unauthorized changes shareware downloads
Search results for «unauthorized changes»:
EC Watermark 2.1.0 build 388
… rk can resize, rotate, rename to a batch of pictures all at one time.
Requirements
Operating system: Win98, WinNT, WinME, Win2, WinXP
Memory : 128M or above
Limitations
In the trial version you cannot change the text and image of watermark…
WinProtection 3.0
… mputer from unauthorized accesses.
You can protect your computer at startup or directly from within Windows.
WinProtection can also shut down your computer after a number of incorrect passwords. This program works for Windows 95/98/ME.…
Secure IE 2004
… Your Privacy
Set Secure IE to reject cookies from all but trusted sites - which you define. Never again worry about leaving credit card information, email addresses, passwords, and other personal information exposed to hackers.
Intercepts Malic…
CryptoFish 1.1
… owfish algorithm which was designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms.
Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm.…
SysGuard 1.5.8
… sers, a very customizable interface, and much more.
SysGuard is the perfect solution for parents who want to limit their children's time on the computer, and for protecting computers that are in public areas or that contain sensitive data.…
Mouse Lock 1.65
… will set.
Mouse Lock disables special key combinations such as ALT_TAB, CTRL_ESC, CONTROL_ALT_DELETE and others. The program has protection from rebooting and reseting your computer. Mouse Lock can turn off monitor. The application can lock your…
System Security 2006 4.0.0
… changing program settings. This new version also includes a new easier-to-use System Policy Editor program that allows you to disable certain features of the Windows Operating System to make your system even more secure.
Limitations
30 day trial…
Locus Screen 2006 Professional 2.1
… ional":
Centralized administration
Real time file & process monitoring
No human intervention during file restoration
Automated process termination & operators notifications
Lower Cost of administration
Limitations
30 days trial
nag scre…
Win Control 2004 6.202
… s should have, you can also protect the Windows Desktop from unauthorized manipulation.
You can even define access privileges to system functionality for each user. Finally make an end to deleted or moved links, unlicensed copies of programs, una…
Secure Endpoint USB 1.0.1.4
… use Secure Endpoint is notified that a device is trying to connect to your machine before the operating system is notified. This is yet another layer of protection Secure Endpoint uses to guard against potential threats.
Limitations
30 day trial…
Related: any unauthorized unauthorized changes unauthorized from unauthorized prevent unauthorized