unauthorized distribution shareware downloads


Search results for «unauthorized distribution»:

EC Watermark 2.1.0 build 388 EC Watermark 2.1.0 build 388
…  Requirements Operating system: Win98, WinNT, WinME, Win2, WinXP Memory : 128M or above Limitations In the trial version you cannot change the text and image of watermark… 

SLGallery 1.2 SLGallery 1.2
… atistical data analysis is used. Now you do not have to use tables with quantile values – SLGallery will calculate this value for any probability and for all distribution types. Requirements Pentium II, 5Mb free space on HDD, 32Mb RAM… 

Random Numbers Generator and Statistics Set 2.0 Random Numbers Generator and Statistics Set 2.0
… n are generated? The Random Numbers Generator and Statistics Set can show you how. It contains practical and well explained examples of: Log Normal Distribution Log Pearson Type III Distribution Normal Distribution 4. Chi-Square Distribu… 

SecretsSaver Corporate Pro 4.2 SecretsSaver Corporate Pro 4.2
… s to confidential data. Classify data stored on employee workstations and corporate servers by its level of confidentiality. Assign each employee a personal access level to allow or disallow the employee to access certain information. Restrict unauthorized distribution of confidential informat… 

SecretsSaver 3.05 SecretsSaver 3.05
… s to confidential data. Classify data stored on employee workstations and corporate servers by its level of confidentiality. Assign each employee a personal access level to allow or disallow the employee to access certain information. Restrict unauthorized distribution of confidential informat… 

WinProtection 3.0 WinProtection 3.0
… mputer from unauthorized accesses. You can protect your computer at startup or directly from within Windows. WinProtection can also shut down your computer after a number of incorrect passwords. This program works for Windows 95/98/ME.… 

IDEAL Dispatch 2.1 IDEAL Dispatch 2.1
… , installs the distribution agents as well as the software and scripts on the workstations defined for a distribution. The agents are installed automatically and installation can be scheduled for a particular day and time. IDEAL Dispatch Agent, al… 

StatAssist 2.0 StatAssist 2.0
… ariation, skewness, and kurtosis. Supported distributions: Bernoulli, Beta, Binomial, Cauchy (Lorentz), Chi-Squared, Discrete Uniform, Erlang, Error Function, Exponential, F Distribution, Fatigue Life (Birnbaum-Saunders), Frechet, Gamma, General… 

Club Manager 6.0.0 Club Manager 6.0.0
… ions includes time management based on client pays, locking computers upon ending reserved period, unauthorized access protection, traffic management, controlling and logging all actions, preparing reports for money accounting, analyzing, etc.… 

Secure IE 2004 Secure IE 2004
…  Your Privacy Set Secure IE to reject cookies from all but trusted sites - which you define. Never again worry about leaving credit card information, email addresses, passwords, and other personal information exposed to hackers. Intercepts Malic… 


Related: unauthorized distribution  unauthorized  unauthorized changes  from unauthorized  any unauthorized