Zombie Workstation 0.1
Improve network security by automatically logging off users that forget to log out and save money and the environment by automatically shutting down computers after hours.
|
Improve network security by automatically logging off users that forget to log out and save money and the environment by automatically shutting down computers after hours. Version allows one free license to for unlimited testing.
tags

Download Zombie Workstation 0.1
Download Zombie Workstation 0.1
Similar software
Zombie Workstation 0.1
Exetel
Improve network security by automatically logging off users that forget to log out and save money and the environment by automatically shutting down computers after hours.
HomeRoom 1.11
Wieser Software Ltd
HomeRoom provides an easy way change users in a shared environment, like a primary school's computer lab.
Lantailor Office 2006 2.6
Italsel
Lantailor Office will manage all your network computers and improve your IT security.
USB Shadow 1.0
ToroSoft Software
Protect all your USB Files and Folders by 'shadowing' them to a secure folder on your local PC or network! USB Shadow works automatically, so all you have to do is 'Set it and forget it!'
Compresses and encrypts 'shadow files' for added security.
30 Ways To Save Money And The Environment 1.0
Nick Harter
Arovax TraySafe Password Manager Business 4.5
Arovax LLC
Business or Network version of innovative password management software Arovax TraySafe allows net users to forget about password problems in small offices or big corporations.
Fast Messages 1.21
BMS Web Development
With Fast Messages you can send messages over a Network.
KFSensor 2.0.1
KeyFocus Ltd.
Worried about hackers, worms and trojans?
Want to improve your Internet security?
Want to detect intruders?
KFSensor is a host based Intrusion Detection System (IDS).
PowerOut 5.5.1.0
Visionsoft
PowerOut is a useful program that helps you to save energy.
NetShareWatcher 1.5.8
Nsasoft LLC
NetShareWatcher is network security improvement software allowing network administrators to easily monitor network shares and identify shares which are violating data access policy in their organization.