by Leithauser Research
Leithauser Research provides a variety of computer security programs to provide computer access control. Most of these are designed to help you control who has access to your computer, what programs they can run, and what Web sites they can visit. All of these programs are distributed as shareware, which means that you can try them for 30 days for free before you pay for them. Below is a list of programs.
Program Selector Pro
Program Selector Pro is a computer security program that provides computer access control and usage management. When installed, it replaces the standard Windows 95/98/2000/NT/XP/ME user interface (task bar, Start button, and icons) with a convenient user configurable list box of program names. The person who installs Program Selector Pro decides which programs to include in the list box, giving this person complete control over which programs can be run on that computer. In addition, each program on the list can be password protected, and a password can also be assigned to access Windows itself. A supervisor level password is required to add programs to (or remove programs from) the program list box. An administrative level password is required to restore the original Windows interface. This provides the person who installs Program Selector Pro with the ability to completely control the use of a computer. This program is most useful in a business setting, where the supervisor needs the ability to control who can do what on each company computer. It can also be useful in a family setting, however, to give parents control of the computer to block children from using certain programs. Virus protection and a program uninstall feature are also provided by Program Selector Pro. Click here for more information on Program Selector Pro.
Program Sentry is a less intrusive (although somewhat less
thorough) alternative to Program Selector Pro. This Windows 95/98/Me/2000/XP
(does not work on NT computers) computer security program that provides access
control and usage management. When installed, it allows you to either create
a list of blocked programs or a list of allowed programs. In the blocked
programs mode, any program on the list is blocked. In the allowed program
mode, any program NOT on the list is blocked. Which mode you choose to use
depends on whether you have a few programs you want to block (in which case
you would use the blocked program mode), or you have a few programs you want
to allow people to use (in which case you would use the allowed program
In both modes, you can assign optional passwords to the programs on the list. In blocked program mode, if no password is assigned to a program, it cannot be individually unblocked. If a password is assigned to a blocked program, it can be unblocked using the password. In the allowed program mode, if no password is assigned to the program, it is never blocked. If a password is assigned to the program, it is blocked until someone enters the password for that program. passwords are useful if several people use the computer, and you want each to be allowed to use different programs. You can give each person the passwords to the programs they are allowed to use.
An administrator password is required to add or remove programs from the lists or change their passwords. This provides the person who installs Program Sentry with the ability to completely control the use of a computer. All blocking can be temporarily turned off using supervisor level password. This password cannot be used to add programs to (or remove programs from) the program lists.
This program is most useful in a business setting, where the supervisor needs the ability to control who can do what on each company computer. It can also be useful in a family setting, however, to give parents control of the computer to block children from using certain programs. Click here for more information on Program Sentry.
Software Time Lock
Allows you to block access to the Web, individual programs, or the entire computer during selected time periods for each day of the week. Also allows you to control for how long the Internet, individual programs, or the computer itself can be used in total for each day of the week. For more information, click here.
Internet Password Lock
Internet Password Lock is a Windows 2000/XP/Vista (does not work on 95/98/Me/NT) Internet security program that will lock all Internet access (Web, email, Instant Messaging, etc.), or allow you to selectively block access to specific Internet functions (Web browsing, email, Instant Messaging). Useful for parents to protect their children by controlling their Internet access and in business to control Internet use. For more information, click here .
Clock Guard is a Windows program that prevents tampering
with the computer clock. It can be used for various purposes. A few examples
1) Preventing files from being given falsified time/date stamps by manually resetting the system clock and then saving the file.
2) Prevent employees who are using a computer-based time clock from altering the time to allow themselves to "punch in" at a falsified time.
3) Prevent users who have time limited programs (programs that can only be used at certain times) from accessing these programs at improper times.
4) Prevent people who are paying for computer use on a time basis from resetting the clock to reduce the amount of time they pay for.
5) Prevent people who are restricted to a certain amount of computer time per day (usually children) from resetting the computer clock to give themselves more time.
Unlike other clock control programs, Clock Guard does not require an Internet connection. It does not automatically set the computer clock to the correct time by dialing up an atomic clock somewhere. It works by preventing sudden changes in the computer clock. You can deactivate clock protection with the password you select when you install it. This allows you to set the clock if it becomes wrong. Click here for more information on Clock Guard.
Web Site Zapper
Web Site Zapper is a Windows 95/98/2000/ME/XP/Vista software program (does not work on NT) that closes Web browsers that are displaying undesirable Web sites. It can be used for several purposes:
1) Blocking your browser from being redirected to dangerous or undesirable
sites, such as those infected with viruses.
2) Blocking popups
3) Access control, to allow parents, schools, and employers to prevent children, students, or employees from going to undesirable sites, such as pornography or gambling sites.
4) Controlling when people can access the Internet. Web Site Zapper has a password protected switch to turn off blocking, so you simply have Web Site Zapper block all Web sites until you are present and can turn off the blocking. Parents can use this to control how much time children spend on the Internet.
With Web Site Zapper, you compile a list of good and bad Web site titles and/or URLs (Web addresses). You can add Web site titles and URLs to these lists manually, or have Web Site Zapper build these lists automatically in learning mode (explained in the instruction manual).
Once you have built a list of Web sites, Web Site Zapper can either close down any site on the bad site list (Block mode), or close down any site NOT on the good site list (Allow mode). Web Site Zapper provides the same function as Web Padlock, but operates differently. It has some advantages and some disadvantages. We suggest that you try both, and see which one best suits your needs. For more information on Web Site Zapper and to download a trial copy, click here.
Computer Payment Enforcer
This program will block access to the computer at intervals selected by you until a code is input. Intervals can be days, weeks, months, or years. This program is useful for companies that sell computers on an installment plan or rent computers out. It will shut down the computer unless the customer inputs a code, which you provide when you have received your installment or rental payment (hence the name, Computer Payment Enforcer). It can also be used to force employees to return company computers for periodic maintenance, or simply to prevent employees from stealing company computers. For more information on Computer Use Reporter, click here.
Hide-A-File is a Windows 95/98/NT/2000/ME/XP computer security software program that allows you to hide files and folders so they cannot be accessed. You then need a password to retrieve the hidden files or folders.For more information, click here.
Computer Use Reporter
Find out what your employees or children are doing on the computer.
Computer Use Reporter covertly monitors what programs are used on the computer,
what files or Web sites these programs access, when they are accessed, and
which user is on the computer at the time.
This program can easily be run on a network, allowing you to monitor Internet activity on multiple computers from one computer. For more information on Computer Use Reporter, click here.
If you have any questions, please send email to Leithauser@aol.com. You can also call (386) 738-0418 between the hours of 11 AM and 5 PM Eastern time.
If you prefer to write, the address is
3624 Royal Fern Circle
DeLand, FL 32724-1223
Return to Leithauser Research home page from computer access control programs decription