Name                : RedHand
Version             : 5.10
Filename            : rh510nr.ZIP
FileDate            : 3/26/00
Status              : Feature Limit Demo
Submitted By:       : Author
Installation Type   : Install/Uninstall
Company/Author      : Hard Drive Software
E-Mail              : redhand@harddrivesoftware.com
Homepage            : http://www.harddrivesoftware.com
File Location       : http://www.harddrivesoftware.com/product/red510d.exe
ScreenShot          : http://www.harddrivesoftware.com/images/log.gif

Description         :
RedHand Pro logs all activity, keystrokes and applications on a 
standalone PC or workstation, and secures almost any area of Windows 
without the user ever needing to see it! It can monitor all activity on 
any PC while remaining totally invisible, but is easily accessible to 
the authorised user with the password or "Keydisk". Network 
Administrators can monitor and secure all of their workstations from a 
single point and be alerted immediately of prohibited activity. Easy, 
invisible network installation, realtime settings updates and 
uninstallation can be achieved with the Network Tools with no 
disruption. Compatible with any network running Windows 95/98/NT4 
workstations regardless of protocol or size and installation on a 
server is not required.
 
Powerful security features will disable areas like Control Panel, 
MS-DOS and the "Run" dialog to prevent damage to the system, and 
"Internet Access Control" can restrict access to known adult sites or 
limit the amount of time the user spends online. RedHand can work 
either visibly or invisibly, and can even replace the entire desktop 
with the RedHand Desktop if necessary.

All applications used are contiuously monitored their usage can be 
evaluated either for a particular workstation, or the entire network, 
ideal for auditing a company's software requirements.

There are lots of other tools - "Window Locks" to prevent access to any 
window (with a message that masquerades as a system error to maintain 
invisibility), Hide Folders to protect your secret files - "Password 
Manager" for safe storage of multiple passwords - "Cyberlock" for time 
locked usage of the machine (or connection) in Cybercafes, time locking 
of the entire machine - and much, much more...
Extremely simple to setup and use, with comprehensive help included. 

Uses include Personal, Business, Education, Network, Military, - and 
support for English, German and French languages is provided.


