X

Join or Sign In

Sign in to add and modify your software

Continue with email

By joining Download.com, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy.

PEC Security Master

By Prime Element Creations Free to try Editors' Rating

Editors' Review

Download.com Staff Feb 27, 2009
Although it locks your PC, this application is easily upset. PEC Security Master locks your desktop, preventing unauthorized users from gaining entry. You can perform cosmetic pleasantries such as setting the background color or image during lock mode and selecting the message to be displayed when failed access attempts are made. PEC Security Master also logs invalid and successful password entries and detects mouse clicks and movements when its forces are employed. Unfortunately, you won't find the program in your start-up menu. In testing, we were also blocked from making further access attempts after an invalid entry requiring a system shutdown, a definite nuisance when the authorized user actually needs to get in. If locking down your system is a must, you'll want to seek a more reliable application.

Full Specifications

What's new in version 2.02

General

Release November 7, 2008
Date Added June 11, 2004
Version 2.02

Operating Systems

Operating Systems Windows 2000, Windows 98, Windows Me, Windows, Windows XP
Additional Requirements Windows 98/Me/2000/XP

Popularity

Total Downloads 2,169
Downloads Last Week 0
Report Software

Related Software

Vpn One Click

Free to try
Vpn One Click

Protected Folder

Free to try
Protected Folder

Random Password Generator

Free
Random Password Generator

Cryptomator

Free
Cryptomator

User Reviews

1.5/5
2 User Votes
5 Star
4 Star
3 Star
2 Star
1 Star

Developer's Description

PEC Security Master is a simple but powerful computer-locking mechanism that keeps unwanted users out of your computer when you're not around. The software is incredibly straightforward--just set a password and activate the security at your leisure. Your keyboard will become locked and your mouse will be restricted until the specified password is supplied. In the event an intruder is unable to input the required password within the given time limit, he or she will then be locked out of the computer until you return, with a time stamp indicating when the intrusion occurred.