Sentry

Koingo Digital Sentry 1.3.9  Software

Posted by Dizel_ at Dec. 14, 2015
Koingo Digital Sentry 1.3.9

Koingo Digital Sentry 1.3.9 | MacOSX | 16 MB

Digital Sentry monitors your system for specific events, and then can perform a vast array of unique actions in response. Use it to automatically cleanse internet history when closing a browser, automate redundant computer tasks, perform covert surveillance, or even protect your sensitive data during unauthorized access or theft!

Digital Sentry 1.0.9 MacOSX  Software

Posted by bityan at Aug. 25, 2009
Digital Sentry 1.0.9 MacOSX

Digital Sentry 1.0.9 MacOSX | 10,6 MB

Use Digital Sentry to automate certain redundant computer tasks, perform covert surveillance, or even protect your sensitive data during unauthorized access or theft!Watch for such system events as waking from sleep, program launches, closes, or switches, file modifications, incorrect password attempts, mouse and keyboard input, and many more.

Where Stands a Winged Sentry (Handheld Classics)  eBooks & eLearning

Posted by sasha82 at May 8, 2021
Where Stands a Winged Sentry (Handheld Classics)

Where Stands a Winged Sentry (Handheld Classics) by Margaret Kennedy
2021 | ISBN: 1912766388 | English | 280 pages | EPUB | 0.5 MB

The Last Sentry: The True Story that Inspired The Hunt for Red October  eBooks & eLearning

Posted by First1 at May 21, 2018
The Last Sentry: The True Story that Inspired The Hunt for Red October

The Last Sentry: The True Story that Inspired The Hunt for Red October by Gregory D. Young, Nate Braden
English | October 15th, 2013 | ISBN: 1591149924 | 284 Pages | EPUB | 2.48 MB

Providing inspiration for Tom Clancy's The Hunt for Red October, the 1975 mutiny aboard the Soviet destroyer Storozhevoy (translated Sentry) aimed at nothing less than the overthrow of Leonid Brezhnev and the Soviet government. Valery Sablin, a brilliant young political officer, seized control of the ship by convincing half the officers and all of the sailors to sail to Leningrad, where they would launch a new Russian Revolution.

Digital Sentry 1.4.2  Software

Posted by tnt-reloaded at May 25, 2018
Digital Sentry 1.4.2

Digital Sentry 1.4.2 | macOS | 26 mb

Digital Sentry monitors your system for specific events, and then can perform a vast array of unique actions in response. Use it to automatically cleanse Internet history when closing a browser, automate redundant computer tasks, perform covert surveillance, or even protect your sensitive data during unauthorized access or theft!

Sentry 003 2018 Digital Zone  Comics

Posted by Kochet at Aug. 23, 2018
Sentry 003 2018 Digital Zone

Sentry 003 2018 Digital Zone
English | CBR | 37.1 MB

Sentry 003 (2018) (Digital) (Zone-Empire  Comics

Posted by Kochet at Aug. 23, 2018
Sentry 003 (2018) (Digital) (Zone-Empire

Sentry 003 (2018) (Digital) (Zone-Empire
English | CBR | 37.1 MB

Sentry PC 1.70.6  Software

Posted by Cole at Dec. 23, 2006
Sentry PC 1.70.6


Sentry PC 1.70.6

SentryPC enables you to control, restrict and monitor access and usage of your PC. You can control how long and when users are allowed to use the computer, prevent the use of specific programs, block access to certain websites, restrict access to Windows functions like the Control Panel and more.

SentryPC can also block chat activities, and intercept the user if specific keywords (of your choice) are typed in an email, URL, document or other input area. In addition to access control, the program can also record all activities, including keystrokes, chats and more for complete activity monitoring.

SentryPC offers a complete solution for any type of PC access control, ranging from basic time management, to complete surveillance and child proofing of your PC.


Size:
2.8 Mb

Sentry 004 2018 Digital Zone  Comics

Posted by Kochet at Sept. 28, 2018
Sentry 004 2018 Digital Zone

Sentry 004 2018 Digital Zone
English | CBR | 44.5 MB

Digital Sentry 1.1.2 MacOSX  Software

Posted by bityan at Oct. 29, 2009
Digital Sentry 1.1.2 MacOSX

Digital Sentry 1.1.2 MacOSX | 10,9 MB

Use Digital Sentry to automate certain redundant computer tasks, perform covert surveillance, or even protect your sensitive data during unauthorized access or theft!Watch for such system events as waking from sleep, program launches, closes, or switches, file modifications, incorrect password attempts, mouse and keyboard input, and many more.