Categories
Security

Cetus StormWindow Security Related Security for Windows

Allows the authorized user to add several types and degrees of protection to the desktop and system.
The Cetus StormWindow application was designed to be a security tool that will allow the authorized user to add several types and degrees of protection to the desktop and system.Intelligent use of StormWindow security measures will allow for the controlled use of any shared Windows computer.

It should be obvious that the use of just any one security measure is not likely to provide much actual security in any particular setting, and that a carefully chosen combination of complementary security measures will be required for most circumstances.

It should also be clear that it would be almost impossible for Cetus Software to provide one single set of recommendations that could provide optimum security under all circumstances. Each situation is different, and each therefore requires its own individual security plan.

Nonetheless, Cetus Software does recommend that the following measures be considered when planning any effective security strategy:
Cetus Software recommends that serious thought be given to removing access to Windows Explorer. A guest user with even moderate Windows savvy will know how to get past many security measures simply by using this tool to “explore”. Cetus Software does recommend disabling ALL means of access to Explorer (which is still available to the authorized user through StormWindow, of course), though it is clear that it will not always be possible to do this in every situation.

Cetus Software STRONGLY recommends the use of the two CRITICAL SYSTEM SECURITY settings on the StormWindow System page. Activating the settings for Disable Registry Editing and Disable Registry Merging of REG Files will help to prevent a guest user from attempting to circumvent StormWindow protections.

Cetus Software also recommends the use of a well chosen password, one that could NEVER be guessed by any guest user, one that employs an uncommon combination of letters, numbers, and punctuation. Avoid the use of institutional names, first names, last names, nicknames, names of spouses, names of children, names of pets, birthdates, or any other simple password that would be likely be tried by any “adventurous” guest user. Unfortunately, any password that is very easily remembered is probably also a password that is easily guessed at.

Limitations:

ยท 25 days trial

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!