Puresight Technologies Ltd. Arabic, Dutch, English, German, Greece, Russian. 12 years old users: 1/21 (points 2,67 out of 4)
|
|
- Darrell Cobb
- 8 years ago
- Views:
Transcription
1 NAME PURESIGHT OWL Company Puresight Technologies Ltd. Version Type of product Devices supported Operating systems Client Computer Windows Vista (32/64 bit) Windows XP (32/64 bit) Windows 7 (32/64 bit) Price* 1 year, 1 Licence: 46 Language of interface Arabic, Dutch, English, German, Greece, Russian GLOBAL RANKING** 12 years old users: 1/21 (points 2,67 out of 4) 13 years old users: 1/21 (points 2,74 out of 4) *Prices might change according to the latest company offers User's voice Comprehensibility: Look and Feel: Time to install and configure: User 1: A lot of options, some are not easy to find. User 2: Very complete and detailed tool. A lot of features and options. Test users placed in: Slovenia, France Test user s degree of Internet literacy: User 1: User 2: 46 minutes 5 test users
2 FUNCTIONALITY There are numerous and clear customization options, among the most relevant for our testing activity: it is possible to customize filtering choosing among different aged based levels; it is possible to choose among different filtering mode: block allow filter monitor only; it is possible to highly customize the reporting activity, also choosing to be alerted when specific bypassing attempts happen, e.g. logging in with parent password, manipulate PureSight PC program files, guess an answer to the secret question for password recovery, change password. It is possible to prevent from the disclosures of personal data in chats and from the use of specific keywords (which usage could be blocked/filtered or monitored only). It is possible to block the social networks choosing to block this category of content or simply to monitor the user s activity. The monitoring activity is highly customizable, it can be remote, the report is detailed and the parent can also be alerted when the violations occurred. Up to now it is possible to have a report on time spent on IM, file sharing, (not tested) and Web Surfing but not on Social Networks, which was one of the parameter of our testing activity. FUNCTIONALITY SCORE: 3,4 OUT OF 4 POINTS EFFECTIVENESS The tool has an almost good effectiveness on adult content and an almost fair effectiveness on other harmful content. There is no major difference in effectiveness between teenagers and children. The tool performs better on web than web 2.0. The tool has a better effectiveness on English than on the other languages. Effectiveness score with adult content filtering for 12 years old user: 2,8 Effectiveness score with other harmful content filtering for 12 years old user: 1,8 Effectiveness score with adult content filtering for 13 years old user: 2,6 Effectiveness score with other harmful content filtering for 13 years old user: 1,6 OVERALL SCORE FOR EFFECTIVENESS FOR 12 YEARS OLD USER: 2,3 OUT OF 4 POINTS OVERALL SCORE FOR EFFECTIVENESS FOR 13 YEARS OLD USER: 2,1 OUT OF 4 POINTS
3 USABILITY Installation of the tool: The installation process is well comprehensible. The installer provides barely any options for advanced users and cannot be influenced with regard to kind or amount of information, except for the language. The process is consistent, but it does not fully meet users' expectations as, for example, the cursor disappears when moving over the buttons. The overall design is appealing. Configuration of the tool: The configuration process is slightly difficult to understand and some steps aren't easy to learn. The configuration contains some inconsistencies with regard to the navigation structure and it does not always meet users' expectations. The process offers several options to be individualised and possibilities to influence the amount of information about the process. The design is appealing and joyful. Usage of the tool: The tool provides barely any options to react, when a website has been blocked. The alert message is appealing and very child friendly, but it cannot be customised. The reporting is simple and overall comprehensible. Usability of the installation process: 2,86 Usability of the configuration process: 3,18 Usability of the usage of the product: 2,92 OVERALL SCORE FOR USABILITY: 3,04 OUT OF 4 POINTS The tool resisted to the main hacking attempts to by-pass it. SECURITY OVERALL SCORE FOR SECURITY: 4 OUT OF 4 POINTS
4 DETAILED FUNCTIONALITY FICHE AREA OF NEED FUNCTIONALITY SPECIFIC ISSUE ASSESSMENT MGMNT FILTERING CUSTOMIZATION Management of Create several profiles users profile Monitoring Remote access Topics Urls White lists Customisation of filtering topics Restrict browsing to a white list Default white list Modification OR Creation Modification Creation Urls Black lists Creation of user s own black list Default black list KEYWORDS Keywords Default white list Creation of a user s black list Creation of a user s white list TIME BLOCKING MESSAGE Time limit settings Type Set a specific timeframe or web access duration Ask for unblocking to parents Redirect to safe resources USAGE RESTRICTION Web Block access Monitor access Safe Search Availability Social Networks Personal data provision Streaming P2P application Skype application Windows Live Messenger Block access Monitor usage Block Block the access Monitor the access to the application Block the application Monitor downloads Block (chat, VoIP, Video-chat) Monitor the access Prevent from new contact Block the application Monitor the access Prevent from new contact Application - Web - Block Client and/or web
5 DETAILED SECURITY FINDINGS The Tool prevents the user from by-passing the filter by: / Using the IP address instead of the URL Using an alternative browser Changing time and date settings* Disabling or uninstalling the software without a password* Closing the filtering tool trough the Task Manager Using a proxy instead of a direct connection to the Internet Accessing the web-pages through the Google Cache Reaching a website through translation sites Renaming a blocked application Using Safe Mode Changing the port of Peer-to-Peer application *As managed directly by the tool and not by the device. DETAILED USABILITY FINDINGS / I: installation in 3 steps or less I: choice of installation for beginners or advanced users C: different degrees of strength for the filtering C: different content criteria for the filtering C: option to transfer filter configurations between target users C: option to transfer filter configurations between devices C: altogether comprehensible configuration C: altogether in conformity with user expectations C: altogether easy to learn U: alert message in a child friendly language U: option to customise the reaction in case of blocking U: altogether easily operable and comprehensible reporting
MOBICIP NAME. Mobicip. Company. Version 1.3.0.12. Client. Type of product. Computer. Devices supported. Linux Ubuntu Windows 7 (Tested on Windows)
NAME MOBICIP Company Mobicip Version 1.3.0.12 Type of product Devices supported Operating systems Client Computer Linux Ubuntu Windows 7 (Tested on Windows) Price* 1 year - 1 license: 7,75 Language of
More informationENOLOGIC NETFILTER HOME
NAME ELOGIC NETFILTER HOME Company Enologic Version 5.2.1.1 Type of product Devices supported Operating systems Client Computer Microsoft Windows 98, Me, NT, 2000, XP, Vista, 7 (32 and 64 bit) Price* 1
More informationWindows XP (32/64 bit) Windows 7 (32/64 bit) Vista (32/64 bit) Mac OS X (from 10.4 version on) 12 years old users: 15/21 (points 1,59 out of 4)
NAME Xooloo Company Xooloo Version 12.1 Type of product Devices supported Operating systems Client Computer Windows XP (32/64 bit) Windows 7 (32/64 bit) Vista (32/64 bit) Mac OS X (from 10.4 version on)
More informationTrend Micro Incorporated. Windows 7 (Unspecified. Tested on 64 bit) Windows Vista (Unspecified. Tested on 64 bit) Windows XP (32/64 bit)
NAME Trend Micro Online Guardian for Families Company Trend Micro Incorporated Version 1.5.0.5041 Type of product Devices supported Operating systems Client Computer Windows 7 (Unspecified. Tested on 64
More informationUser's voice. Safe Eyes. User 1: I was surprised how the tool was easy to install and configure. Comprehensibility:
NAME Safe Eyes Company McAfee Version 6.0.244 Type of product Devices supported Operating systems Client Computer Windows XP Windows 7 Vista Mac OS (with some limitations on functionalities) Price* 1 year,
More informationComprehensibility: Look and Feel: Time to install and configure: 130 minutes NAME PROFIL PARENTAL FILTER 2. Profil Technology. Company. Version 2.4.
NAME PROFIL PARENTAL FILTER 2 Company Profil Technology Version 2.4.0 Type of product Devices supported Operating systems Client Computer Windows 7 (32/64 bit) Windows XP (32/64 bit) Windows Vista (32/64
More informationHow To Use Windows Live Family Safety On Windows 7 (32 Bit) And Windows Live Safety (64 Bit) On A Pc Or Mac Or Ipad (32)
NAME Windows Live Family Safety Company Microsoft Version 2012 Type of product Devices supported Operating systems Price* Client Computer Windows 7 (32 or 64 bit edition) Windows Vista Service Pack 2 Windows
More informationCYBERSITTER NAME. LLC/Solid Oak Software. Company. Version 11.12.7.20. Client. Type of product. Computer. Devices supported
NAME CYBERSITTER Company LLC/Solid Oak Software Version 11.12.7.20 Type of product Devices supported Operating systems Client Computer Windows Vista (32/64 Bits) Windows 7 (32/64 Bits) Windows XP Windows
More informationUser's voice CYBERSIEVE. Make the interface nicer. It is old fashioned. Comprehensibility: Look and Feel: Time to install and configure: 45 minutes
NAME CYBERSIEVE Company SoftForYou Version 3.0 Type of product Devices supported Operating systems Client Computer Microsoft Vista (32/64 bit) Windows 7 (32/64 bit) Price* 1-3 licences 27 3-6 licences
More informationF-SECURE INTERNET SECURITY 2012
NAME F-SECURE INTERNET SECURITY 2012 Company F-Secure Corporation Version 1.62 Type of product Devices supported Operating systems Client Computer Windows 7 (all editions) Windows Vista Windows XP Home,
More informationUser's voice NET NANNY. Quite simple to install and configure. Improve messages and possible reactions when a page is blocked. Comprehensibility:
NAME NET NANNY Company Content Watch Version 6.5.13.1 Type of product Devices supported Operating systems Client Computer Microsoft Windows 7 (32/64 bit) Microsoft Windows Vista (32/64 bit) Microsoft Windows,
More informationUser's voice OPTENET WEBFILTER PC. Comprehensibility: Test user did not provide any comments. Look and Feel: Time to install and configure: 45 minutes
NAME OPTENET WEBFILTER PC Company Optenet S.A. Version 10.09.69 Type of product Devices supported Operating systems Client Computer Windows XP Sp2 Windows Vista (32 and 64 bits) Windows 7 (32 and 64 bits)
More informationSafe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
More informationSafe internet: Getting Started Guide
Safe internet: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial Configuration
More informationINTRODUCTION 4 Objectives 4 What are the parental control tools? 5 What are the main criteria for choosing a tool and type of test carried out?
The study aims to benchmark the main functionalities, effectiveness and usability of most currently used filtering software from a technical and fit-for-purpose point of view, without any commercial or
More informationSecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
More informationBenchmarking of parental control tools for the online protection of children SIP-Bench II Assessment results and methodology 4 th Cycle
Benchmarking of parental control tools for the online protection of children results and methodology 4 th Cycle SAFER INTERNET PROGRAMME Empowering and Protecting Children Online NOTICE The project is
More informationEmployee PC and Server Activity Monitoring Solution
Employee PC and Server Activity Monitoring Solution Employee PC and Server Activity Monitoring Ever dreamed of a software tool to track your network activity in real time? Ever thought of how useful it
More informationOPTENET Security Suite / OPTENET PC Web Filter
OPTENET Security Suite / OPTENET PC Web Filter Version 11.01 User Guide (rev 1.7) COPYRIGHT No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
More informationDynamics CRM 2011 Outlook Configuration Guide With Windows XP
Dynamics CRM 2011 Outlook Configuration Guide With Windows XP With migrating to a new version of CRM, one of the side-affects is that the Outlook Integration Client has also been updated and needs to be
More informationRelease Notes for Websense Web Endpoint (32- and 64-bit OS)
Release Notes for Websense Web Endpoint (32- and 64-bit OS) Updated: 8-Feb-2013 Applies To: Websense Cloud Web Security solutions Use the Release Notes to learn about: What s new in Websense Web Endpoint?
