Ensure that only authorized people can access sensitive information on your computer.
Visual based, virtual computing environment.
Quickly identify devices and their IP addresses on your network.
Capture screen images, Windows Store apps (using touch), scrolling areas, video.
it is developed to control and manage your windows startup programs list.