Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

Internet Filter if2k

If2k-Only V2.3.0

 

 Security matters ! Lockout adware, spyware, unauthorized downloads, viruses, p2p activity, pornography, legal liabilities -lockout everything except what you determine you want ! The future of your business will depend upon the security of your digital and physical environment..

This fact is becoming clearer each day. If-only software is dedicated to "total control" of internet activities on large and small systems.

  • For Windows 2000 and Windows XP


If2k-Library V2.3.0

 

 "The Library Filter" simple windows configurations designed to reduce training hours for administrators librarians and staff. This purposeful design reduces staff time and diminishes the costs of ownership. The library Filter is also ideal for home and business protection. It includes our full list of over 450,000 known pornographic urls.

  • Win2000, Win XP


If2k V2.3.0 For Macintosh

Overview
  • The Internet Filter If2k system for Macintosh OS X is an easy to use and effective way to control access to web content on any web browser available for Mac OS X.
  • It can block known bad websites, websites with links to bad websites, and can block every website except those in a ‘good’ list if you want.
  • It includes a database of almost half a million known pornography urls and sophisticated phrase filtering to block most other pornography websites.
  • It can censor web page content and off-site images.
  • It allows you to customize the bad site lists, good site lists, and bad phrases list.
  • It allows you to fully customize the message that appears when a website or image is blocked.
  • It can read its settings and database from a remote website automatically on a timed schedule, allowing easy administration of multiple computers.

Rating
0 vote
Favoured:
0

Listing Details

Vendor
Turner and Sons Productions Inc.
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2009-09-21
Owner
michelemjordan
Created
2008-08-03
  • 260.jpg
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message