unauthorized program free software
Search results for tag «unauthorized program»:
WinProtection 3.0
… mputer from unauthorized accesses.
You can protect your computer at startup or directly from within Windows.
WinProtection can also shut down your computer after a number of incorrect passwords. This program works for Windows 95/98/ME.…
Mouse Lock 1.65
… will set.
Mouse Lock disables special key combinations such as ALT_TAB, CTRL_ESC, CONTROL_ALT_DELETE and others. The program has protection from rebooting and reseting your computer. Mouse Lock can turn off monitor. The application can lock your…
System Security 2006 4.0.0
… changing program settings. This new version also includes a new easier-to-use System Policy Editor program that allows you to disable certain features of the Windows Operating System to make your system even more secure.
Limitations
30 day trial…
ID USB Lock Key 1.2
… reen whenever someone else touches your computer, disabling any key from having any influence upon it.
ID USB Lock Key has a convenient graphic interface which is very simple to use. It requires minimal space on your computer to operate efficiently.…
Free Email Monitor 2.1
… n unauthorized or unknown program (virus, keylogger, spyware etc.) is trying to send an email in the background.
It also stops emails to unknown recipients or containing potentially unsafe attachments. Works on system level and cannot be bypassed.…
EC Watermark 2.1.0 build 388
… rk can resize, rotate, rename to a batch of pictures all at one time.
Requirements
Operating system: Win98, WinNT, WinME, Win2, WinXP
Memory : 128M or above
Limitations
In the trial version you cannot change the text and image of watermark…
Process Audit Free Edition 1.0
… ition":
Real time process monitoring
Automated process termination
Lower Cost of administration
FREE for home users who wants to monitor their local machines for unauthorized application execution
Requirements
Microsoft .NET Framework 2.0…
PDF-Security 1.0
… copy or edit the text.
You can decide if the user have to enter a password in order to view the file. It is also possible to decrypt PDF files. If they are protected by a password you have to know the password in order to decrypt the file.…
Keylogger Killer 1.5
… sently being developed worldwide.
It is based on artificial intelligence algorithms, does not reply on signature matching. So it may work on new or unknown types of key logging and activity monitoring programs.
Limitations
Limited to 15 days.…
SafePC 4.04
… ames which may halt the company local area network.
c. Parent can use SafePC to control program access by their child. It can prevent their children from access certain program like irc program and so on.…
Related: