If you are looking for software to use, go to Huajun Software Park! software release

Hello, if there is a need for software inclusion, please package the software and attach the software name, software introduction, software-related screenshots, software icon, soft copy, and business license (if you do not have a business license, please provide the front and back of the corresponding developer ID card) and a photo of yourself holding your ID card) and send it to your email address http://softwaredownload4.com/sbdm/user/login

Close >>

Send to email:news@onlinedown.net

Close >>

Location: front pagePC softwaresecurity softwareSystem monitoring Yitong computer lock (multi-user control version)
Yitong computer lock (multi-user control version)

Yitong computer lock (multi-user control version) 1.8.9.58

QR code
  • Software licensing: shareware
  • Software size: 5.34MB
  • Software rating:
  • Software type: Domestic software
  • Update time: 2016-10-20
  • Application platform: WinAll
  • Software language: Simplified Chinese
  • Version: 1.8.9.58

Download the service agreement at the bottom of the page

Software introduction Related topics FAQ Download address

Recommended for you:- Yitong computer lock

Basic introduction
Yitong computer lock (multi-user control version) segment first LOGO
The software allows users to control and manage Internet time and computer usage time as they wish. The software can create multiple users, set different time control management policies for different restricted users, and control usage time by time period and accumulated usage time. It can record each user's login and exit time/power on/off time/usage time, etc., and record all disk file related operations such as creation/copy/move/delete of files (folders). Administrative users (parents/teachers/network administrators, etc.) and restricted users (students/employees, etc.) do not affect each other. It has a very flexible time control and management function, and various time control methods can be combined at will, achieving truly arbitrary time control and management.

The main functions are as follows:

● Powerful software user management functions:

You can create as many different types of users as you like. Software users are divided into three categories: management, ordinary and restricted. Management users have the highest software management authority and can formulate different time control management strategies for different restricted users without affecting each other.

● Flexible time segmentation control function:

The time segment control function provides a 7 X 24-hour time control table, which can be accurate to half-hour time segments. Administrative users can freely set the daily computer usage time and Internet access time period for designated restricted users. Here, four computer states are provided for users to choose: normal computer use state, Internet prohibited state, computer locked state, and computer shutdown state.

●Comprehensive cumulative time control function:

The cumulative time control function provides three cumulative time control schemes: daily, weekly, and monthly. You can set the total time for using the computer or the total time for surfing the Internet according to your needs. When the set accumulated time is used up, the computer will be in the selected state. There are three computer states for users to choose from: Internet access prohibited state, computer locked state, and computer shutdown state.

● Intimate timing time control function:

You can use this function to forcibly lock the computer for a period of time after using it continuously for a period of time to achieve the purpose of forcing a period of rest to protect the user's eyes and physical health.

● Convenient usage period control function:

You can use this function to control that users can only log in within a specified time. Users will be prohibited from logging in beyond the specified time. There are two control methods, please choose the setting according to your specific requirements.

● Personalized Internet access ban policy settings:

The Internet access ban policy setting combined with the Internet access time management function can allow only specified programs to use the network or only prohibit specified programs from using the network during the specified time. The control is very flexible.

● Detailed log record query function:

Two types of logs, system log and disk log, are provided for users to view and analyze. The system log will record system events such as computer startup, logout, restart, standby, shutdown, total boot time each time, software login/logout, etc. Disk logs allow you to easily understand the file operations of your computer system in detail. The disk log records all related operations such as creation/copy/move/deletion of files (folders), and also records the insertion or removal operations of the disk.

FAQ

Yitong computer lock (multi-user control version)

Yitong computer lock (multi-user control version) 1.8.9.58

closure