X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.
SECURITYTRACKER LAUNCHES WEB SITE SecurityTracker has launched its Web site, devoted to reporting Internet security vulnerabilities. SecurityTracker.com provides information for technology administrators and managers, with lists and categorization of vulnerability alerts. Customers can also receive weekly free alert summaries, via e-mail, reports the company, based in Silver Springs, Md. PC SECURITY 4.3 PC Security 4.3, from Tropical Software, helps administrators configure locks to manage access to a system (or individual components) using right-click menus in Windows (95 SR2+). Users can restrict access to files, folders, or drives as read-only or totally unavailable. Limits can be placed on specific windows or functions within programs. Internet connections can be password-protected; downloads restricted by file type. INTERNET WATCHER 2000 Internet Watcher 2000 1.9c, from Bernard D&G, is an Internet filtering application for Windows. It accelerates the loading of Web sites by ignoring banner advertisements, pop-up windows, Java applets, javascript, and by displaying only the first frame of animated images. ANONYMITY 4 PROXY Anonymity 4 Proxy, a Windows program from iNetPrivacy Software Inc., lets individual or networked users travel the Internet anonymously. The utility redirects requests for Web sites to anonymous public proxy servers located around the world. The true IP address of the user’s computer is subsequently hidden from Web sites, including Web-based chat and e-mail sites. ELECTRONIC SIGNATURES Communication Intelligence Corp. has debuted iSign, for the Java platform. It allows electronic signatures for e-commerce applications over the Internet and in corporate Intranets. It captures handwritten signatures online and binds them to specific transactions while verifying the user’s signature based on biometric elements. LOGIN SHIELD Allied Software has introduced Login Shield to prevent unauthorized use of computers. Administrators can use the program to manage multiple user accounts. The software also tracks all attempts to log-in, and security levels can be customized to meet the needs of firms. A “key disk” function prevents accidental lock-outs because of forgotten passwords.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Advance® Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]

 
Reprints & Licensing
Mentioned in a Law.com story?

License our industry-leading legal content to extend your thought leadership and build your brand.

 

ALM Legal Publication Newsletters

Sign Up Today and Never Miss Another Story.

As part of your digital membership, you can sign up for an unlimited number of a wide range of complimentary newsletters. Visit your My Account page to make your selections. Get the timely legal news and critical analysis you cannot afford to miss. Tailored just for you. In your inbox. Every day.

Copyright © 2021 ALM Media Properties, LLC. All Rights Reserved.