A. CybSecure
1.
What is CybSecure?
2.
How does CybSecure work?
3.
Can I control all the computers in my network remotely?
B. Installation Related
1.
How do I install CybSecure?
2.
Can CybSecure be installed remotely?
3.
Can I install CybSecure Server in an XP or Vista home?
4.
Can I install multiple consoles and connect them to the
same server and work simultaneously?
C. CybSecure Server Related
1.
Do I need to run the CybSecure Server all the time?
D. CybSecure Console Related
1.Why
some computers in the Console interface show up as locked
(with a lock image)?
E. CybSecure Client Related
1.
What is cssecui.exe file?
2.
How can get the current status of the client?
3.
How can I change the password of the client?
4.Why
my Client doesn’t show up in the Console?
5.
Will the user know that CybSecure is running on the computer?
F . Internet Management
1.
How does the Blacklist and Whitelist work?
2.
I’m accessing the internet through a different port other
than the default port 80. How can I apply internet blocking
in
such
a case?
3.
Can I block torrents?
4.
Can I block downloading of movies or other unwanted files?
5.
What is meant by ‘Bypass Application’ in the Group Settings
window?
6.
Can I allow Internet access during certain times of the
day/month?
G. Application Management (EXE Blocker &
Window Blocker)
1.
What name should I add to the EXE blocker list to block
an application?
2.
How can I block an EXE that doesn’t have an Original Filename?
3. How does the Window Blocker work?
4.
Which is better, EXE blocker or Window Blocker?
H. Power Management
1.
Can I remotely boot a computer using CybSecure?
I. Miscellaneous
1.
Is it necessary to run the server all the time for the blocking
to take effect?
2.
Is it necessary to run the client all the time for the blocking
to take effect?
3.
What is the difference between Computer Mode and User Mode?
J. Uninstallation
1.
How can I uninstall the client?
2.
I forgot the client password. What should I do?
3.
How can I uninstall the Server and Console?
K. System Requirements
1.
CybSecure Server Requirements
2.
CybSecure Console Requirements
3.
CybSecure Client
L. Purchase
1.
How do I order/purchase Cybsecure?
M. Pricing
1.
How is the product priced?
A.
CybSecure
1. What is
CybSecure?
CybSecure is an Internet and
Application blocking tool which can be used in small, medium
and large networks. It can be run in the stand-alone mode
too.
2.
How does CybSecure work?
CybSecure consists of 3 components,
Server, Consoles and Clients. The Client should be installed
into all the computers that need to be controlled. The Clients
point to the Server. The Console is the management interface.
The Consoles also point to the Server. You can have more
than one Consoles installed in your network. The Consoles
can be password protected from un-authorized access.
3.
Can I control all the computers in my network remotely?
Yes, you can control all the
computers in your network using CybSecure.
B.
Installation Related
1.
How do I install CybSecure?
Download the Installer from
the website www.workmoment.com. Extract the contents to
a folder. The CybSec.exe consists of the Server and Console
installer while the CSClient.msi is the Client installer.
2. Can CybSecure Clients be installed
remotely?
Yes, the CybSecure Clients
can be installed remotely. After installing the Server and
Console, you can do remote installation from the Console
interface.
3. Can I install CybSecure Server
in an XP or Vista home?
Yes, you can install the CybSecure
Server in Windows 2000 all series, Windows XP all series
and Windows Vista all series. Please note that the present
version of CybSecure doesn’t support 64-bit versions of
these operating systems.
4.
Can I install multiple consoles and connect them to the
same Server and work simultaneously?
Yes, you can install multiple
consoles and connect them to the same Server and work simultaneously.
C. CybSecure Server
Related
1.
Do I need to run the CybSecure Server all the time?
See
Miscellaneous Section
D. CybSecure Console
Related
1.
Why some computers in the Console interface show up as locked
(with a lock image)?
This is because these computers are not licensed. Suppose
you have licensed for 100 computers and you have installed
the CybSecure Client in 150 computers, then all the additional
50 computers will show up as locked in the Console interface.
This means that you cannot control these computers.
E. CybSecure Client
Related
1.
What is cssecui.exe file?
Cssecui.exe file will help you configure the client. You
can change the Server Name, Port Number etc. using the cssecui.exe
application. Please note down that the changes you have
made using cssecui.exe will take effect only after the restarting
of Client service.
2.
How can get the current status of the client?
In the command prompt, type cssec.exe –p Password –i, which
will brings you the current status of the client. Note:
Please provide the correct password of the client instead
of ‘Password’ if you have ever changed the password of the
client.
3.
How can I change the password of the client?
You can change the password of the client from the Client
Settings dialog in the Console interface.
4.
Why my Client doesn’t show up in the Console?
Please check if you have provided the correct Server Name/IP
address at the time of client installation. You can check
the Server name at the Client computer using the cssecui.exe
utility or using “cssec.exe –p Password –i” from the command
prompt.
5.
Will the user know that CybSecure is running on the computer?
No, CybSecure can be set to operate in complete stealth
mode.
F. Internet Management
1.
How does the Blacklist and Whitelist work?
The blacklist work when the Internet
is turned ON, ie; when the Internet is turned ON, all websites,
except those given in the Blacklist are accessible.
Similarly, when the Internet
is turned OFF, all websites except those given in the Whitelist
are NOT accessible.
2.
I’m accessing the internet through a different port other
than the default port 80. How can I apply internet blocking
in such a case?
Say for example, if you are
accessing the internet through port 8080, do the below.
Right click on a group>Click
on ‘Port Blocking & Filtering’>Select ‘Port Filter’
Tab>Select ‘HTTP Filter’ from combo box>Select ‘HTTP’
from combo box>Add 8080 in the port box>Press ‘Add’
button to add the item to the list>Press ‘Apply to Clients’
to apply the settings to the clients. This will enable you
to apply HTTP Filtering in port 8080 as well.
3.
Can I block torrents?
Yes you can block torrents
by providing .torrent extension to the file filter. You
can alternately use the EXE blocker or Window Blocker to
block torrent client applications in your computer. Similarly,
you can block any file types by adding them to the file
filter.
4.
Can I block downloading of movies or other unwanted files?
Yes, you can block downloading
of movies or any other unwanted files using the File Filter
feature of CybSecure.
Add the extensions like .mpg,
.mpeg, .avi, .flv, .mov, .wmv etc to the file filter to
block downloading of movies.
Similarly, adding .jpg, .jpeg,
.gif, .png etc to the file filter to block images. Only
the images will be blocked, the site won’t get blocked.
This is a very helpful utility which will save much of your
bandwidth usage even while you can allow users to view websites.
5.
What is meant by ‘Bypass Application’ in the Group Settings
window?
This bypasses the internet/network
communication of an application from being blocked by the
CybSecure. For example, you may want to allow some programs
like Windows Updater to access the Internet while disable
applications like Internet Explorer from being accessing
the internet. In that case, you can provide the Windows
Updater’s Original Filename to the bypassed application
list.
6.
Can I allow Internet access during certain times of the
day/month?
Yes, you can use the Internet Access Scheduler to allow
internet access during certain times of a day/month. Also
please keep in mind that the, during the internet allowed
time policies are still enforced using the blacklist.
G. Application Management
(EXE Blocker & Window Blocker)
1. What
name should I add to the EXE blocker list to block an application?
You have to provide the Original Filename of the EXE to
block an application. You can get the Original Filename
of an EXE by, right click on the EXE>Properties>Version
Tab>Original Filename. Alternatively you can browse for
the exe from the EXE blocker window in the Console and point
to the EXE that you want to block. This will automatically
fetch the Original Filename.
2.
How can I block an EXE that doesn’t have an Original Filename?
Some EXE’s don’t have an original file name attached to
it. In that case, CybSecure takes it’s internal filename.
If internal filename is also not present, it will take the
Product Name and if the Product Name is also not available,
it will take the exe name. Please note that you have to
provide the Original Filename/Internal Filename/Product
Name as such (with any trailing or leading spaces) to block
an application using the EXE blocker.
3.
How does the Window Blocker work?
A window blocker looks for an occurrence of blocked window
names in the opened window titles and blocks the application
if it finds a match.
4.
Which is better, EXE blocker or Window Blocker?
It depends on your need. Sometimes, EXE blocker is good
as it blocks an application at the time of initialization.
But, Window Blocker blocks an application when the Window
is created. But, Window Blocker may be user friendly than
EXE blocker.
H· Power Management
1.
Can I remotely boot a computer using CybSecure?
Yes, you can remotely boot a computer using CybSecure. For
this feature to work, your motherboard and network card
should support Wake-ON-LAN feature. Most modern motherboards/network
cards support this feature. Additionally, please check the
BIOS if turning Power ON through network is in the ‘Enabled’
state.
I. Miscellaneous
1.
Is it necessary to run the server all the time for the blocking
to take effect?
No. It is not necessary to run the Server computer all the
time. Some features won’t work if the server is not available
while the main features like Internet ON/OFF, White/Black
list, Port Blocking, SMTP/POP3 Filter, Bypassing of EXE’s,
EXE Blocking, Window Blocking etc will work perfectly even
if the server is not available. Features like scheduler
etc, won’t work as expected if the server is not available.
For the features to work properly while the server is not
available, please ensure that the client computer has connected
to the server and the expected settings had taken effect
at least once.
2.
Is it necessary to run the client all the time for the blocking
to take effect?
The answer is same as the above (a). Additionally, you should
ensure that the client has connected to the server and the
expected settings had taken effect at least once.
3.
What is the difference between Computer Mode and User Mode?
Computer Mode lets you control the whole system regardless
of the person logged into the system. So all users logging
into the computer will be considered equal, regardless of
it is a normal user or administrator user. Computer Mode
is usually useful if the PC is not shared by more than one
user. In User Mode, policies can be set by on a per user
basis. This mode is usually used in environments where employees/students
share computers.
J. Uninstallation
1.
How can I uninstall the client?
There are various methods to uninstall the client.
Method 1 - Uninstall from the
Console Interface.
Method 2 – Type cssecui.exe
in the command prompt in client computer > Type the password
> Press the “Un-Install” button.
Method 3 – Type “cssec.exe
–p Password –u” at the command prompt in the client computer.
2.
I forgot the client password. What should I do?
If the Client is listed in the Console interface and is
shown as connected, then you can change the client password
from the “Client Settings” interface in the Console. Otherwise,
please email to [email protected] for support.
3.
How can I uninstall the Server and Console?
You can uninstall the Server and Console from the Add/Remove(Programs
and Features in Vista) features in the Control Panel.
K. System Requirements
1.
CybSecure Server Requirements
Operating
System:
•
Microsoft Windows 2000 (all series)
•
Microsoft Windows XP (all series)
•
Microsoft Windows 2003 (all series)
•
Microsoft Windows Vista & 2008 Server.
Hardware
Requirements:
•
800 MHz Intel Pentium or equivalent processor (depending
upon the number of clients to be handled).
•
512 MB of RAM (2GB or above recommended for controlling
1000 or above simultaneous client connections).
•
500 MB – 1 GB of free hard disk space.
Other
Essential Software:
•
Microsoft .NET framework 2.0.
•
Microsoft Windows Installer 3.0 or above.
2.
CybSecure Console Requirements
Operating
System:
•
Microsoft Windows 2000(all series)
•
Microsoft Windows XP (all series)
•
Microsoft Windows 2003 (all series)
•
Microsoft Windows Vista & 2008 Server.
Hardware
Requirements:
•
600 MHz Intel Pentium or equivalent processor (depending
upon the number of clients to be handled).
•
256 MB of RAM.
•
500 MB of free hard disk space.
•
Monitor that supports 800x600 resolution at 256 colors or
higher.
Other
Essential Software:
•
Microsoft .NET framework 2.0
•
Microsoft Windows Installer 3.0 or above
3.
CybSecure Client
Operating
System:
•
Microsoft Windows 2000(all series)
•
Microsoft Windows XP (all series)
•
Microsoft Windows 2003 (all series)
•
Microsoft Windows Vista & 2008 Server.
Hardware
Requirements:
•
300 MHz Intel Pentium or equivalent processor
•
32 MB of RAM.
•
50 MB of free hard disk space.
Other
Essential Software:
•
Microsoft Windows Installer 3.0 or abov
L. Purchase
1.
How do I order/purchase Cybsecure?
You can order CybSecure by
sending an email to
[email protected]. Please
specify the Organizataion Name in which the licenses are
to be granted, also specify the number of licenses for which
you place the order for. Orders will be processed generally
in a maximum period of 24 hours.
You can purchase CybSecure
online by clicking on the link http://www.workmoment.com/csbuynow.html.
M. Pricing
1. How is the product
priced?
Please visit http://www.workmoment.com/cspricing.html
for the pricing information.
|