Author Archive

Lock web browsing

Posted by:

Lock web browsing

Choose from over 30 categories: pornography, phishing, malware, social networking,…

Define your own whitelist and blacklist

Define hours of use and maximum daily use

Continue Reading →
0

Lock web browsing

Posted by:

Lock web browsing

Choose from over 30 categories: pornography, phishing, malware, social networking,

Define your own whitelist and blacklist

Define hours of use and maximum daily use

Continue Reading →
0

Lock web browsing

Posted by:

Lock web browsing

Choose from over 30 categories: pornography, phishing, malware, social networking,…

Define your own whitelist and blacklist

Define hours of use and maximum daily use

Continue Reading →
0

Lock P2P applications

Posted by:

Lock P2P applications

Select from 4 of the most used protocols in P2P applications: BitTorrent, eDonkey, Gnutella and Fasttrack

Continue Reading →
0

Lock messaging applications

Posted by:

Lock messaging applications

Select from 4 of the most used protocols in messenger applications: IRC, Jabber, MSN Messenger and Yahoo Messenger

Define a schedule for the use of messaging applications

Continue Reading →
0

Lock messaging applications

Posted by:

Lock messaging applications

Select from 4 of the most used protocols in messenger applications: IRC, Jabber, MSN Messenger and Yahoo Messenger.

Define a schedule for the use of messaging applications

Continue Reading →
0

Lock applications and ports

Posted by:

Lock applications and ports

Select the applications that should not connect to Internet

Enter the ports that can connect the applications

Continue Reading →
0

Lock applications and ports

Posted by:

Lock applications and ports

Select the applications that should not connect to Internet

Enter the ports that can connect the applications

Continue Reading →
0