VPNKS VPN Kill Switch 1.1 Details

Download

Freeware 426 KB


Publisher Description

Window 10 CompatibleVPNKS - VPN Kill Switch is a FREE powerful standalone, fast Windows desktop app running in the background, safeguarding and shielding your online security against unexpected VPN connection dropouts by terminating all defined programs and/or block all inbound and outbound connections automatically. VPNKS comes with 4 different integrated Kill Switches to choose from that will protect you from VPN connection failure, risking to expose your internet activity.

Download and use it now: VPNKS VPN Kill Switch

Related Programs

Auto Kill Any Process

Auto Kill Any Process or A.K.A.P for short, is a very useful utility, to kill Multiple-Sets of different processes at once, by simply launching the program. It can also automatically monitor and kill processes at user specified intervals. These features...


Virtual Ethernet Switch

Virtual Ethernet Switch makes it easy as never before to connect devices, computers, and network segments into a network. It eliminates the hassle of carrying an extra hardware and searching for power outlets when a single laptop can be instantly...


@Kill

This freeware utility for Windows 95, 98, ME, 2000, XP, 2003, Vista, 7, 2008, 8, 2012 Server, 10, allows you to list the opened windows (applications) on your Windows machine and to kill some of them by specifing their title....


Network Security Task Manager

Network Security Task Manager securely protects Windows networks from sophisticated malware not detected by traditional security solutions. Today malware is diverse and numerous. Thousands of potential spyware, trackware, Trojans, keyloggers and spybots endanger the safety of your private and business...


Private exe Protector

Professional licensing, anti-tampering and software examination system. PEP works with traditional methods, such as file compression, code fragment encryption, metamorphic loading, protection from debugging and file tampering , and features new innovative techniques like data protection with stolen resources technique....


Screenshot


Details

Keywords