1st Security Center Pro

Software information
Windows 7/XP/2000/Server/95/98
Security Software Center
File size:
0 Kb
Date added:
June 3, 2004
Product page:
Description from the Publisher

1st Security Center is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, Printers, and System. You can disable your boot keys, DOS programs, Registry editing and network access. You have got an ability to hide your desktop icons, individual drives, Start menu items and the taskbar features, it enables you to stop others from tampering with your desktop. If you set up the special list of allowed applications nobody will run unwanted programs. The powerful feature "User Working Time" allows you to limit working time for your children , office colleagues , students and so on. You can define several time intervals and time durations to manage users working time very easy. 1st Security Center supports Internet Explorer security that enables you to customize many aspects of the Internet Explorer Web browser. It lets you disable individual menu items, prevent others from editing your Favorites, disable individual tabs in the Internet Options dialog, restrict access to the IE browser options. Also the program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents anybody to run the program and change settings and uninstall the program. The "Import/Export" function helps you set up the same settings on several computers very easy. Security restrictions can be applied universally or just to specific users because 1st Security Center has got the multiuser intuitional interface.


Windows common restrictions

You can set up common restrictions for the local machine. They will used for all local users.

  • Restricting Access to the Event Logs - The Windows NT event log contains records documenting application, security and system events taking place on the machine. This tweak allows you to restrict access to administrators and system accounts only.
  • Stopping the KnownDLLs Vulnerability - In Windows NT, core operating system DLLs are kept in virtual memory and shared between the programs running on the system. This has exposed a vulnerability thatcould allow a user to gain administrative privileges on the computer the user is interactively logged onto.
  • Securing Network Access to CD-ROM Drives - This setting determines whether data in the CD-ROM drive is accessible to other users. This value entry satisfies, in part, the C2 security requirement that you must be able to secure removable media.
  • Securing Network Access to Floppy Drives - This setting determines whether data in the floppy disk drive is accessible to other users. This value entry satisfies, in part, the C2 security requirement that you must be able to secure removable media.
  • Require Alphanumeric Windows Password - Windows by default will accept anything as a password, including nothing. This setting controls whether Windows will require a alphanumeric password, i.e. a password made from a combination of alpha (A, B, C...) and numeric (1, 2 ,3 ...) characters.
  • Control the Automatic Restarting of the Shell - By default if the Windows NT user interface or one of its components fails, the interface is restarted automatically, the can be changed so that you must restart the interface by logging off and logging on again manually.
  • Clear the Page File at System Shutdown - Windows normally does not not clear or recreate the page file. On a heavy used system this can be both a security threat and performance drop. Enabling this setting will cause Windows to clear the page file whenever the system is shutdown.
  • Disabled Password Caching - Normally Windows caches a copy of the users password on the local system to allow for additional automation, this leads to a possible security threat on some systems. Disabling caching means the users passwords are not cached locally. This setting also removes the second Windows password screen and also remove the possibility of networks passwords to get out of sync.
