Your free TOP 25 download source!

Featured Software

 IconVisual Comparer
Visual file compare and merge of the text files with syntax hightlight

 IconAlcyone Audio Converter
Audio converter for MP3, WMA, OGG and WAV with eye-catching skinned interface

 IconOptimum XP
Easily accelerate, secure, customize and tweak XP with powerful hidden settings.

 IconFolder Cache
Access to the recently used & favorite folders from the Save and Open dialogs.

Command line utility for backing up and synchronizing your files and folders

DeviceLock 6.4

Access control solution for to floppy, CD-ROM, USB and other mobile devices.
Publisher: DeviceLock, Inc.
Category: System Utilities
Version: 6.4
License: demo
Cost: 42$
Size: 54.13 MB
Updated: 25 Jan 2016
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the week. DeviceLock enhances access control for Windows System Administrators and helps control removable disk usage. It can protect network and local computers against viruses, trojans and other malicious programs often injected from removable disks. Network administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside.

Version: 6.4(20 Apr 2009)
1. DeviceLock now supports "Content-Aware Rules" which provide a flexible method to enforce more granular security at the file level; 2. Added support for offline profiles; 3. Now you can make graphical reports based on the logs (audit and shadow) stored on DeviceLock Enterprise Server.
Version: 6.3(10 Apr 2008)
1. Added granular access control, auditing and shadowing for Palm OS devices; 2. Added granular access control, auditing and shadowing for local and network printers; 3. Now using the Temporary White List it is possible to allow a device for a current user's session.
Version: 6.2.1(31 Dec 2007)
1. Added support for Microsoft Windows Vista; 2. Added integration with TrueCrypt; 3. Added real-time monitoring of DeviceLock Services across the network; 4. Now in DeviceLock management consoles it is possible to create a custom MSI package for DeviceLock Service
Version: 6.1.1(06 Apr 2007)
1. DeviceLock Service now works on 64-bit platforms (Windows XP/2003); 2. Changes in the remote installation routine. Management consoles can now install DeviceLock Service to 64-bit platforms; 3. Added the new MSI package with 64-bit DeviceLock Service.
Version: 6.1(05 Feb 2007)
1. Audit records can now be automatically collected from remote computers and centrally stored on DeviceLock Enterprise Server. 2. DeviceLock can now detect hardware keyloggers. 3. DeviceLock now supports Resultant Set of Policy. 4. DeviceLock now supports traffic shaping, allowing you to define ban
Version: 6.0(23 Aug 2006)
1. DeviceLock now supports data shadowing - the ability to mirror all data copied to external storage devices (Removable and Floppy) and transferred via COM and LPT ports. A full copy of the files and data is saved. Shadowing is an extended function of DeviceLock Audit and like auditing can be defined on a per-user basis. 2. Added support for the Media White List feature. Media White List allows you to uniquely identify a specific DVD/CD-ROM disk by the data signature and authorize access to it, even when DeviceLock has otherwise blocked the DVD/CD-ROM drive. Any change to the content of the media will change the data signature, thus invalidating authorization. In this way, a white-listed disk cannot be used to introduce unwanted data to the network. A DeviceLock Media White List can be configured to grant access to a collection of approved DVD/CD-ROM disks by certain users and groups, so that only authorized users are able to use the approved information. 3. Added DeviceLock Enterprise Server for centralized collecting and storing of shadow files. DeviceLock Enterprise Server uses MS SQL Server to store received data.
Version: 5.73

download ( - 54.13 MB)