Prof. Dr. Ing. Adel BOUHOULA


A tool which helps Windows administrators to monitor, to log security related activities on the client system and stop any kind of malicious activity detected. This Windows based tool monitors the activities of logon, of files I/O, devices, memory, etc. This tool has a graphical user interface, which allows system administrator to set up security policies and to view log files.

Features :

  • This software is a Windows based tool to handle “normal” and malicious system actions.

  • Administrator can setup a system to allow a user to use his/ her IKEY to logon to Microsoft® Windows® operating systems.

  • The GUI will allow administrator to setup security policies to control actions that he/she is interested in.

  • Administrator can select one, multiple or all actions to handle.

  • Administrator can save the logs in files, and view them later.