ShadowUser Pro 2.0

Software Specifications

ShadowUser Pro Screenshot
  View more screenshots
Editor Rating
4.77 MB
License [?]:
$69.95 USD
Last Updated:
Security and Access Control Software
ShadowStor, Inc.
Operating System:
Windows NT Windows 2000 Windows XP
Additional Requirements:
P133, 128MB RAM (requires Microsoft .NET Framework 1.1 if using the graphical interface)
15-day fully functional trial

ShadowUser Pro Review

" Provides PC and Server disaster prevention solutions. "

The ShadowStor Approach - ShadowStor solutions have minimal impact to the current configuration of your server or PC. There are no modifications to the Master Boot Record (MBR), partitions or disk structure. ShadowStor technology captures a snapshot of your system volume(s) and runs an exact duplicate of your server or PC in a virtual state. This virtual state, called ShadowMode, allows the user to use the server or PC as normal, but without actually writing to disk. If system changes and folder or files changes occur during a ShadowMode session, then these changes can be automatically or manually committed to disk or discarded.

ShadowStor solutions provide the following benefits:
- Surf the Internet Without a Trace
- Eliminate Viruses
- Instantly Undo Unwanted System Changes
- Immediate PC or Server Recovery
- Return your system to its original state as fast as it takes to reboot
- Internet security, virus protection, PC and server recovery, internet file blocking all in one solution.

Running in ShadowMode provides the following benefits:
- A non-instrusive approach to security, data protection and disaster prevention
- Provides a proactive approach and eliminates server and PC problems before they occur
- Gives full control back to the IT professional or PC user to maximize system uptime
- Minimizes IT complexity and reduces the Total Cost of Ownership (TCO)
- Uses minimal system resources and returns the resources when the ShadowMode session is ended

There are many solutions on the market today that are trying to solve system security, data protection and disaster recovery challenges, but many of these solutions are addressing problems that should never exist. In many instances, the product that is supposed to be solving a particular issue with security, data protection ordisaster recovery is intrusive and compounding the problem. ShadowStor solutions provide a proactive approach and eliminate many of the challenges before they occur.


Top Related Downloads
1. Download 1 Firewall 1 Firewall
Firewall protection system.
2. Download PCWash PCWash
Simply, safely and securely erase the secrets your computer is keeping about you.
3. Download Callio Toolkit 17799 Callio Toolkit 17799
BS7799/ISO 17799 security policies compliance software which includes tools, policy generator, implementation templates, audit kit, and more.
4. Download WinDentify WinDentify
A freeware voice biometric package.
5. Download Date Cracker 2000 Date Cracker 2000
Removes time protection from programs.