for restricting free software


Search results for tag «for restricting»:

CD-DVD Lock 3.04 CD-DVD Lock 3.04
…  to media itself. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any removable media, and also prevent data leak by removable media. Limitations 30 days trial… 

Lock n Safe 4.4.0 Lock n Safe 4.4.0
… d window is displayed. The keyboard will only work to enter your password. The mouse is locked in the password window once locked. Anyone trying to access the computer while Lock n Safe is loaded will not be able to bypass the password window.… 

Hide & Protect any Drives 2.3 build 410 Hide & Protect any Drives 2.3 build 410
… zed software installations and data leak by removable media. Hide & Protect any Drives is a security tool that gives you the possibility to password protect the hard drive, CD, DVD, floppy and flash drive. Hide & Protect any Drives is intended for restricting read or write access to removable… 

Process Supervisor 2.05 RC3 Process Supervisor 2.05 RC3
… senting process names, Process Supervisor can dictate what is allowed to execute and what isn't. Default Process Priorities: Always run specified applications at certain priorities. Logging: Programs launched and actions performed can be logged… 

Secure Endpoint USB 1.0.1.4 Secure Endpoint USB 1.0.1.4
… use Secure Endpoint is notified that a device is trying to connect to your machine before the operating system is notified. This is yet another layer of protection Secure Endpoint uses to guard against potential threats. Limitations 30 day trial… 

Limit Logins 2.0.4 Limit Logins 2.0.4
… Configurable in security settings) This saves on Helpdesk calls. Ability to play any wav file just before logging out to get the attention of the user Limitations 30 days trial… 

ChildWebGuardian 4.0 ChildWebGuardian 4.0
… m viewing this site anyway. ChildWebGuardian has the following controlling functions: a function for analyzing the page content for the presence of forbidden phrases, a function for blocking the access to the sites in the "black" list, a function for restricting the use of Internet Explorer by ti… 

EKOS SecurePDF 1.7 EKOS SecurePDF 1.7
… ssibility options, such as ; Disabling file modification Disabling printing Restricting form-fields fill-in Disabling copying or data extracting Set a master password for changing accessibility options Limitations First page output PDF… 

EntryLock Network 2.0 EntryLock Network 2.0
… ll as Internet protocol used to connect to Internet server. EntryLock Network features Incoming and outgoing traffic monitoring Real Internet time management Web monitoring User accounts management Restricting access Reports generating… 

Mz Ram Booster 1.1 Mz Ram Booster 1.1
… g some system settings! It uses minimal resources and almost no CPU time. You will have the best performance boost, without any new hardware, any hardware tweak and without restricting your system´s stability. Requirements .NET Framework 2.0… 


Related: