Restrict applications and Websites. Restart up to 8 Failed Applications. Restrict PC Access (task bar, CTRL Alt Del, Alt Tab, Reg Editor, Hide Start Menu, Hide Desktop, Disable Task Manager). Restart Internet Explorer if closed or aborted by the user....

Leak Blocker

Leak Blocker 1.1.2

Leak Blocker prevents data leakage from corporate computers using removable devices. It can be used to achieve two main goals: restricting the use of external devices and activity monitoring (including file access actions). In addition Leak Blocker can...

Licence Protector

Licence Protector 4.0.0.911

You have developed an application and you want to protect it fast, easy, reliable and cost effective? Licence Protector from Mirage Computer Systems administrates licenses and modules (license manager and control), generates Demo- and time limited...

M2 Circle

M2 Circle 0.7.5

m2 circle is easy to install high privacy software for secure messaging and voice. The messenger is base on the m2 network that is pretty good blinded according to user identities, and no real user entities is ever exposed or logged on the...