I do not approve of some of the programs or games that my child installs on my computer. Also I can not even control him to prevent software installation. What can I do?. How many times we heard this question from parents. Without good preventative measures, children can bring a functioning computer to its knees in a matter of minutes. Children are a leading cause of viruses, spyware, and adware being installed on computers. Children download programs, play games, and tinker with computers. Questionable programs and changes to settings can slow down your computer or disable important functions. Irreparable damage can be done to your operating system, files, and settings. Is there a way to prevent them from doing this and how can you keep your children from destroying your computer? Yes. The Stop Software Installation Tool allows you to prevent users of your computer from installing unwanted software with password protection. You can specify rules according files masks to block software installers execution. Main features: - set the administrator password to prevent software installation, change program settings, uninstall the Stop Software Installation Tool; - specify the list of rules with files masks to block certain file execution; - define users who may or not to install programs on your PC; - start the program in the hidden mode or with the tray icon; - use the hot key to activate the program; - control users activities with the log file.
What is new in this release:
Version 18.104.22.168 may include unspecified updates, enhancements, or bug fixes.
Like it? Share with your friends!
Other Windows Software of Developer «SSS Lab»:
Offline Site Map Generator Free Offline Site Map Generator for Windows creates sitemaps for your Web site. It scans the local folder with your Web site copy to collect Web site pages. It generates sitemaps of the Google Sitemap Protocol XML and/or the common Site Map HTML which are
Vista User Time Manager Vista User Time Manager lets you specify when exactly and how long the computer can be used and define users which will be allowed to use the computer without any limits. You can schedule time intervals and the number of hours each child can use the comput
Internet Explorer Security Pro Internet Explorer Security is an utility that customizes many aspects of the Internet Explorer Web browser. It's a snap to use and provides the tools you need to retain and manage your Web browser settings. It lets you disable individual menu items and pre
1st Security Center Pro 1st Security Center is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect yo
Windows Security Tweaker Windows Security Tweaker is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can acc
Dark Files Dark Files can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms
Invisible Private Folder The Invisible Private Folder can help you keep your files protected from kids, friends and co-workers. It allows you to add any folders to the virtual invisible private folder. It enables you to block and hide any file or folder you do not want to be acces
Windows Security Officer Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can acc
Network Shares Recycle Bin When you delete a file stored on a network location or mapped network drive that the file is permanently deleted. It does not go to the local computer's recycle bin and does not go to the server's recycle bin. How to enable a recycle bin for shared folders
IE Privacy Manager IE Privacy Manager allows you care of your privacy when you surf the Internet and suddenly leave your PC. Your Internet Explorer browser keeps opened for unwanted persons and you might lost your personal information.
It makes the IE Browser to go back to
Secure Lockdown Multi Application Edition Lock down Windows XP/Vista/7/8/10. Inteset's inexpensive Secure Lockdown v2 - Multi Application Edition is ideal for kiosks, trade shows, library and school labs, hotels, hospitals, Internet cafes, gaming centers, museums, and correctional facilities. Give
CyberScrub Security CyberScrub Security removes all evidence of your online activity, erases data beyond recovery, secures your files with strong encryption and enhances overall system performance.
The NEW CyberScrub Infinity Safe lets you encrypt files before storing on
File Shredder File Shredder is free desktop application to securely shred files and folders on computer. Files deleted with File Shredder can not be retrieved back. File Shredder supports multiple shredding algorithms up to 7 passes, US government compliant DoD 5220-22.
Aebi Pics Wallet In Our day-to day life we save images in our desktops, laptops
(PC's) with some possibility that they might be accessed in an unauthorized manner. So to overcome that very problem I thought of making an application which will protect our personal images
IAPS OpenVPN IAPS Security Services, L.L.C. is providing a free of charge, professional OpenVPN server to the public. This free network is provided so that the public has a chance to test and evaluate the network, usability, and compatibility with their own networks. T
HelpfulMergeFiles Hides your valuable files by using different methods of your choosing, here is a copy of the readme explaining each method, and in accordance, Binary File Addition is the best.
Here is a description of each method:
1. hideme - uses C++ and batch to use s
ConfidentSend ConfidentSend is the most comprehensive, user friendly and fast solution for removing hidden data & metadata from email attachments.
Hidden data stored in many popular file types may contain confidential and private information that when exposed can cau
Mask Surf Lite Mask Surf Lite is an Internet activity tool which effectively protects your privacy by hiding or masking you identity while surfing the Web. It also lets you clean any browser traces on your computer so that your Internet activity stays anonymous on the in
RoTunneling VPN What is RoTunneling VPN ?
The purpose of RoTunneling VPN service is to help users access the Internet without censorship and to ensure their safety while surfing the internet.
It is a service that aims to help censored users reach the internet , it r
Proxy Switcher Standard Proxy Switcher Standard provides proxy settings management solution and anonymous surfing capabilities. This includes flexible proxy server list management, proxy server tester and anonymous proxy server list down-loader.Features includes try proxy manager
Supported Operating Systems:
Windows 2000 |
Windows 2003 |
Windows 7 |
Windows 8 |
Windows Server 2008 |
Windows Vista |
Windows XP |
Comments on Stop Installation Tool:
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10