unknown devices free software


Search results for tag «unknown devices»:

Unknown Devices 1.4.18 Beta Unknown Devices 1.4.18 Beta
… ng Device Manager for unknown devices and extracting information from it, unknown devices attempts to figure out what the device is. You might not have to open your case or look up random numbers off of PCI cards to figure out what they are.… 

Mail UnKnown Anti-Spam 1.532 Mail UnKnown Anti-Spam 1.532
… OP3 for receiving email. Here are just a few: Outlook Express, Outlook, Netscape, Eudora, Pegasus Mail, Yahoo Plus email (with email client). Mail UnKnown IS NOT a replacement for your current email service, it works with your existing email… 

PrivacyKeyboard for Servers7.4 PrivacyKeyboard for Servers7.4
… ke capturing. Submodule for protection against clipboard capturing. Submodule for protection against active window screenshoting. Submodule for protection against desktop screenshoting. Submodule for protection against attacks of spy programs.… 

ID Devices Lock 1.2 ID Devices Lock 1.2
… es Lock offers restriction options. It enables you to decide what devices should be locked and which ones should be allowed and accepted. ID Devices Lock has a convenient graphic interface which is very simple to use. It requires minimal space on yo… 

USB Info 1.2 USB Info 1.2
… egistry Entries that have been installed including those that apply to USB Devices you may no longer be using. Review the Advanced Technical Information for USB Devices Requirements 300 MHz CPU 128 MB RAM Limitations 100 uses 15 days trial… 

Anti-Keylogger Elite 3.3.3 Anti-Keylogger Elite 3.3.3
… ow take lots of picutres of your computer's screen so that they can monitor and "See" everything that you do. There is a way to stop it, You can use AKE to give you all round protection from all these threats. Requirements Pentium, 8M RAM… 

Free Email Monitor 2.1 Free Email Monitor 2.1
… n unauthorized or unknown program (virus, keylogger, spyware etc.) is trying to send an email in the background. It also stops emails to unknown recipients or containing potentially unsafe attachments. Works on system level and cannot be bypassed.… 

Panda TruPrevent Personal 2006 3.00 Panda TruPrevent Personal 2006 3.00
… ive at combating Internet viruses with the capacity to spread without needing to hide in e-mail messages or attachments. Requirements Pentium processor 90 MHz. 64 MB of RAM. 30 MB of available hard disk space. Limitations timing: 30 days… 

AccessPatrol 4.2.0.6 AccessPatrol 4.2.0.6
… of PCs: AccessPatrol for Devices AccessPatrol for Devices manages the use of devices such as USB, CD and floppy drives. From a central console, access to these devices can readily be enabled or disabled on a per PC basis. AccessPatrol for… 

Keylogger Killer 1.5 Keylogger Killer 1.5
… sently being developed worldwide. It is based on artificial intelligence algorithms, does not reply on signature matching. So it may work on new or unknown types of key logging and activity monitoring programs. Limitations Limited to 15 days.… 


Related: