Operating System Utils
Other OS Utilities and Systems
Current Highlights
Follow us on Facebook

NIC Padlock 3.5.0

NIC Padlock is designed to allow a system administrator to either temporarily or permanently disable a remote system’s network interface cards (NIC’s). NIC Padlock also supports enforcing that all adapters are enabled on the remote system. A quick summary of its features are:

  • Disable all network adapters

  • Choose to display a message to the user when NIC’s are disabled

  • Enable all network adapters

  • Re-enable the adapters that were disabled after a configurable time period

  • Retrieve a remote computer’s list of auto-run programs

  Usage Scenarios NIC Padlock is a great solution when you need to ensure that a remote host is disconnected from your network immediately. You may require this to happen for several reasons:

  • Host is infected, or possibly infected, with high-risk malware

If you suspect that a remote computer has an information stealing Trojan it is imperative to immediately remove that system from your network. NIC Padlock provides this capability. Using NIC Padlock, even if the user plugs their computer into a different network port they will not be able to gain access to your network. NIC Padlock also retrieves a list of a remote system’s applications that are configured to run automatically at startup, which can be used to determine the possibility of a virus infection.

  • An employee leaves your organization

When an employee leaves your organization, NIC Padlock can provide essential peace of mind by ensuring that the recently departed employee is not able to use a wired or wireless network in order to electronically send customer information, product information, or sensitive data from the workstation still in their possession. In addition, if the employee that is leaving works from home or remotely, NIC Padlock can ensure that they are unable to connect to your network using any VPN connections to your company.

  • A host is under heavy network load or DDOS attack

If you are experiencing an unexpected heavy load on a production or test system, NIC Padlock can allow you to temporarily disable the host’s network cards and can automatically re-enable them after a number of minutes or hours that you define. Virtual Computers In many organizations it is not uncommon to have several virtual computers running on a single server or workstation, using such technologies Microsoft’s Hyper-V, VMWare’s many virtualization products, Parallels virtualization of Window’s systems on Mac OS X (to name just a few). It may not always be clear on which physical hardware a virtual computer is running. If you encounter any of the above scenarios occurring on one of your virtual host’s, NIC Padlock can provided the quickest way to take a virtual system off your network either temporarily or permanently.

User's rating:

  • Currently 0.00/5
  • 1
  • 2
  • 3
  • 4
  • 5
Enlarge the screenshot of NIC Padlock
[ Enlarge Image ]
Download 4.5MB NIC Padlock

Download Direct

(4.5MB, Extension: EXE)

Download alternate to NIC Padlock solution

Look at the free or trial alternatives and similar apps to NIC Padlock software by the tags. It's possible also to find substitutes for the most popular titles in the Operating System Utils category.

| S Network Interface Cards | Remote System | Remote Computer | Nic Padlock |

Average review rating :

Useful independent reviews and opinions of the users

Review NIC PadlockWrite a review « Be the first to post a review for NIC Padlock download!

Predicted future versions and notices:

The constantly monitors the update of all programs, including information from the NIC Padlock 3.5.1 changelog file, however sometimes it can happen that data are not complete or are outdated.We assume that author continue's to develop 3.6.0 version with further advanced features, and soon you will be informed. Equally important 4.0.0 upgrades of the program we will continue to monitor. Full NIC Padlock description has been compared with the overall software database and our algorithm has found the following applications (are showed below).