Index >> System Utilities >> Automation Tools >> Impersonator
Report SpywareImpersonator 1.77
Software Description:
Impersonator - An automated "RunAs" program that provides options not included in Windows
Impersonator is an automated "Run As" program that provides a part of useful options not included in Windows. Whis Impersonator you can create a list of programs you need to run with other's users account. And run this list from a shortcut and/or command line and/or using an GUI of Impersonator. User name and password that you are using to create the list of "Run As" items are encrypted with a mix of MD5 and RC4 algorithms. Additional option is allows you to hide the user name and the password.
Impersonator allows administrators to log on with a non-administrative account and still be able to perform administrative tasks (without logging off) by running trusted administrative programs in administrative contexts. In this scenario, system administrators require two user accounts: a regular account with basic privileges, and an administrative account (this can be a different administrative account for each administrator or a single administrative account shared among administrators).
Limitations: 30 Days Trial
Impersonator is an automated "Run As" program that provides a part of useful options not included in Windows. Whis Impersonator you can create a list of programs you need to run with other's users account. And run this list from a shortcut and/or command line and/or using an GUI of Impersonator. User name and password that you are using to create the list of "Run As" items are encrypted with a mix of MD5 and RC4 algorithms. Additional option is allows you to hide the user name and the password.
Impersonator allows administrators to log on with a non-administrative account and still be able to perform administrative tasks (without logging off) by running trusted administrative programs in administrative contexts. In this scenario, system administrators require two user accounts: a regular account with basic privileges, and an administrative account (this can be a different administrative account for each administrator or a single administrative account shared among administrators).
Limitations: 30 Days Trial
100% Clean:
Impersonator 1.77 is 100% clean
This download (impersonator.zip) was tested thoroughly and was found 100% clean. Click "Report Spyware" link on the top if you found this software contains any form of malware, including but not limited to: spyware, viruses, trojans and backdoors.
This download (impersonator.zip) was tested thoroughly and was found 100% clean. Click "Report Spyware" link on the top if you found this software contains any form of malware, including but not limited to: spyware, viruses, trojans and backdoors.
Related Software:
- ShutDownOne Pro 4.00 - Auto Power OFF or Power On computer at defined time, run programs, auto-login
- ByteWedge 2.7 - Acquire data from electronic devices through an RS232 interface
- Active Task Manager 1.70 - Start programs and display reminders using the flexible schedule or manually.
- Active Keys 2.41 - Make a controller capable of doing any action with single press of your keyboard
- WakeupOnStandBy 1.7.20.1 - Free software to wake up PC from sleep mode or hibernation at a predefined time.
- Auto-Keyboard 9.0 - Auto-Keyboard is a software that imitate keyboard keystroke and mouse action.
- Service Timer 2.0.0 - A smart assistant for administrator to control services or run program on time
- PC Auto Shutdown 5.6 - auto shutdown,power off, reboot, hibernate or suspend computers at schedule time
- Green Computing Shutdown Scheduler 1.1 - Save electricity by scheduling when your computer should shutdown or hibernate
- Icon Searcher 4.00 - This performs a fast scan of all local hard disks for icons.
top 10 most downloaded
recommended software
-
- AppleXsoft Photo Recovery for Mac
- AppleXsoft Photo Recovery is the comprehensive digital media data rescue software designed for Mac users, it featuring innovative photo recovery algor...
-
- Cacheman
- Memory is one of the most important pieces of computer hardware as it is in constant use no matter what a PC is used for. There is a tremendous number...