any unauthorized shareware downloads


Search results for «any unauthorized»:

EC Watermark 2.1.0 build 388 EC Watermark 2.1.0 build 388
… rk can resize, rotate, rename to a batch of pictures all at one time. Requirements Operating system: Win98, WinNT, WinME, Win2, WinXP Memory : 128M or above Limitations In the trial version you cannot change the text and image of watermark… 

WinProtection 3.0 WinProtection 3.0
… mputer from unauthorized accesses. You can protect your computer at startup or directly from within Windows. WinProtection can also shut down your computer after a number of incorrect passwords. This program works for Windows 95/98/ME.… 

Secure IE 2004 Secure IE 2004
…  Your Privacy Set Secure IE to reject cookies from all but trusted sites - which you define. Never again worry about leaving credit card information, email addresses, passwords, and other personal information exposed to hackers. Intercepts Malic… 

CryptoFish 1.1 CryptoFish 1.1
… owfish algorithm which was designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm.… 

SysGuard 1.5.8 SysGuard 1.5.8
… sers, a very customizable interface, and much more. SysGuard is the perfect solution for parents who want to limit their children's time on the computer, and for protecting computers that are in public areas or that contain sensitive data.… 

Mouse Lock 1.65 Mouse Lock 1.65
… will set. Mouse Lock disables special key combinations such as ALT_TAB, CTRL_ESC, CONTROL_ALT_DELETE and others. The program has protection from rebooting and reseting your computer. Mouse Lock can turn off monitor. The application can lock your… 

System Security 2006 4.0.0 System Security 2006 4.0.0
… changing program settings. This new version also includes a new easier-to-use System Policy Editor program that allows you to disable certain features of the Windows Operating System to make your system even more secure. Limitations 30 day trial… 

Locus Screen 2006 Professional 2.1 Locus Screen 2006 Professional 2.1
… ional": Centralized administration Real time file & process monitoring No human intervention during file restoration Automated process termination & operators notifications Lower Cost of administration Limitations 30 days trial nag scre… 

Win Control 2004 6.202 Win Control 2004 6.202
… s should have, you can also protect the Windows Desktop from unauthorized manipulation. You can even define access privileges to system functionality for each user. Finally make an end to deleted or moved links, unlicensed copies of programs, una… 

Secure Endpoint USB 1.0.1.4 Secure Endpoint USB 1.0.1.4
… use Secure Endpoint is notified that a device is trying to connect to your machine before the operating system is notified. This is yet another layer of protection Secure Endpoint uses to guard against potential threats. Limitations 30 day trial… 


Related: any unauthorized  unauthorized changes  unauthorized  from unauthorized  prevent unauthorized