Download

Section categories

Access Control Utilities [1366]
Anti-Virus Utilities [584]
Automation Utilities [694]
Backup and Copy Utilities [243]
Clipboard Management Tools [188]
Command Shells [60]
Compression and Zip File Utilities [292]
Disk Analysis Utilities [273]
Disk Maintenance and Repair Utilities [53]
Explorer Add-ons [101]
Explorer Replacements [97]
File Cataloging Utilities [1531]
File Cleanup Utilities [412]
File Encryption Utilities [501]
File Maintenance and Repair Utilities [534]
File Search Utilities [207]
File Splitting Utilities [183]
File Synchronizing Utilities [154]
Misc Encryption Utilities [155]
Misc Text Editing Tools [123]
Misc Utilities [2767]
Mouse and Keyboard Utilities [217]
Music Utilities [15]
Password Management Utilities [728]
Patches and Updates [42]
PGP Encryption Utilities [68]
Required Components [4]
Required Files [8]
System Analysis Utilities [77]
System Maintenance and Repair Utilities [947]
Text Editors A-G [82]
Text Editors H-P [25]
Text Editors Q-Z [24]
Text Form Editors [15]
Text Search and Replace Tools [74]
Text Viewers [35]

Our poll

Which Is The Best Browser?
Total of answers: 3

Statistics


Total online: 1
Guests: 1
Users: 0

Login form

File Catalog

Main » Files » Utilities » Access Control Utilities

Securerdp 2.03
01.02.2011, 21:12
One of the main issues today with Terminal Services is the limited security options
available to effectively control who is allowed to logon to your servers and who is
not. With a valid username and password, basically anyone in the world can logon to
your server farm.More than that, hackers can use brute force attacks trying to obtain a valid usernameand password, without being noticed. During this process, network bandwidth and server
resources are greatly wasted and may even prevent a legitimate user to logon.

SecureRDP takes the administrators out of this problem! It restricts non-authorized
users before they can even logon. With its internal filters, SecureRDP will reject
the connection before the user can see the logon screen. These filters include IP
addresses, MAC addresses, Computer Names, Client Versions and so on, to name a few.
These filters can be combined to create very complex rules.

Category: Access Control Utilities | Added by: File-Post
Views: 71 | Downloads: 0 | Rating: 0.0/0
Total comments: 0
Only registered users can add comments.
[ Registration | Login ]

Search

Site friends

add site