ImpersonatorImpersonator - create a list of programs you need to run with other users' account | |
Download |
Impersonator Ranking & Summary
Advertisement
- License:
- Free to try
- Price:
- $35.00
- Publisher Name:
- DimaWare
- Operating Systems:
- Windows
- File Size:
- 245 KB
Impersonator Tags
- administrative server task trusted host impersonator password breaker run program perform task run windows run programs run arduino programs run MIPS32 program run external programs www.windows.com wifi password cracker mini-stream ripper keygen hack mig33 password outbound net sat mp3 music dowloader download game laptop convert AI to sdii slim care autostitch .com dating games for software q
Impersonator Description
Impersonator is an automated "Run As" function of Windows that provides a part of useful options not included in Windows. With Impersonator you can create a list of programs you need to run with other users' account. And run this list from a shortcut and/or command line and/or using an GUI of Impersonator. User name and password that you are using to create the list of "Run As" items are encrypted with a mix of MD5 and RC4 algorithms. Additional option is allows you to hide the user name and the password by running the Impersonator from the command line with "sec_on" option. Impersonator lests administrators log on with a non-administrative account and still be able to perform administrative tasks (without logging off) by running trusted administrative programs in administrative contexts. In this scenario, system administrators require two user accounts: a regular account with basic privileges, and an administrative account (this can be a different administrative account for each administrator or a single administrative account shared among administrators). It is good practice for administrators to use an account with restrictive permissions to perform routine, non-administrative tasks, and to use an account with broader permissions only when performing specific administrative tasks. To accomplish this without logging off and back on, log on with a regular user account, and then use the Impersonator to run the tools that require the broader permissions. Limitations: ■ 30 day trial
Impersonator Related Software