for restricting free software
Search results for tag «for restricting»:
CD-DVD Lock 3.04
… to media itself.
CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any removable media, and also prevent data leak by removable media.
Limitations
30 days trial…
Lock n Safe 4.4.0
… d window is displayed. The keyboard will only work to enter your password. The mouse is locked in the password window once locked. Anyone trying to access the computer while Lock n Safe is loaded will not be able to bypass the password window.…
Hide & Protect any Drives 2.3 build 410
… zed software installations and data leak by removable media.
Hide & Protect any Drives is a security tool that gives you the possibility to password protect the hard drive, CD, DVD, floppy and flash drive.
Hide & Protect any Drives is intended for restricting read or write access to removable…
Process Supervisor 2.05 RC3
… senting process names, Process Supervisor can dictate what is allowed to execute and what isn't.
Default Process Priorities: Always run specified applications at certain priorities.
Logging: Programs launched and actions performed can be logged…
Secure Endpoint USB 1.0.1.4
… use Secure Endpoint is notified that a device is trying to connect to your machine before the operating system is notified. This is yet another layer of protection Secure Endpoint uses to guard against potential threats.
Limitations
30 day trial…
Limit Logins 2.0.4
… Configurable in security settings) This saves on Helpdesk calls.
Ability to play any wav file just before logging out to get the attention of the user
Limitations
30 days trial…
ChildWebGuardian 4.0
… m viewing this site anyway.
ChildWebGuardian has the following controlling functions: a function for analyzing the page content for the presence of forbidden phrases, a function for blocking the access to the sites in the "black" list, a function for restricting the use of Internet Explorer by ti…
EKOS SecurePDF 1.7
… ssibility options, such as ;
Disabling file modification
Disabling printing
Restricting form-fields fill-in
Disabling copying or data extracting
Set a master password for changing accessibility options
Limitations
First page output PDF…
EntryLock Network 2.0
… ll as Internet protocol used to connect to Internet server.
EntryLock Network features
Incoming and outgoing traffic monitoring
Real Internet time management
Web monitoring
User accounts management
Restricting access
Reports generating…
Mz Ram Booster 1.1
… g some system settings! It uses minimal resources and almost no CPU time.
You will have the best performance boost, without any new hardware, any hardware tweak and without restricting your system´s stability.
Requirements
.NET Framework 2.0…
Related: