Home Store Downloads Support Forums
Mac Protection essential!
Tools and Service for Professionals
Mac OS X Application Firewall for advanced security Firewall and monitoring control of All your Applications monitors and records all network activity on your Mac! Monitors and records all network activity on your Mac! LogonKey - USB login solution for Mac OS X Login access security wrapped into USB dongle.
LogonKey LogonKey

NetMine NetMine

Meter Meter

Logon Sentry Logon Sentry

KeyBag PRO KeyBag PRO

KeyBag KeyBag

Free Downloads

Purchase

Support Forums

Contact


LogonKey

Logon Key is high level of Mac access security wrapped into USB dongle. This powerful software has been worked out to restrict the access to your Mac system from the outside and deliver reliable remote control over your personal database. With Logon Key you get your unique security device that easily blocks any bruteforce logon attempts.

LogonKey



NetMine

ProteMac NetMine is a network firewall for Mac OS X which able to control internet and network activity of all application on Your Mac!
ProteMac NetMine offers powerful firewall protection for your Mac, and its customized protection allows advanced users to configure specific rules to protect against foes who wish to infiltrate your computer.



NetMine



Meter

ProteMac Meter is a powerful network traffic logger, monitor and traffic counter, which measures, displays and controls all traffic to and from every application connected to network. ProteMac Meter can display bandwidth data in a real-time graph, a numerical display, or both. It records all network traffic and includes extensive logging for specified period.

Meter



Logon Sentry

ProteMac Logon Sentry monitors all login attempts and detects whether an attempt was successful or failed. After a login attempt was made the program captures an image from the iSight.



Logon Sentry



KeyBag PRO

KeyBag Pro is a stealth keylogger which capture all keys on your Mac. KeyBag Pro capture system passwords and everything that happens on computer: keystrokes, software run, emails, iChat, Skype, instant message conversations. Record all system passwords entered, this surveillance tool finds its appliance both in private and business use.



KeyBag PRO





Get Support

For your convenience, several sources of information to solve most of issues are provided below. We hope this will provide an immediate answer to you inquiry, potentially eliminating the need to raise a support request.

LogonKey LogonKey - Secure Mac access with USB dongle
Logon Key is high level of Mac access security wrapped into USB dongle. This powerful software has been worked out to restrict the access to your Mac system from the outside and deliver reliable remote control over your personal database. With Logon Key you get your unique security device that easily blocks any bruteforce logon attempts.
   The topics contained in this section are intended to give you quick exposure to LogonKey using. They are designed to be completed in the order of the list at the bottom of this topic. Working through this tutorials gives you an introductory understanding of the steps required to use our applications.
How it Works

LogonKey is a perfect tool for security access to your Mac! In this video tutorial you will find the information about how LogonKey works. Moreover, you will understand why it is so easy and convenient to use. Just spend a minute of your time not to worry about the security of your Mac in future!

Logon Key Video Tour

If you have already downloaded LogonKey then this video tutorial is for you! It will teach you how to use the program, how to specify and manage USB Keys and show you the opportunities of the program. Futhermore, you will understand that it is very easy to use program. Provide the security for your Mac today!

Logon Key Tutorial LogonKey opens for you the possibility of distant control over your computer database. It is especially irreplaceable for those who want to block confidential data from unwanted access. With this easy-to-use software, there is no need to keep in mind complicated passwords and enter them every time you want to enter your Mac: the logon procedure is reduced to inserting the USB flash drive.

 
Shift of the user folder to another flash-device To provide high-level data security against unauthorized access, Mac OS has foreseen a function of folder shift with personal data from the /User/ partition to another disc partition or another disc. The combination of two technologies: shift of user folder and LogonKey application helps to ensure the security of private data and distinguish the users – not only by access rules but also physically.

LogonKey Tutorial LogonKey is worked out to enable easy and fast way to logon.  The user doesn’t require special knowledge to install and to use it. To give you the full presentation of we suggest you comprehensive information about this software. The following tutorial will guide you through the major steps of LogonKey utilisation.  
Data security via FileVault
The combination of FileVault and LogonKey presents an ideal basis for  security access that provides 100% protection of private data on Mac OS.
Data security with the encryption program TrueCrypt LogonKey and a flash drive with the ability to encrypt data is an ideal data security both on computer and portable device.
   Study out our Frequently Asked Questions about LogonKey. Before contacting our team to ask a question about a product, please check the Frequently Asked Questions to see if there is a known answer.
Mac OS X FAQ LogonKey Friendly Asked Questions


NetMine NetMine - Network security with firewall for Mac

ProteMac NetMine is a network firewall for Mac OS X which able to control internet and network activity of all application on Your Mac!
ProteMac NetMine offers powerful firewall protection for your Mac, and its customized protection allows advanced users to configure specific rules to protect against foes who wish to infiltrate your computer.

   The topics contained in this section are intended to give you quick exposure to NetMine using. They are designed to be completed in the order of the list at the bottom of this topic. Working through this tutorials gives you an introductory understanding of the steps required to use our applications.
Tutorial for ProteMac NetMine

To give you an opportunity to get acquainted with NetMine, there is exhausted information about this firewall for Mac. On our website we have posted introductory texts and features links to give you full overview about the program and describe its main functions. In Gallery folder you will find screenshots that will visualize your visual presentation of NetMine. FAQ and Tutorials folders of our site contain comprehensive information about application’s usage and will guide you from installation to utilization of the software.

