seri Begawan – A total of 72 cases of illicit sex were registered in 2007 under Act 178 of the Syariah (Islamic) Law. These illegitimate relationships resulted in birth of 44 children. Under Act 177, 172 cases of khalwat were registered, which included 19 people under the age of 20.

    Outrage heralds off-beat television crime drama (Daily Local News)

    21st February 2008

    Remember Charles Bronson in the 1974 flick “Death Wish?”

    Vista SP1 breaks ZoneAlarm, Trend Micro apps, among others (BetaNews)

    21st February 2008

    Microsoft has presented a list of applications which are adversely affected by the problematic Vista Service Pack 1, some of which cease to function entirely.

    AT&T Web Site to Deliver Fresher, Faster and Friendlier Shopping Experience (The San Francisco Examiner)

    21st February 2008

    SAN ANTONIO , Feb. 21 /PRNewswire-FirstCall/ — AT&T Inc. (NYSE: T ), the nation’s No. 1 wireless and broadband provider, is making shopping a whole lot easier at http://www.att.com . AT&T is unveiling a series of upgrades that will provide its millions of customers with convenient and seamless access to its complete portfolio of wireless, broadband, video and voice services — whether at home …

    Industry Thought-Leader, Dave Lewis, Joins Bizanga as VP of Market & Product Strategy (Broadcast Newsroom)

    21st February 2008

    SAN MATEO, California, February 21 /PRNewswire/ — Bizanga, the global company behind the most scalable and full-featured email and message processing platform, today announced that Dave Lewis has joined the company as vice president of market and product strategy.

    AT&T Web Site to Deliver Fresher, Faster and Friendlier Shopping Experience (PR Newswire via Yahoo! Finance)

    21st February 2008

    AT&T Inc. , the nation’s No. 1 wireless and broadband provider, is making shopping a whole lot easier at http://www.att.com. AT&T is unveiling a series of upgrades that will provide its millions of customers with convenient and seamless access to its complete portfolio of wireless, broadband, video and voice services — whether at home or on the road.

    Unipier Enables Operators to Leverage the Success of Social Networks Such as Facebook (ThomasNet)

    21st February 2008

    Unipier and Accenture team in Barcelona to exhibit full Web 2.0 integration into mobile service offerings Netanya, Israel – February 7, 2008: Unipier, pioneer of Intelligent Policy Management and service delivery solutions, announced today that it will be demonstrating during the Mobile World Congress 2008 in Barcelona how operators may use the successful platform of social networks such as …

    Someone You Should Know: Matthew Stenerson (WAOW Wausau)

    20th February 2008

    WISCONSIN RAPIDS — This week’s “Someone You Should Know” features our first child of the series. Matthew Stenerson is a 6th grader at Woodside Elementary in Wisconsin Rapids. He’s your everyday kid except for one thing. Matthew can already tell you exactly what he wants to be when he grows up.

    Oz admits $85m p0rn filtering FAIL (The Register)

    20th February 2008

    ‘Let’s do it again’ The Australian government has admitted that the AUS$85m it spent trying to protect kiddies from internet porn was AUS$85m too many.…

    Oz admits $85m p0rn filtering FAIL (The Register – Technology News via Yahoo! UK & Ireland News)

    20th February 2008

    The Australian government has admitted that the AUS$85m it spent trying to protect kiddies from internet porn was AUS$85m too many.

    Shrek Internet Safety Browser for Kids Earns 2008 iParenting Best Product Award (PRWeb)

    20th February 2008

    Shrek Browser for Kids, developed by Children’s Educational Network (www.childrenseducationalnetwork.com), receives 2008 iParenting Best Product Award for being the best in fun, educational, parental control safety products available to keep kids safe from online predators, pornography and other inappropriate content. (PRWeb Feb 20, 2008) Read the full story at …

    Shrek Internet Safety Browser for Kids Earns 2008 iParenting Best Product Award (PRWeb via Yahoo! News)

    20th February 2008

    Shrek Browser for Kids, developed by Children’s Educational Network (www.childrenseducationalnetwork.com), receives 2008 iParenting Best Product Award for being the best in fun, educational, parental control safety products available to keep kids safe from online predators, pornography and other inappropriate content.

    Get an Internet Filter for Peace of Mind (Benton Evening News)

    19th February 2008

    (ARA) – The Internet is changing the way kids learn about the world around them; but unfortunately, not always for the better.

    NetOp Tech Launches New Version of NetOp School with Increased Control of Student Internet Use (Centre Daily Times)

    19th February 2008

    NetOp Tech Inc., a fully owned subsidiary of Danish IT company, Danware A/S, launched today in the United States NetOp School 5.5 its latest software package for teaching in networked classrooms. NetOp School 5.5.provides teachers with greater flexibility and makes it easier to oversee student use of the Internet in the classroom.

    NetOp Tech Launches New Version of NetOp School with Increased Control of Student Internet Use (Business Wire via Yahoo! Finance)

    19th February 2008

    CHICAGO—-NetOp Tech Inc., a fully owned subsidiary of Danish IT company, Danware A/S, launched today in the United States NetOp School 5.5 its latest software package for teaching in networked classrooms.

    Secure Computing and Cymtec Systems Partner to Reinforce Internet Security (Marketwire via Yahoo! Finance)

    19th February 2008

    Secure Computing Corporation (NASDAQ: SCUR), a leading enterprise gateway security provider, and Cymtec Systems, a provider of network security and performance management solutions, today announced the integration of Secure Computing’s award winning SmartFilter® Web filtering solution with the Cymtec Sentry® Data Threat Protection engine. The two security vendors have joined forces to improve …

     
    Home  |   About Us  |  Articles/Links  |  Other News  |  Contact Us

    Copyright 2006 WelFilterReview. All rights reserved.
    Note: The information in this page has been compiled and retrieved from publicly available sources. Any errors or missing information will be rectified as soon as advised. We are not responsible for the content of this Publisher's and User Review's Description. We encourage you to determine whether this product or your intended use is legal. We do not encourage or condone the use of any software in violation of applicable laws. Pricing information is as accurate as of the time this report was written and is based on observed market selling prices and/or list prices. Actual selling prices may differ.