  • Disable Windows Installer - This restriction allows you to prevent users (not admins) from adding and removing software applications with Windows Installer.
  • Enable Remote Assistance - The Remote Assistance feature is a convenient way for an administrator to remotely connect to a computer and with permission view the screen, move the mouse, use the keyboard and chat online.
  • Disable File and Printer Sharing - When "File and Printer sharing..." is installed it allows users to make services available to other users on a network, this functionality can be disabled by changing this setting.
  • Hide Share Passwords with Asterisks - This setting controls whether the password typed when accessing a file share is shown in clear text or as asterisks.
  • Disable Caching of Domain Password - Enabling this setting, disables the caching of the NT domain password, and therefore it will need to be re-entered to access additional domain resources.
  • Automatic Hidden Shares - This key controls whether the administration shares are created ie. c$ and d$. Set this option to disable admin shares for a server and for a workstation.
  • Disabling Save Password option in Dial-Up Networking - When you dial a phonebook entry in Dial-Up Networking (DUN), you can use the "Save Password" option so that your DUN password is cached and you will not need to enter it on successive dial attempts. This key disables that option.
  • Do not Display Last User Name - Enabling this key will blank the username box on the logon screen. Preventing people that are logging on from knowing the last user on the system.
  • Hiding Servers from the Browser List - If you have a secure server or workstation you wish to hide from the general browser list, use this option.
  • Restricting Information Available to Anonymous Logon Users - Windows NT has a feature where anonymous logon users can list domain user names and enumerate share names. Customers who want enhanced security have requested the ability to optionally restrict this functionality.
  • Show Options on Logon Dialog Box - This setting controls whether the options to enter a domain or to log on using a dial-up connection are shown on the Windows logon box.
  • Enable Shutdown from Authentication Dialog Box - When this setting is enabled a [Shutdown] button is displayed in authentication dialog box when the system first starts. This allows you to shutdown a system without logging in. The button is shown by default on a workstation and removed on a server installation.
  • Allow Fast User Switching - Fast user switching allows you to quickly switch to another user account without having to close any programs. This setting controls whether fast user switching is available.
  • Force the Use of Automatic Logon - Normally when a Windows machine is configured to automatically logon to a specified account users can bypass this and enter alternate account information. This tweak forces the machine to auto logon and to ignore any bypass attempts.
  • Disable Dial-In Access - It is possible for users to setup a modem on a Windows machine, and by using Dial-up Networking allow callers to connect to the internal network. Especially in a corporate environment this can cause a major security risk.
  • Disable "Automatically Use Dial-Up Networking to Logon" - There is an option that is available on the logon dialog box and allows you to dial into your logon server for authentication of your user account, this can be enabled by default.
  • Maximum Number of Remote Access Authentication Attempts - This setting controls the number of authentication retries before the remote access connection is terminated.
  • Maximum Time Limit for Authentication - A time limit can be enforced on the length of time given to logon via Remote Access.
  • Automatically Disconnect Remote Access Callers - Specifies the amount of idle time in minutes to wait before disconnecting the RAS client.
  • Define the length of time before callback is initiated - When callback is required or requested this setting defines how long to wait before initiating the callback connection.

