Thank you for using Deskman, a security administration solution. Deskman resides on your system and it is accessible on your local network. Please, read this documentation to learn how Deskman works.


In this guide you will find detailed information about Deskman, how it works and how to set it up, among others.

Deskman facilitates the protection of multiple workstations by integrating client and server. Install Deskman on as many systems as you need and all of them will share the same restrictions in no time.

Deskman is really easy to install and use. There are no special requirements, no dependencies and no restrictive hardware limitations, except for a basic list of minimum requirements as seen below.

Check the troubleshooting and how to... sections, in case you need help, or contact us for assistance.

The latest Deskman version is always available on our website. The installation program includes everything you need. Check the system and software requirements below.

Download Deskman


The requirements below list the minimal configuration. Any better hardware or newer software may be used. If you experience problems nonetheless, please do not hesitate to contact us.

  • Windows 7
  • Windows 8.1
  • Windows 10
  • 70MB available hard disk space
Web Browser
  • Firefox
  • Chrome
  • Microsoft Edge
  • Internet Explorer 11


To install Deskman, execute deskmansetup.exe and follow the directions that appear on screen. If an old version is found, it will be automatically upgraded. Old settings will be preserved when possible.

The setup program accepts optional command line parameters for fast deployment and unattended installation. Parameters can be used alone, or in conjunction.

/silent, /verysilent Instructs Setup to be silent or very silent. When Setup is silent the wizard and the background window are not displayed but the installation progress window is. When a setup is very silent the installation progress window is not displayed. Silent setups do not open Deskman when finished.
/dir="x:\dirname" Overrides the default installation directory (C:\Program Files\Anfibia Deskman). A fully qualified pathname must be specified.
/noicons The setup program does not create Deskman icons on desktop or Start Menu.
/syncon The setup program activates sync automatically.
/import The setup program imports a local backup file. The backup file must be named "deskmanbackup.cfg" and must be located in the same directory. To create a backup file enter http://localhost:2288/deskman/


To upgrade Deskman, simply install the new version without uninstalling your old copy. If an old version is found, it will be automatically upgraded, when possible.

Make sure you are ready, before upgrading:

  • Export your restrictions to have backup
  • Sync will stop working until all installations use the same version
  • Restrictions and settings should be preserved, but it depends on how old is your old version
  • A new license may be required


To uninstall Deskman, open the Control Panel and click Uninstall a program. Select Deskman and double-click on it to uninstall.

Before uninstallation, make sure all restrictions are completely disabled — go to the restrictions page and click Undo to remove restrictions.


After the installation is over, Deskman will be running on your system, ready to work. Deskman is web-based, which means you need to open it on your web browser. To open Deskman in the same computer where it's installed, point your browser to http://localhost:2288 or

Deskman requires a web browser for configuration, but it is not in the cloud. Deskman must be manually installed on every system.

Get Started

A web browser is required to configure Deskman, but there are no special network requirements. Deskman can be used locally like any other application.

There are many restrictions available: some of them override others in the same category, some may be useful for you, and some may not. Combine restrictions to achieve your goals. In case of doubt, go to the restrictions page and click on the Recommended preset and then review selected restrictions.

  • Open Deskman by visiting http://localhost:2288
  • Protect Deskman with username and password, by visiting the settings page
  • Browse restrictions and decide which ones you need, select them and press Apply to activate them
  • Remove restrictions from the restrictions page, by clicking Undo
  • Visit the dashboard to start maintenance, in case you want to pause restrictions temporarily
  • In case of need, remember you can open Deskman remotely by using your system's local IP address or hostname, like


You are permitted to try this software on your system (for 30 days) without any cost or obligation. Payment is required if you find this software to be useful or if you wish to continue using this software beyond the evaluation (trial) period. This product is provided at no charge to the user for evaluation. The purpose of an evaluation version is to provide computer users with quality software on a try before you buy basis, however payment is still required for continued use of the product.

This allows you to try out all the features in Deskman to confirm that they work to your satisfaction before purchasing a license of use.

The evaluation version is the same as the full version of the product: no nags, no disabled features. However, after the 30-day trial period expires, maintenance will be automatically started until the copy is registered.


Visit the settings page to register your copy. Follow the instructions included in your license email.

Licenses include a 30-day support contract, at least. Upon expiration, licenses keep working, but support entitlement expires. For more information, please visit our website.

Contact us Buy Deskman

Using Deskman

A web browser is required to configure Deskman — Firefox, Chrome, Microsoft Edge and Internet Explorer 11 are officially supported.


The dashboard provides you with a general view of the security in place, users and system information. Visit the control center for network/sync details.


From time to time, you may need to remove restrictions temporarily in order to perform maintenance tasks on the PC. Once started, maintenance mode will remain active for a limited period of time, until manually stopped, or until the system is restarted.

