Unauthorized Changes


Advertisement

Perfect Menu  v.4.3.1



- Mini Taskbar

- Submenus

- Custom colors

- Lock mode to protect settings from unauthorized changes ...

PDF-XChange  v.4.0199

You can use 40 or 128 bit security levels for your PDF file to prevent unauthorized changes, modification and distribution. You can customize the author name, title, keyword, creator, producer and more.

Features:

.Set resolution, ...





Advertisement

Steelray Project Viewer  v.4. 4. 2016



Main Features :

- Budget control - Reduce your license costs and provide inexpensive project access to everyone
- Peace of mind - Project Viewer prevents users from making unauthorized changes to project files
- Flexibility ...

DCV Editor  v.3.0.1.3

You can protect your CV from any unauthorized changes or amendments. The CV created using this technology will be placed in the electronic database, where the employers who use DCV program and CVBase Management & Query System can see your CV.
Moreover, ...

Kaspersky Anti-Virus Personal Pro  v.6.0.2

0 monitors the activity of programs and processes that have been launched in the computer's memory and, at the same time, warns users of any dangerous, suspicious or hidden processes (that is, rootkits), and of unauthorized changes in routine processes.

IMediaCONVERT  v.3. 3. 2015



Security conscious, iMediaCONVERT allows you to maintain a high degree of content control - presentations cannot be copied or edited, protecting your material against unauthorized changes and/or copyright infringement. Converted files maintain ...

SMP  v.13.2.4

SMP enables you to examine your hundreds or thousands of Windows PCs hardware and program automatically, manage risk by checking unauthorized changes, plan for future upgrade, solve technical issues, reduce TCO easily. In this version, H/W modification ...

Active Directory Object Restore Wizard  v.1.0


This software is a part of NetWrix Active Directory Change Reporter, so you will have a handy change management solution, and you won't have to do manual tracking of unauthorized changes or perform routine manual recovery. You just receive a daily ...

Netwrix AD Object Restore Wizard  v.7.509.873

Recovery of accidentally deleted Active Directory objects and rolling back unauthorized changes to users, groups, and other information in Active Directory is a routine and sometimes impossible to do task. Rolling back accidental deletions of users and ...

Crawler Web Security Guard  v.4.5

Web Security Guard helps you protect your browser security and privacy OCo FREE! Alerts you to unauthorized changes of your security settings; deletes sensitive information from your computer (e.g. browser history, cookies, etc.); monitors your browser ...

Trend Micro Internet Security 2010 (x64 bit)  v.1.0

Prevents unauthorized changes Improved security policies find and stop unwanted attempts to change your operating system and critical software. Offers customizable security warnings Decide how often you want to receive warnings about security threats.

Trend Micro Internet Security 2010 (x32 bit)  v.1.0

Prevents unauthorized changes Improved security policies find and stop unwanted attempts to change your operating system and critical software. Offers customizable security warnings Decide how often you want to receive warnings about security threats.

Dr.Web Security Space for Android  v.12.9.3.05291.0


Parental Control - protects children from dangerous websites, from calls and sms from strangers, from downloading or launch of unwanted apps, protects antivirus settings from unauthorized changes by kids with a password.
Calls and SMS filter ...

Monitor Folder For Changes Software  v.7.0

Now you can log changes when files are copied, created, deleted, modified or renamed. Simply select which folders to monitor and minimize the main window to the taskbar tray. Settings permit the application to load with windows and to load minimized.

Monitor Registry Changes Software  v.7.0

This software offers a solution to users who want to monitor and keep a record of changes to Windows registry keys. The user first selects the registry branch/s to monitor and can choose to include sub keys or not. There are options to run the software ...

Pages : < 1 | 2
Newest Reviews