More informationThe internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate.
Quick Start Guide 2 The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate. Going online for youngsters is fun, creative and exciting but it
More informationImplementing Parental Controls. Internet Safety Presentation
Implementing Parental Controls Internet Safety Presentation Edit Parental Controls in: Windows 7 Windows Live Windows Vista Xbox Live 2 22 Windows 7 3 22 Windows 7 Time Limits: Games Control: Limit your
More informationConfiguring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
More informationCyclope Internet Filtering Proxy. - User Guide -
Cyclope Internet Filtering Proxy - User Guide - 1. Overview 3 2. Cyclope Internet Filtering Proxy User Interface 4 2.1 Login 4 2.2 Logout 4 3. Administration 5 3.1 IP Management 5 3.2 Proxy Forwarding
More informationCyclope Internet Filtering Proxy
Cyclope Internet Filtering Proxy - Installation Guide - Cyclope-Series - 2010 - Table of contents 1. Overview - 3-2. Installation - 4-2.1. System requirements - 4-2.2. Cyclope Internet Filtering Proxy
More informationScan to Cloud Installation Guide
Scan to Cloud Installation Guide Table of Contents 1 - Before you start 1 1.1- What is Scan to Cloud? 1 1.2- What is included? 1 1.3- Supported devices 1 1.4- Supported languages 1 1.5- Keyboards 1 1.6-
More informationFAQ. How does the new Big Bend Backup (powered by Keepit) work?
FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control
More informationConfiguring Your Gateman Proxy Server
Configuring Your Gateman Proxy Server A proxy server acts as an intermediary between a workstation users and the Internet to ensure security, administrative control, distribution of bandwidth and caching
More informationEntraPass WebStation. Installation Manual DN1864-1005
EntraPass WebStation Installation Manual EntraPass WebStation Installation Manual Table of Contents General Information...1 Copyright Info...1 Technical Support...1 Overview...2 Introduction... 2 Description...
More informationInstalling Remote Desktop Connection
SETTING UP YOUR REMOTE DESKTOP This section will assist you in setting you Remote Desktop Connection. This will allow you to create an icon for easy access to your virtual desktop. DISCLAIMER: All images
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationM86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
More informationThirtyseven4 Endpoint Security (EPS) Upgrading Instructions
Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions Disclaimer: As with any software upgrade or new release, it is strongly encouraged to fully test the new build within your environment prior
More informationHome Internet Filter User Guide
Home Internet Filter User Guide TABLE OF CONTENTS About Home Internet Filter... 2 How Home Internet Filter help you?... 2 Setting up the Residential Gateway and accessing to SingTel Home Internet Filter
More informationLuxriot Broadcast Server Manual 21.01.2013
Luxriot Broadcast Server Manual 21.01.2013 Table of contents Introduction... 2 Luxriot Broadcast Server system requirements...3 Installation... 4 Luxriot Broadcast Server configuration...5 Broadcast Server
More informationNorton Family Product Manual
Norton TM Family Product Manual Care for our Environment; It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual
More informationAvira Internet Security FireWall. HowTo
Avira Internet Security FireWall HowTo Table of Contents 1. Basic knowledge about the Firewall... 3 2. Explanation of the terms... 3 3. Configuration Possibilities... 5 3.1. Security Level...5 3.1.1 Block
More informationInternet Filtering Appliance. User s Guide VERSION 1.2
Internet Filtering Appliance User s Guide VERSION 1.2 User s Guide VERSION 1.2 InternetSafety.com, Inc 3979 South Main Street Suite 230 Acworth, GA 30101 Phone 678 384 5300 Fax 678 384 5299 1 Table of
More informationBurst Technology. bt-webfilter User Guide
Burst Technology presents bt-webfilter User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com
More informationMagaya Software Installation Guide
Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to
More informationReceptionist Small Business
Receptionist Small Business Administrator Guide Revision 1.0 GCI Ltd Global House 2 Crofton Close Lincoln Lincolnshire LN3 4NT www.gcicom.net Copyright GCI 2012 GCI Receptionist Small Business - Administrator
More informationInternet Safety for Kids and Adults
Net@office Net@office differs from Proxy in two significant areas: features & configurability. Net@office has advanced features like web page caching, site filtering, privacy options, traffic logging and
More informationPortal Recipient Guide
Portal Recipient Guide Lindenhouse Software Limited 2015 Contents 1 Introduction... 4 2 Account Activation... 4 3 Forgotten Password... 9 4 Document signing... 12 5 Authenticating your Device & Browser...
More informationVelaro End User Guide. 2011 Velaro, Inc.
I Table of Contents Part I Introduction 1 1 Copyrights... and Trademarks 1 2 System... Requirements 1 3 Customer... Support 2 Part II Getting Started 2 1 Installation... 3 2 The Quick... Start Wizard 3
More informationDesktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
More informationHow To Set Up A Xerox Econcierge Powered By Xerx Account
Xerox econcierge Account Setup Guide Xerox econcierge Account Setup Guide The free Xerox econcierge service provides the quickest, easiest way for your customers to order printer supplies for all their
More informationUser Guide. Hosted Web Security. Copyright CensorNet Limited, 2007-2012
User Guide Hosted Web Security Copyright CensorNet Limited, 2007-2012 This document is designed to provide information about the first time configuration and administrator use of the Hosted Web Security
More informationONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0
ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a
More informationNetwork Connect Installation and Usage Guide
Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing
More informationMcAfee Family Protection
User Guide The Easiest, Most Complete Way to Keep Your Children Safe Online Quick Start Easy CD Installation STEP 1: First, ensure that your computer meets or exceeds the minimum systems requirements listed
More informationcurbi for Schools Technical Overview October 2014
curbi for Schools Technical Overview October 2014 Background Overview School Requirements curbi Standard Mode curbi School Mode curbi4schools ipad app Device Enrolment Process Features Alerts Costs Parent
More informationConfiguration Manual
Configuration Manual Page 1 of 20 Table of Contents Chronicall Setup...3 Standard Installation...3 Non-standard Installation (Recording Library on Separate machine)...8 Configuring Call Recording through
More informationHow To Use A Pvpn On A Pc Or Mac Or Ipad (For Pc) With A Password Protected (For Mac) On A Network (For Windows) On Your Computer (For Ipad) On An Ipad Or Ipa
VPN User Guide For PC System Requirements Operating System: Windows XP, Windows Vista, or Windows 7. (Windows 8 is not officially supported, but does work for some users.) Internet Browser: Internet Explorer
More informationBROWSER AND SYSTEM REQUIREMENTS
BROWSER AND SYSTEM REQUIREMENTS Minimum and Recommended System Requirements To ensure that CSIU Student Information System performs seamlessly, please adhere to the requirements listed in the chart below:
More informationCyclope Internet Filtering Proxy. - Installation Guide -
Cyclope Internet Filtering Proxy - Installation Guide - 1. Overview 3 2. Installation 4 2.1 System requirements 4 2.2 Cyclope Internet Filtering Proxy Installation 4 2.3 Client Browser Configuration 6
More informationConfiguring a Softphone for Windows for Virtual Contact Center
Configuring Bria 3 for Virtual Contact Center Configuring a Softphone for Windows for Virtual Contact Center 8x8 issues softphone licenses to Virtual Contact Center customers allowing them to manage all
More informationContents. Business Everywhere user guide. 1. Introduction. 2. Recommended configuration. 3. Administration Tool installation and start-up
Contents 1. Introduction 2. Recommended configuration 3. Administration Tool installation and start-up 4. Configure your connection manager KitType Help window Secured networks Thresholds & Alerts 5. Save
More informationUsing the ScoMIS Remote Access Service (VPN Gateway) to access the ScoMIS SIMS.net Terminal Server Service.
Using the ScoMIS Remote Access Service (VPN Gateway) to access the ScoMIS SIMS.net Terminal Server Service. The ScoMIS Remote Access Gateway offers a convenient method to connect direct to SIMS.net Terminal
More informationIdentifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data
Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI
More informationGet Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
More information2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
More informationGE Measurement & Control. Remote Comms System. Installation and User Reference Guide
GE Measurement & Control Remote Comms System Installation and User Reference Guide Contents BENEFITS OF REMOTE COMMS SYSTEM... 1 HOW THE REMOTE COMMS SYSTEM WORKS... 3 COMPONENTS OF REMOTE COMMS SYSTEM...
More informationwww.novell.com/documentation User Guide Novell iprint 1.1 March 2015
www.novell.com/documentation User Guide Novell iprint 1.1 March 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically
More informationHow To Use Touchtone.Com'S Digital Phone Service Web Portal User Guide (For Ip Phones) On A Pc Or Ip Phone (For A Cell Phone) On Pc Or Mac) On Your Ip Phone On A Mac Or Ip Cell Phone On
Digital Phone Service Web Portal User Guide TouchTone provides subscribers an easy-to-use Web-based administrator portal to help manage your IP phone s features and call routing functions. In this document
More informationPersonal Archive User Guide
Personal Archive User Guide Personal Archive gives you an unlimited mailbox and helps you quickly and easily access your archived email directly from Microsoft Outlook or Lotus Notes. Since Personal Archive
More informationRelease Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
More informationUser's Manual. Intego Remote Management Console User's Manual Page 1
User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written
More informationInstallation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access
Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Version 1 Revised 11/29/2007 Table of Contents Java Installation:...4 Browser Configuration:...4 Citrix Client Installation:...8 Attempting
More informationGFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide
GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as
More informationVerizon Family Protection Powered by McAfee. User Guide
Verizon Family Protection Powered by McAfee User Guide ii Contents Welcome to Verizon Family Protection Powered by McAfee User Guide 3 Setting up Family Protection 5 Managing your family's protection...6
More informationUser Guide to the Snare Agent Management Console in Snare Server v7.0
User Guide to the Snare Agent Management Console in Snare Server v7.0 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationWireless Presentation System User s Manual
Wireless Presentation System User s Manual (Model Name: WPS-Dongle) Version: 3.0 Date: August 19, 2009 Table of Contents 1. Overview...3 2. Quick Start...4 3. Windows Client Utility...7 3.1 Starting Program...7
More informationHomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
More informationProperSync 1.3 User Manual. Rev 1.2
ProperSync 1.3 User Manual Rev 1.2 Contents Overview of ProperSync... 3 What is ProperSync... 3 What s new in ProperSync 1.3... 3 Getting Started... 4 Installing ProperSync... 4 Activating ProperSync...
More informationHelp Menu. Kakapo Systems Ltd 1
Help Menu 1. Introducing Unity 2. Initial Login and Setup 3. Getting Started 3.1. Resizing Unity 3.2. Maximising and Minimising 3.2.1. Using Unity From the System Tray 4. Call Control 4.1. Make a Call
More informationKramer Electronics, Ltd. Site-CTRL and Web Access Online User Guide (Documentation Revision 2)
Kramer Electronics, Ltd. Site-CTRL and Web Access Online User Guide (Documentation Revision 2) Software Version 1.9. 2902 To check that you have the latest version, go to the DOWNLOADS section of our Web
More informationEkran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
More informationWeb Authentication Application Note
What is Web Authentication? Web Authentication Application Note Web authentication is a Layer 3 security feature that causes the router to not allow IP traffic (except DHCP-related packets) from a particular
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationWhat s New with Salesforce for Outlook?
