Law Technology News
May 2001
American Lawyer Media Sites

The American Lawyer Magazine

National Law Journal

Law Catalog Sites Seminars

Automated Lawyer

New York



New Jersey

Other states

Security Checkpoint

SecurityTracker Launches Web Site

SecurityTracker has launched its Web site, devoted to reporting Internet security vulnerabilities. provides information for technology administrators and managers, with lists and categorization of vulnerability alerts.

Customers can also recieve weekly free alsert summaries, via e-mail, reports the company, based in Silver Springs, Md.

Information: Reader Response no. 274.

PC Security 4.3

PC Security 4.3, from Tropical Software, helps administrators configure locks to manage access to a system (or individual components) using right-click menus in Windows (95 SR2+). Users can restrict access to files, folders, or drives as read-only or totally unavailable.

Limits can be placed on specific windows or functions within programs. Internet connections can be password-protected; downloads restricted by file type.

Information: Reader Response no. 275.

Internet Watcher 2000

Internet Watcher 2000 1.9c, from Bernard D&G, is an Internet filtering application for Windows.

It accelerates the loading of Web sites by ignoring banner advertisements, pop-up windows, Java applets, javascript, and by displaying only the first frame of animated images.

Information: Reader Response no. 276.

Anonymity 4 Proxy

Anonymity 4 Proxy, a Windows program from iNetPrivacy Software Inc., lets individual or networked users travel the Internet anonymously.

The utility redirects requests for Web sites to anonymous public proxy servers located around the world.

The true I.P. address of the user's computer is subsequently hidden from Web sites, including Web-based chat and e-mail sites.

Information: Reader Response no. 277.

Electronic Signatures

Communication Intelligence Corp. has debuted iSign, for the Java platform. It allows electronic signatures for e-commerce applications over the Internet and in corporate Intranets.

It captures handwritten signatures online and binds them to specific transactions while verifying the user's signature based on biometric elements.

Information: Reader Response no. 278.

Login Shield

Allied Software L.L.C. has introduced Login Shield to prevent unauthorized use of computers. Administrators can use the program to manage multiple user accounts.

The software also tracks all attempts to log-in, and security levels can be customized to meet the needs of firms. A "key disk" function prevents accidental lock-outs because of forgotten passwords.

Information: Reader Response no. 279.

ALA Convention
Editor's Note
Publisher's Report

Birmingham Showcase
Compare & Contrast
Firm Administration
I.T.@Kelley Drye & Warren L.L.P.
London Insider
Outsourcing Basics
Second Opinions
Small & Home Office
Snap Shot: Chris Montgomery
Tech Circuit
Web Watch

Client Roster
Human Resources
Intellectual Property
Mail Call
Networking & Storage
New Releases
Office Gear
Partnerships & Alliances
Portable Office
Practice Tools
Quick Takes
Security Checkpoint
Time & Billing
Utilities Roundup
Web Works

U.K. Newsletters
Privacy Statement and Terms and Conditions of Use
© 2001 NLP IP Company. All rights reserved