Home Print Presentation

Bookmark us

Contact Guestbook
 

 

 

 
Security
 
 
Tricks
Windows
Windows XP
Internet Explorer
Outlook Express
Handicapped
Optimization
  Optimization 1
  Optimization 2
Problems
  Computer
  Peripherales
Cleaning
Short Cuts
Wallpaper

Random Wallpaper


   
 

 

 

   
 
Search
 

To find quickly information :



Safeguards
Network
 
Music
 
Games
A small game ?

    


English version Version française

 

Parano, paranoia, paranoiac....
These terms are can be a little hard but for some, it is surely justified. That it is within the framework family or professional, considerable people look at, change parameters, farfouillent without being authorized there and it is completely normal to counter this kind of behavior and to know what occurs in your absence.

-Which files were lately read ?
-Was my file has you it modified ?
-At which time my PC has it opened and closed ?
-To know in detail the operations which were carried out on your PC ?
-How to prohibit the access to certain personal files ?
-Which sites have were visited ?
-How to lock the access to the PC ?
-How to prohibit the plays ?
-Camouflage the peripherals.
-How to restrict the use of Internet ?
-How to prohibit the access to your PC ?
-How to keep the configuration of the PC ?
-How to control a remote PC ?
-How to interdir the access of the PC in day before ?

Which files were lately read ?
To know if files have were opened, go in start then select the order Documents, the list of the open files will be posted.
You have also the possibility of going to see the files read in C: Recent Windows/or C: Windows/temp. But think before starting from empty the history of the PC well not to confuse with the files which you opened you even.

hight of Page

Was my file has you it modified ?
It is very easy to know if a file A were modified. Select the icon of the file then made a right click top and select the Propertys order. A new window is posted then and dates it from the last modification of the file appears in the field: Modified it.
You can also see whether other files have modified summers, to see even created. Go in the function Search (To start/Shearch) and find the files created or modified by using the Options function of research. Either you can choose between files created, modified files or files reached for the last time. Choose the desired dates and click on advanced Options and check off Search in the under-files, thus you will know all.

hight of Page

At which time my PC has T it opened and closed ?
If you think that somebody uses your PC at the time of your absences, use Win-log. This program indicates to you in the form of report/ratio the date and the hour of all the openings and closings of the PC. It is enough that the software is with the starting of the computer for all to note.

hight of Page


To know in detail the operations which were carried out on your PC ?
- To know what occurred on the PC when you miss, install the program Espion 2002. It records with regular intervals of the captures of screens, thus you will be able to know when a site prohibits was seen or if your children or employees play plays or make other things instead of working.
- Spector takes the same step but is a little more powerful. It can make captures until one a second and preserves them in levels of gray 4 bits. His cousin eBlaster allows in addition to sending the captures of screen by e-mails towards a given address.
- You can use the software Boss Everyware Manager which, enables him to know in detail the operations carried out on your computer. Thus, you will be able to know in detail all the operations carried out on your PC at the time of your absences.
- There is finally the super detective: Omniquad Detective.

hight of Page

How to prohibit the access to certain personal files ?
There are several means to prohibit the access to certain files. You can the crypter or use the steganography (see the file encoding).
You can also hide them:
The fact of crypter the files which must remain confidential is undoubtedly effective, but that always gives the chip to the ear. Hide Folder makes it possible of a simple short cut keyboard to mask or contrary to revealing the files and repertories of your choice. Once the software installed and your definite password (keep preciously if not you lose all), it will be enough to slip of the documents on the principal window. Put only the personal files which must be hidden but not files or files of Windows, bus there, that risks bugger and to generate serious complications.

hight of Page

Which sites have were visited ?
To see which sites one were seen, either you in Internet Will explore and look at the History, or you go in C: Windows/Temporary Internet Files and you will be able to see, amongst other things, the viewed images. If the history were emptied, look in the fire wall if there are still the trace of the sites or the cookies or other java scripts etc... which were blocked. If all were cleaned, it is enough to go to open the Logs related to by-fire to check blockings. The sites will be named by their IP addresses and the hour of the visits will be noted with the second meadows.
For a research more effective and less constraining, use Omniquad Detective which is surprisingly powerful for him to find the traces is saying unobtrusive hard disk.

hight of Page

How to prohibit the plays ?
Either you look at everywhere on the hard disk if such or such application is a play, or you use a software adapted for that. Let us take Antigame Plus. It is a hunter of plays, it seeks on the computer or on the network the occurrences of the plays and blocks them or removes them.

hight of Page

Camouflage the peripherals.
It is to better camouflage them if you are not sure of the personnel which surrounds you. It is enough to use the TweakUI software and to strip the readers concerned in the mitre Working station, thus, nobody will find them.

hight of Page

How to restrict the use of Internet ?
Test the software of parental control, it is stupid but certain software is particularly good. It is the case of Kids Control. It prohibits the access to the equivocal sites, records the history of the visited sites and records the keys typed on the keyboard.
For those which want some a little more, there is VigiWin. It is a software of protection of PC. It controls the menu to start, the Bar of task, the Control panel, the access to the programs, protects the files, the repertories ......

hight of Page

How to prohibit the access to your PC ?
- To prohibit the access of your PC use METZ Lock which makes it possible to entirely block the PC by a password. Without this password, it is impossible to carry out the least operation on your PC. Thus, during the starting of your PC or by activating a precise icon before your departure, a black screen appears with a dialog box requiring of you to seize the password.
- Prohibited the Wincog software that an other person can use the PC. It is simple, if the person does not give the good password in the five attempts, it extinguishes the computer.

hight of Page

How to keep the configuration of the PC ?
To prevent that the configuration of the PC is not changed, use MenUp. MenUp has a module of safety which restricts the access to the only programs indicated by the administrator. It is enough to slip/deposit the short cuts of the software or files etc... in the MenUp window. With the restarting, the interface changes and only the icons of the selected programs are accessible and the start menu disappears.

hight of Page

How to control a remote PC ?
If you often move or that you have need for a reason or another to take a remote PC, you have only to use Netmeeting 3. Of course, so that a computer can be controlled remotely, it is necessary that it is connected to Internet and that it is equipped with the software.
To make so that the PC is controlled, open Netmeeting, outward journey in tools and choose Partage of remote office, there you choose Activate the division of the remote office. close the program, made a right click and choose Partage of remote office and click on Activate the division of the remote office.
On the second PC, open Netmeeting and click on carry out the call, seize address IP of the distant computer notch on Require the security of the call. And here is, the PC is under control. In the same register: software VNC (Virtual Network Computing) is the software which is indisputably most powerful: PC Anywhere.

hight of Page


How to interdir the access of the PC in day before ?
Make a right click on the Desk and choose Propertys. In the monitor mitre of day before notch the protect box by password. Thus nobody will be able to work on the PC without this motb of master key.

hight of Page

How to lock the access to the PC ?
You must create a special diskette containing an access key. Without it it is impossible to start the PC. Create the diskette in Démarrer then on Exécuter. Type syskey, in the window which appears, click on up to date then select the save as option the key of starting on diskette. Then insert a virgin diskette in your reader then click on button OK.
To remove this protection and to return to the former situation, renew the preceding operation but, this time, select the save option locally the key of starting in the key window of starting. Insert the key diskette when the PC requires it of you then click on OK.

hight of Page