User restrictions

You can define individual restrictions for each local user.

  • Remove the Run Command from the Start Menu - disallows the user to start applications or processes from the Start menu by removing the option completely.
  • Remove the Find/Search Command From the Start Menu - when enabled, this setting removes the "Find/Search"command from the Start Menu.
  • Remove the Favorites Folder from the Start Menu - removes the Favorites folder from the Start menu.
  • Remove the Recent Documents Folder from the Start Menu - removes the Recent Documents folder from the Start Menu.
  • Remove Common Program Groups from Start menu - disables the display of common groups when the user selects Programs from the Start menu. It also hides Open All Users and Explore All Users items in Start Menu context menu.
  • Hide Start Menu subfolders - set this when you use a custom Programs folder. Otherwise, two Programs entries will appear on the user's Start menu.
  • Remove "Folders Options" from Settings on Start Menu - removes the Folder Options option from Settings on the Start Menu, therefore stopping users from changing folder options.
  • Remove "Windows Update" from Settings on Start Menu - removes the Windows Update option from Settings on the Start Menu, therefore stopping users from unwanted updating your Windows.
  • Remove Folders from Settings on Start Menu - removes folders such as Control Panel, Printers and Faxes, and Network Connections from the Settings menu. These folders will disappear from My Computer as well.
  • Remove Taskbar and Start Menu from Settings on the Start Menu - removes the Taskbar and Start Menu option from Settings on the Start Menu, and stops users from changing the taskbar properties.
  • No Start Menu Context Menu - removes context menu from Start Menu. While this restriction is turned on, a user can not open Start Menu context menu using right mouse button for an item of the menu.
  • Disable LogOff command - this option allows you to stop users from being able to logging off the computer, by disabling the LogOff command.; displays explanation in a dialog box.
  • Disable Shut Down command - This option allows you to stop users from being able to shutdown the computer, by disabling the shut down command.; displays explanation in a dialog box.
  • Hide the Control Panel - this setting allows you to hide the Control Panel options from the Start Menu and deny access to it.
  • Hide Network and Dial-up Connections on Start Menu - this option allows you to hide the Network and Dial-up Connections option on the Start Menu and in Control Panel.
  • Skip the Open With web service prompt - Normally when you attempt to open an unknown file type a popup message is shown asking whether you would like to use the online web service to find the appropriate program to open the file. This setting allows you to disable this prompt, causing the Open With dialog to display immediately.
  • Disable the Windows Hotkeys - This restriction allows you to disable the use of the Windows hotkey combinations that provide shortcuts to the Start Menu and task swapping.
  • Hide All Items on the Desktop - this options hides all the items and programs at the Windows desktop.
  • Set Classic Shell - this option sets the classic view of Windows shell like the Windows 95 Desktop.
  • Disable Active Desktop - this option disables the use of the Active Desktop feature.
  • Don't Allow to Change Wallpaper - this option allows you to stop users from being able to change wallpaper.
  • Hide Desktop Context Menu - removes context menus at Desktop and Windows Explorer. While this restriction is turned on, a user can not open context menus for any items of Desktop and Windows Explorer using right mouse button or any other way.
  • Hide TaskBar Context Menu - removes context menu at the Task Bar and the System Tray Bar. While this restriction is turned on, a user can not open Task Bar and System Tray Bar context menu using right mouse button or any other way.
  • Remove File menu from Explorer - this option removes the File option in Explorer's toolbar.
  • Hide Task Bar - removes the Task Bar and the System Tray Bar at Desktop.
  • Hide System Tray Bar - removes the System Tray Bar at the Task Bar.
  • Hide System Clock - removes the System Clock at the Task Bar.
  • Hide the Network Neighborhood Icon from the Desktop - The Network Neighborhood/My Network Places icon is shown on the Windows desktop whenever Windows networking is installed, by enabling this setting the icon will be hidden.
  • Remove Entire Network from Network Neighborhood - Entire Network is an option under Network Neighborhood that allows users to see all the Workgroup and Domains on the network. Entire Network can be disabled, so users are confined to their own Workgroup or Domain.
  • Hide Workgroup Content from Network Neighborhood - this option hides all Workgroup content from being displayed in Network Neighborhood.
  • Remove the Map and Disconnect Network Drive Options - Prevents users from making additional network connections by removing the Map Network Drive and Disconnect Network Drive buttons from the toolbar in Explorer and also removing the menu items from the Context menu of My Computer and the Tools menu of Explorer.
  • Hide Computers Near Me in Network Places - this setting allows you to show or hide the computers listed Near Me in My Network Places.
  • Disable registry editing tools - this setting disables user's ability to run Regedit.exe or Regedt32.exe to modify the registry. Be careful with this setting and make sure you don't lock yourself out of the registry.
  • Disable the Autorun feature on all drives - determines whether the Autorun feature is enabled on each drive connected to the system. When Autorun is enabled, media is started automatically when it is inserted in the drive.
  • Disable Task Manager - enables or disables the user's ability to start Task Manager to view processes, applications running, and make changes to the priority or state of the individual processes.
  • Disable the Lock Workstation Button - this setting stops unauthorized users from locking machines from the Windows NT Security dialog box.
  • Disable the Change Password Button - this setting disables the "Change Password" button on the Windows NT Security dialog box.

IE Browser restrictions

It protects the IE web browser.

  • Disable Internet Access - By using this option you are able to restrict access to the Internet when using Internet Explorer and other Microsoft compatible products such as Office.
  • Disable "Add-Favorite dialog" - disables the Favorites menu, adding to favorites, or organizing favorites.
  • Disable Files Downloading - disallow users to download files from Internet by using the option . This option is applicable to IE Browser only.
  • Disable Right-Click Context Menu - this option enables you to hide the HTML context menu.
  • Disable Form Autocomplete - disables AutoComplete for forms.
  • Disable Password Autocomplete - prevents "Prompt me to save password" from being displayed.
  • Disable Toolbar Customization - disables the function to customize toolbar in Internet Explorer.
  • Disable the "Open" item of the "File-menu" - disables Open command on File menu, CTRL+O, and CTRL+L.
  • Disable the "New" item of the "File-menu" - also disables CTRL+N
  • Disable the "Save As" item of the "File-menu" - disables Save and Save As on the File menu.
  • Disable the "Close" item of the "File-menu" - also disables ALT+F4.
  • Disable the "View Source" item of the "View-menu" - prevents viewing the context of web pages.
  • Disable the "Internet Options" item of "Tools-menu" - disables Internet Options on the Tools menu (disables changing browser settings).
  • Disable the "Windows update" item of "Tools-menu" - disables an ability to update Windows from Internet.
  • Restrict ActiveX program installations in Internet Explorer - This tweak allows you to restrict the ability to install programs via the ActiveX control using Internet Explorer.

Log user activity

Use the "Enable logging of user activity" option to control when an user logged on (logged off) the computer.

Restrict user working time

This powerful feature allows you control the user working time. You can set up an interval and duration of an user's working time. If you have set up the duration for the user, this user can work only for this amount of time inside the time interval. If the user's time limit has been set up and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Also if you un-check a particular day then the user won't be able to work on this day of the week at all.

Folder guard

It can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides two levels of protection to suit any user : "Hidden" and "Read Only". It works with Network folders and fully supports protection of removable media (such as floppies, CD Roms, DVD, ZIP and some SCSI and RAID drives). To make it work you should set up the option "Enable Folders protection". Next press the "Add" button , enter the path to some folder you want to protect , enter File Mask , choose the protection mode.

Users reviews & testimonials

This software is not reviewed yet.

Product tags
crypto, hide ip privacy, computer equipment security, windows process security, protector, quick heal total security 2011, remove security tool, security master, applets, camguard security system, computer security software, resources adder, security surveillance, computer information security, internet security, privacy control, child computer security, access control, acebyte utilities, social security translation in marathi, quick heal 2011 total security, computer security training, security shield 2011, privacy, security shield, travian resources adder, magizian securecom utility, security shield antivirus, types of computer security, program sms center, community center, water utility, best personal computer security, norton internet security, panda internet security, privacy act, control panel , sms center, computer network security software, networking resources, home computer security, utilities, restrict, pbkiller protector, security, easy file protector, remove security, center, comodo internet security, computer security classes, privacy master, security system, tie fighter dos, online privacy pro, escan internet security, panel, computer security system, kingsoft security suit, dos, privacy eraser, quick heal internet security 12, cleanup utility, adaptec directcd utility, personal access power lock, panda internet security for netbooks 2012, emsisoft internet security, quick total security, quick heal internet security, bitdefender internet security 2011, utility, restrictions
Other downloads from this publisher

Chrome Privacy Shield protects your chrome browser private data from malware and unwanted persons. It makes any browser data (cookies, temporary files, databases, etc) unreadable for any application except the Chrome browser.

The Stop Software Installation Tool allows you to prevent users of your computer from installing unwanted software with password protection. You can specify rules according files masks to block software installers execution.

The Network Recycle Bin Tool allows you to recover deleted files. Once you have this tool in your system, it will automatically keep a track of all the network deleted files and you can easily recover them.

The Network Shared Recycle Bin allows you to backup and recover deleted files on the server side. Once you have this tool in your system, it will automatically keep a track of all the network deleted files and you can easily recover them.

Dark Files can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control".