Choose from over 30 categories: pornography, phishing, malware, social networking,…
Define your own whitelist and blacklist
Define hours of use and maximum daily use
Continue Reading →JUL
HomeHomepage Slider
Posted by: gastondoa
Choose from over 30 categories: pornography, phishing, malware, social networking,…
Define your own whitelist and blacklist
Define hours of use and maximum daily use
Continue Reading →Categories: Homepage Slider
Posted by: gastondoa
Choose from over 30 categories: pornography, phishing, malware, social networking,
Define your own whitelist and blacklist
Define hours of use and maximum daily use
Continue Reading →Categories: Homepage Slider
Posted by: gastondoa
Choose from over 30 categories: pornography, phishing, malware, social networking,…
Define your own whitelist and blacklist
Define hours of use and maximum daily use
Continue Reading →Categories: Homepage Slider
Posted by: gastondoa
Select from 4 of the most used protocols in P2P applications: BitTorrent, eDonkey, Gnutella and Fasttrack
Continue Reading →Categories: Homepage Slider, Sin categoría
Posted by: gastondoa
Select from 4 of the most used protocols in messenger applications: IRC, Jabber, MSN Messenger and Yahoo Messenger
Define a schedule for the use of messaging applications
Continue Reading →Categories: Homepage Slider
Posted by: gastondoa
Select from 4 of the most used protocols in messenger applications: IRC, Jabber, MSN Messenger and Yahoo Messenger.
Define a schedule for the use of messaging applications
Continue Reading →Categories: Homepage Slider
Posted by: gastondoa
Select the applications that should not connect to Internet
Enter the ports that can connect the applications
Continue Reading →Categories: Homepage Slider
Posted by: gastondoa
Select the applications that should not connect to Internet
Enter the ports that can connect the applications
Continue Reading →Categories: Homepage Slider