Software Focus on Security

By Amberg, Elizabeth | T H E Journal (Technological Horizons In Education), June 2000 | Go to article overview

Software Focus on Security


Amberg, Elizabeth, T H E Journal (Technological Horizons In Education)


This month's Focus On looks at products aimed at protecting networks and computers from unwanted intrusions, whether from within a school or from unauthorized third parties. As more and more information is made digital and accessible, school administrators may want to invest in ways to keep confidential information safe, and to keep students' online activities focused.

When several people regularly use the same computer, privacy and security can be compromised. Window Washer 3.0, a program from Webroot, helps to erase traces of computer and Internet use, protecting privacy from one user to the next. The program can instantly clean Windows temp files, recent document lists, find history, run history, Internet cache and history, cookies, the Web browser drop-down address bar, CHK files, the recycle bin, and more. Window Washer can be configured to run automatically in the background and wipe each user's traces at startup and shutdown, or it can be employed at the discretion of a teacher or staff member. Users can choose which files, folders, or registries to clean.

The latest version of Window Washer includes support for the most up-to-date versions of Web browsers, third-party plug-ins, MS Office, Windows, and Windows NT4. Removing unneeded system files and temporary files from these programs not only helps protect users' privacy, but can also help increase overall PC performance. An enhanced "bleach" function securely deletes document and Internet tracks by overwriting the data up to 10 times with random characters.

Another product for computers with multiple users helps to guard the documents themselves. DiskLock from Power On Software provides file locking and encryption with a few simple clicks. The program offers various types of encryption, including DES encryption, and supports multiple users, SCSI devices and IDE drives. Unlimited users can work on the same machine, with total security for each user's data, and varying levels of access permitted for each individual. An administrator package that allows for centralized configuration of DiskLock on networked workstations is available at multi-pack pricing. The program is compatible with both Macs and PCs.

Since DiskLock loads before a computer's system software, it is virtually impossible to bypass, and will not let unauthorized users access the system. An intuitive interface makes encryption and decryption as easy as dragging and dropping a folder. For instantaneous data protection, a hot key screen-locking option lets users immediately blank the screen from within any application, to prevent others viewing sensitive data onscreen. To help monitor the computer's security, DiskLock can log any efforts to access sensitive data. The program will not interfere with ongoing tasks such as fax processing, and file-protection settings prevent accidental deletion of data.

Designed to protect public access computers from malicious or inexperienced users without restricting user activities, Clean Slate from Fortes Grand returns drives to their original state upon reboot. The software takes only minutes to install and, for most installations, requires little or no attention afterwards. Its purpose is to restore the computer to its original configuration, no matter what users have done. This includes erasing files, installing software, downloading viruses and altering icons.

Administrators, by password, can specify individual drives or directories that are not to be protected, allowing persistent changes in some areas of the disk. They can also view all changes made and specify which changes should be undone on reboot, and which should be committed as permanent changes. Ideal for environments where a more aggressive security agent would lock computers down too tightly, Clean Slate is invisible to the user and works on Windows 95/98/NT/2000.

School network administrators require security at the network, session, and application levels of their systems. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Software Focus on Security
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.