denied shareware downloads


Search results for «denied»:

Access Denied XP 1.2 Access Denied XP 1.2
…  such accounts. Color logs allow you to take knowledge about usage of computer and detect intruder in appropriate time. Access denied XP also allows you to disable CTRL+ALT+DEL to prevent Task Manager so users can't stop special applications.… 

Access Denied 4.00 Access Denied 4.00
… easures that can stop hackers/crackers. Screen Guard sub-system can save message events from anyone, even unauthorized persons but still protect desktop. Users can change their passwords only if during installation you enable this feature.… 

Spyware Firewall 1.1 Spyware Firewall 1.1
… t afterwards and stop spyware communication. Spyware Firewall protects your computer by monitoring your connection in real-time and denying access to all spy ware connections that occur. So spy ware attempts to communicate with your computer are denied and new spy ware entering into your compute… 

TrafficQuota 1.0 TrafficQuota 1.0
… Microsoft ISA Server. It enables you to restrict or allow users' access to the Internet, based on the volume of data downloaded (or uploaded) from the Internet. For example, user 'John' is allowed to download 500 MB a month, and after this he is denied access to the Internet. User 'Jane' is assi… 

MyDbDump pro 2.0 MyDbDump pro 2.0
… QL database with the same structure and data of your Access database… 

Limit Logins 2.0.4 Limit Logins 2.0.4
… rent logins for any given user. Limit Logins features Limit concurrent logins for specified users or groups on the network Ability to see where all users are currently logged into Log's all login/logout, time restriction, scheduled time, and denied access activity Ability to set the user t… 

SOCKS FW5 1.2 SOCKS FW5 1.2
… tested with multiple SOCKS clients and socksifying libraries, for both TCP and UDP protocols.… 

Internet Access Scheduler 2.0 Internet Access Scheduler 2.0
… o TCP/IP connections. Internet Access Scheduler lets you control which users can access what TCP/IP based protocols (HTTP, FTP, SMTP, POP3, Telnet, etc.) on a local computer, depending on the time of day and day of the week. You can also set allowed/denied TCP/UDP ports and IP addresses for incoming… 

3DTop 1.5.0 3DTop 1.5.0
… anything on your computer there is no uninstall. Simply delete 3dtop.exe and icon3d.dat. But be sure that you quit 3DTop first.… 

Zim 2.0 Zim 2.0
… on and user idle detection. File transfers through the server for users from remote locations behind firewalls, routers and VPNs. Optional self register procedure for creating user accounts without system administrator. Remote server administration. Restrict access to the server by filtering rul… 


Related: are denied  denied  zone security denied