   Study out our Frequently Asked Questions about NetMine. Before contacting our team to ask a question about a product, please check the Frequently Asked Questions to see if there is a known answer.
Mac OS X FAQ NetMine Friendly Asked Questions


Meter Meter - Network traffic monitoring
ProteMac Meter is a powerful network traffic logger, monitor and traffic counter, which measures, displays and controls all traffic to and from every application connected to network. ProteMac Meter can display bandwidth data in a real-time graph, a numerical display, or both. It records all network traffic and includes extensive logging for specified period.
   The topics contained in this section are intended to give you quick exposure to Meter using. They are designed to be completed in the order of the list at the bottom of this topic. Working through this tutorials gives you an introductory understanding of the steps required to use our applications.
Tutorial for ProteMac Meter

We are glad to give you full representation of Meter. On our website you can find comprehensive information about this traffic monitoring tool. In Overview and features folders we have described the program and its main functions. In Gallery folder you may find screenshots that will help you to get visual representation of the application. This powerful monitoring program allows users to control all network traffic of your Mac. In FAQ and Tutorials folders we have posted exhaustive information about the application’s usage to guide you from installation to utilization.

   Study out our Frequently Asked Questions about Meter. Before contacting our team to ask a question about a product, please check the Frequently Asked Questions to see if there is a known answer.
Mac OS X FAQ Meter Friendly Asked Questions


Logon Sentry Logon Sentry - Stealth logon attempts monitor

ProteMac Logon Sentry monitors all login attempts and detects whether an attempt was successful or failed. After a login attempt was made the program captures an image from the iSight.

   The topics contained in this section are intended to give you quick exposure to Logon Sentry using. They are designed to be completed in the order of the list at the bottom of this topic. Working through this tutorials gives you an introductory understanding of the steps required to use our applications.
Tutorial for ProteMac LogonSentry To give you comprehensive presentation of Logon Sentry there is detailed information about this monitoring software. On our website you can find overview texts and features link that describe the program and outline its main functions. In gallery folder you can watch through screenshots to get visual presentation of the application. Having the ability to monitor every login attempt Logon Sentry the program becomes powerful protective tool for your computer. In FAQ and Tutorials folders you can find exhaustive information about the applications usage.
   Study out our Frequently Asked Questions about Logon Sentry. Before contacting our team to ask a question about a product, please check the Frequently Asked Questions to see if there is a known answer.
Mac OS X FAQ Logon Sentry Friendly Asked Questions


KeyBag PRO KeyBag PRO - Undetectable keystroke and password recorder for your Mac computer

KeyBag Pro is a stealth keylogger which capture all keys on your Mac. KeyBag Pro capture system passwords and everything that happens on computer: keystrokes, software run, emails, iChat, Skype, instant message conversations. Record all system passwords entered, this surveillance tool finds its appliance both in private and business use.

   The topics contained in this section are intended to give you quick exposure to KeyBag PRO using. They are designed to be completed in the order of the list at the bottom of this topic. Working through this tutorials gives you an introductory understanding of the steps required to use our applications.
Keylogger Tutorial Our website will give you full presentation of KeyBag Pro. There is comprehensive information about the program and its usage. Overview and Features folders contain introductory texts and describes main functions of the application. KeyBag Pro is a perfect solution for those who wants to control the activity performed on the computer. In Gallery folder we have posted screenshots to give you a visual presentation of this program. FAQ and Tutorials folders will guide you from the software installation to its utilization and simplify KeyBag Pro usage.
Comparison of KeyBag and KeyBag PRO ProteMac company has released an independent product KeyBag PRO, which combines previous features of its forefather KeyBag and turns into the owner of another one – the possibility to record system passwords. 
   Study out our Frequently Asked Questions about KeyBag PRO. Before contacting our team to ask a question about a product, please check the Frequently Asked Questions to see if there is a known answer.
Mac OS X FAQ KeyBag PRO Friendly Asked Questions


KeyBag KeyBag - Keystroke logger for Mac OS X
ProteMac KeyBag is advanced keystroke logger software for Mac OS X. ProteMac KeyBag record all typed texts such as chat conversation, emails, documents, user names, and much more.
   The topics contained in this section are intended to give you quick exposure to KeyBag using. They are designed to be completed in the order of the list at the bottom of this topic. Working through this tutorials gives you an introductory understanding of the steps required to use our applications.
Tutorial for ProteMac KeyBag To give you full presentation of KeyBag there is comprehensive and detailed review over this keylogger. On our website you will find overview texts and features link that can give you exhaustive information about the program and outline its main functions. In Gallery folder we have posted screenshots to visualize your presentation of KeyBag. Though the application have minimalistic interface it is reliable keystroke logger software . FAQ and Tutorials contain the information about usage of the program and will help you to work with it.

   Study out our Frequently Asked Questions about KeyBag. Before contacting our team to ask a question about a product, please check the Frequently Asked Questions to see if there is a known answer.
Mac OS X FAQ KeyBag Friendly Asked Questions


Discussions Forums

Post a question to the Forum, or browse through recent postings in the various forums. Many users communicate and share their experiences here. Here you can find the answer to your question in the previous topics or create a new one.

Discussions Forums

Leave a message

If the answer you looking for is not there, please contact our Customer Support stuff with any questions and requests. Please note that we can provide help in English language only.

Leave a Questions to our Support Team
or contact us via Live support on a website.



ProteMac
Free Downloads
Purchase
Support
Support
Contacts
Press
LogonKey
NetMine
Meter
Logon Sentry
KeyBag PRO
KeyBag
Learning Center
Tutorials
FAQ
Glossary Articles
Copyright © 2001-2014 by ProteMac. All rights reserved.
Privacy Policy Terms and Conditions
www.logonkey.com | www.actymac.com | www.macvide.com | www.imcapture.com | www.atory.com
Links