Home Store Downloads Support Forums
Mac Protection essential!
Tools and Service for Professionals
Mac OS X Application Firewall for advanced security Firewall and monitoring control of All your Applications monitors and records all network activity on your Mac! Monitors and records all network activity on your Mac! LogonKey - USB login solution for Mac OS X Login access security wrapped into USB dongle.
LogonKey LogonKey

NetMine NetMine

Meter Meter

Logon Sentry Logon Sentry

KeyBag PRO KeyBag PRO

KeyBag KeyBag

Free Downloads

Purchase

Support Forums

Contact


LogonKey

Logon Key is high level of Mac access security wrapped into USB dongle. This powerful software has been worked out to restrict the access to your Mac system from the outside and deliver reliable remote control over your personal database. With Logon Key you get your unique security device that easily blocks any bruteforce logon attempts.

LogonKey



NetMine

ProteMac NetMine is a network firewall for Mac OS X which able to control internet and network activity of all application on Your Mac!
ProteMac NetMine offers powerful firewall protection for your Mac, and its customized protection allows advanced users to configure specific rules to protect against foes who wish to infiltrate your computer.



NetMine



Meter

ProteMac Meter is a powerful network traffic logger, monitor and traffic counter, which measures, displays and controls all traffic to and from every application connected to network. ProteMac Meter can display bandwidth data in a real-time graph, a numerical display, or both. It records all network traffic and includes extensive logging for specified period.

Meter



Logon Sentry

ProteMac Logon Sentry monitors all login attempts and detects whether an attempt was successful or failed. After a login attempt was made the program captures an image from the iSight.



Logon Sentry



KeyBag PRO

KeyBag Pro is a stealth keylogger which capture all keys on your Mac. KeyBag Pro capture system passwords and everything that happens on computer: keystrokes, software run, emails, iChat, Skype, instant message conversations. Record all system passwords entered, this surveillance tool finds its appliance both in private and business use.



KeyBag PRO





Learning Center

Articles

Secure your data with an effective password!

Data protection is very urgent problem especially if several users have the access to computer. 

Firewall … do you need one?

A firewall is a security system that plays the role of a protective boundary between your PC and the network.

Why do we need to monitor network traffic?

Are you facing problems due to increasing Internet costs? Improper use of network can be a major reason that affects your business critical performance.

Data crimes in business

Computers, united into networks, represent the access to a wide amount of different types of information. That is why information is a resource, which must be secured.


LogonKey in your life

Situations when LogonKey appears to be an ideal helpmate when dealing with data.


Introducing ProteMac Meter

This article is going to introduce to you a full-featured network traffic logger called ProteMac Meter.

Read more »


Questions

How can I get the full version of ProteMac Logon Sentry?
How to install ProteMac Meter?
How can I set the Time Period for NetMine’s activity?
What is the diffrence between regular and PRO version?
How can I view the Connections List?
What is the Connections List?
When KeyBag PRO starts keystroke recording?
How can I get the full version of ProteMac Meter?
How long the database is stored on my computer?
How can I uninstall ProteMac Logon Sentry?
How can I register the trial version of ProteMac KeyBag?
Can I view TCP, UDP or Full Traffic Info for an Application?
How to launch the program?
What are the system requirements for ProteMac Logon Sentry?
How to install ProteMac NetMine?

Read more »

Tutorials

Tutorial for ProteMac KeyBag

To give you full presentation of KeyBag there is comprehensive and detailed review over this keylogger. On our website you will find overview texts and features link that can give you exhaustive information about the program and outline its main functions. In Gallery folder we have posted screenshots to visualize your presentation of KeyBag. Though the application have minimalistic interface it is reliable keystroke logger software . FAQ and Tutorials contain the information about usage of the program and will help you to work with it.



Tutorial for ProteMac LogonSentry

To give you comprehensive presentation of Logon Sentry there is detailed information about this monitoring software. On our website you can find overview texts and features link that describe the program and outline its main functions. In gallery folder you can watch through screenshots to get visual presentation of the application. Having the ability to monitor every login attempt Logon Sentry the program becomes powerful protective tool for your computer. In FAQ and Tutorials folders you can find exhaustive information about the applications usage.

Logon Key Video Tour

If you have already downloaded LogonKey then this video tutorial is for you! It will teach you how to use the program, how to specify and manage USB Keys and show you the opportunities of the program. Futhermore, you will understand that it is very easy to use program. Provide the security for your Mac today!



How it Works

LogonKey is a perfect tool for security access to your Mac! In this video tutorial you will find the information about how LogonKey works. Moreover, you will understand why it is so easy and convenient to use. Just spend a minute of your time not to worry about the security of your Mac in future!



Shift of the user folder to another flash-device

To provide high-level data security against unauthorized access, Mac OS has foreseen a function of folder shift with personal data from the /User/ partition to another disc partition or another disc. The combination of two technologies: shift of user folder and LogonKey application helps to ensure the security of private data and distinguish the users – not only by access rules but also physically.



Read more »


Glossary terms

IPad Multimedia Access Desktop Function Preview Device Internet page Operating system Remote control Tracing Internet Chat Default Restrict Backup Software Graph Monitoring software Offline System Requirements Network traffic Review Timerange Tool

Read glossary »

Latest Pressreleases

LogonKey forms immune bubble around your computer!

LogonKey forms immune bubble around your computer!

ProteMac KeyBag Pro Captures Every Password and Keyboard Activity

ProteMac KeyBag Pro Captures Every Password and Keyboard Activity

Control every application network activity - ProteMac NetMine 2.0

Control every application network activity - ProteMac NetMine 2.0

twork activity monitoring - ProteMac Meter 3.7 for Mac OS X

twork activity monitoring - ProteMac Meter 3.7 for Mac OS X

ProteMac KeyBag 2.2 - Keystroke Recorder and Monitor for Mac OS X

ProteMac KeyBag 2.2 - Keystroke Recorder and Monitor for Mac OS X

Read more »

 



ProteMac
Free Downloads
Purchase
Support
Support
Contacts
Press
LogonKey
NetMine
Meter
Logon Sentry
KeyBag PRO
KeyBag
Learning Center
Tutorials
FAQ
Glossary Articles
Copyright © 2001-2014 by ProteMac. All rights reserved.
Privacy Policy Terms and Conditions
www.logonkey.com | www.actymac.com | www.macvide.com | www.imcapture.com | www.atory.com
Links