Getting started with Chronager |
Downloading and Installing Chronager In order to use Chronager, please go to the www.softforyou.com/chr-download.php download and install it on your personal computer. After successfully installing Chronager on your computer, run it. You will see the user interface from which you can make your settings. Customizing your level of restrictions by setting user names and groups Chronager allows you to set up different levels of restrictions for each member of your family (or personnel) depending on their maturity, interest, habits and parental control needs. To do this, click on Settings then click on Users and Groups. To facilitate the administration, Chronager allows you to unite users into groups and customize settings for a whole group. There is no need to customize every user's settings. The Chronager program identifies a user by the same login name the user enters when he/she logs in to Windows (windows login name or logon). If you do not add a new login to the user list of Chronager, the program will add it automatically to the 'Guests' group. Chronager software contains the following built-in users groups:
After that you should set up Chronager settings for Internet Schedule, Programs Schedule, etc the created users groups. Setting the time that the computer, and its individual functions, can be accessed Chronager's user-friendly interface makes it very easy to set up your computer restrictions. To set the times that the computer can be accessed for each group/user, simply click on Computer Schedule, and then on Timetable. Simply highlight in red the times that the computer cannot be switched on. To set a daily time limit for using the computer (without specifying when in the day) press on Daily Time Limits, and set the time limit for each day of the week In the same you way you can set the times in which access is to be denied to the Internet, specific programs, the CD ROM and removable disks. Just click on the appropriate button at the top of the user interface. Checking program activity, and generated warnings Internet activity It is easy to keep a check on the program activity of your child. To Monitor which programs have been used and when, click on Warnings and Logs, then click on Program Activity. Here you can view a list of the most recently accessed programs. By clicking on Warnings Log, you can find out if the computer or one of its functions was attempted to be accessed outside of the permitted time. Please refer to the Chronager manual for more information about using Chronager. |
Copyright © 2000—2011 SoftForYou |