What s New with Salesforce for Outlook? Available in: Contact Manager, Group, Professional, Enterprise, Unlimited, and Developer Editions Salesforce for Outlook v2.1.2 New Supported Operating System We
More informationCloudfinder for Office 365 User Guide. November 2013
1 Contents Getting started with Cloudfinder for Office 365 1... 3 Sign up New Cloudfinder user... 3 Sign up Existing Cloudfinder user... 4 Setting the Admin Impersonation... 4 Initial backup... 7 Inside
More informationNovell Filr. Windows Client
Novell Filr Windows Client 0 Table of Contents Supported Environments 2 Supported Languages 2 Getting Started 3 Which Folders Are Synchronized 3 What Actions Are Supported 4 Configuring Folders to Synchronize
More informationConfigure Web Conference Parameters Through The Web Conference Administration User Interface.
Configure Web Conference Parameters Through The Web Conference Administration User Interface. Once the ShoreTel Service Appliance 100 has been installed and configured in ShoreTel Director, the Web Conference
More informationCampus VPN. Version 1.0 September 22, 2008
Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several
More information2. Manage the power of the target device
Please have "MagicConnect user account list" that we sent you upon delivery time be ready at your hand Here, we take OS: Windows 7 Ultimate, Display method: category as a sample for describing this Quick
More informationManual for configuring NIC VPN in Windows OS
Manual for configuring NIC VPN in Windows OS NIC is introducing a new web based VPN interface to allow s to connect to NICNET through VPN. Apart from existing Client based VPN service, this new interface
More informationVPN User Guide. For PC
VPN User Guide For PC System Requirements Operating System: Windows XP, Windows Vista, or Windows 7. (Windows 8 is not officially supported, but does work for some users.) Internet Browser: Internet Explorer
More information8x8 Virtual Office Telephony Interface for Salesforce
8x8 Virtual Office Telephony Interface for Salesforce Administrator Guide May 2014 The Champion For Business Communications Table of Contents 8x8 Virtual Office Telephony Interface for Salesforce.... 3
More informationUSER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6
KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly
More informationData Sheet: Work Examiner Professional and Standard
Data Sheet: Work Examiner Professional and Standard Editions Overview One of the main problems in any business is control over the efficiency of employees. Nowadays it is impossible to imagine an organization
More information1. Chat4Support Introduction
1. Chat4Support Introduction Chat4Support is a CodingBest product that helps businesses to improve their sales and customer service on the Internet. Website visitors just only need to click on the chat
More informationHDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual
HDDtoGO User Guide User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual Table of Contents Table of Contents...1 1. Introduction...2 2. System Requirements...3
More informationSnare Agent Management Console User Guide to the Snare Agent Management Console in Snare Server v6
User Guide to the Snare Agent Management Console in Snare Server v6 InterSect Alliance International Pty Ltd Page 1 of 14 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect
More informationIPOne Phone System User Interface Guide
IPOne Phone System User Interface Guide DoubleHorn Communications, LLC 1802 W. 6 th Street Austin, TX 78703 Main Office: 512-637-5200 Toll Free: 877-637-HORN (4676) DHC Support: Dial 611 IPOne Phone System
More informationFortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationKeep Yourself Safe from the Prying Eyes of Hackers and Snoopers!
Protect Your Privacy Online P 7/1 Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! With the information in this article you can: Find out what secret information your PC is sharing with
More informationOPTENET PC Web Filter. Version 10.09
OPTENET PC Web Filter Version 10.09 COPYRIGHT No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any
More information