Does this fit the bill? click here
I expect a user could rename the executable to get round it, but it depends on the security level of the machine in the first place (and the users level of ability of course).
This thread is now locked and can not be replied to.
Nintendo Switch review: Hands-on with the intuitive modular console and its disappointing games…
1995-2015: How technology has changed the world in 20 years
New Corel ParticleShop plugin now available: 11 new brushes & 6 new brush packs
Apple AirPods review: Apple's beautiful new Bluetooth headphones bring true intelligence to…
Synology invites you to visit them at Insomnia on 26th – 29th August. Book your tickets now and visit Synology.