  • Start maintenance by clicking Start in the maintenance section
  • Stop maintenance by clicking Stop in the maintenance section
  • Change maintenance time in Settings
  • Applying or syncing restrictions also disables maintenance
Security Indicators

There are 5 security indicators, each one corresponding to a restriction section: Desktop, Start Menu, System, Apps, Web and Startup. A blue color indicates that at least one restriction is enabled on a particular section. Check the restrictions page to view active restrictions in detail.


Click to perform one of the following tasks:

  • Log off: close all active user sessions
  • Sleep: put the PC to sleep
  • Hibernate: put the PC in hibernation mode
  • Restart: reboot the PC
  • Shut Down: shut down Windows and turn off the PC

Logged on users will appear on the dashboard. Refresh the page if they don't. To take a picture of the user's desktop, click on . Click Download to save the screenshot. Click Recent to view the last 4 snapshots.


Restrictions are separated into different sections. Check the desired restrictions and click Apply to activate them. Click Undo to remove restrictions completely. If sync is enabled, restrictions will be synchronized with other installations. Check the control center for details.


Use presets to let Deskman auto-select restrictions, based on different security levels. Click on a preset and review selected restrictions to adapt them to your needs.


Restrictions can be exported to a file and imported back by clicking Import/Export. Note that settings are not exported, only restrictions.

Hide the desktop Hides desktop icons and disables desktop context menus.
Protect desktop files from tampering Protects desktop icons and files from tampering: they can be executed, but cannot be edited or deleted. Directories are not protected, only files.
Disable Start Menu Disables the Start Menu button and the Windows key. The Start Menu remains intact, hidden. On Windows 8.1 the Start charm (button) and charm bar are disabled, instead.
Disallow making changes to the Start Menu Protects the Start Menu from being changed by the user.
Disable search and run and Cortana Disables the ability to search and run local files from the Start Menu. On Windows 10 Cortana is disabled.
Disable access to All Programs list Hides the app list in Start menu on Windows 10 or the All Programs section in Start menu on Windows 7.
Hide the taskbar Hides the taskbar.
Hide notification area Hides the right-side area of the taskbar, where the small icons are shown, including the system clock.
Hide taskbar clock Hides the system clock in the taskbar.
Lock the taskbar Disables the ability move the taskbar around.
Disable taskbar context menu Disables the right-click menu in the taskbar.
Hide taskbar application buttons Hides buttons of running or pinned applications in the taskbar.
Hide action center and Windows 10 notifications On Windows 10, disables access to the action center and hides notifications
Disable System Keys Selected keys or combinations will be disabled. Note that disabling Ctrl-Alt-Del also disables the Alt key. Winkeys disables the Windows key and all its combinations, except Winkey+L. Disabling Ctrl-Alt-Del may require logging off.
Disable Function Keys Selected function keys will be disabled.
Disable Mouse Buttons Selected mouse buttons will be disabled. Use with caution.
Start Menu

This section enables you to build your own Start Menu. Once enabled, the original Start Menu will remain hidden, untouched.

To enable the custom Start Menu, add applications or commands. Remove them to disable it. You may need to log off after making changes to the custom Start Menu.

Click to open the tools menu. This menu includes options to add Chrome and Internet Explorer in kiosk mode, as an example, and other options to add shut down events to your Start Menu.

Commands, including full path if necessary, are accepted. Full path may be required to show the proper application icon.

Shutdown Add shut down events to your custom Start menu using the following codes:
{logoff}, {restart}, {shutdown}, {hibernate}, {sleep},{lock}
Command Name To specify a command name: add $$ to your command, followed by the caption, for example:
c:\program files\myprogram\myapp.exe $$My Command Caption
Disable access to Control Panel and Settings The Control Panel becomes inaccessible, as well as any other system settings and panels dependent from it, such as the Windows Update panel, Settings on Windows 10 and others.
Block browser settings on Firefox, Chrome and Internet Explorer Blocks access to Firefox, Chrome and Internet Explorer settings
Block administration tools: task manager, regedit, cmd, powershell, mmc Disables access to the following tools: Windows Task Manager, Regedit, Command Prompt, PowerShell, Cygwin and Microsoft Management Console.
Use safe task manager The Windows Task Manager is replaced with a very limited Task Manager, where users can only view running applications and activate some handy power actions, like log off, restart and shut down.
Use Internet Explorer in kiosk mode Enables a special Internet Explorer kiosk mode, where only a single tab is available, without navigation bars or options. In addition, this mode prevents users from closing Internet Explorer. To use IE in normal, non-restrictive, kiosk mode, ignore this restriction and run IE with the -k parameter, like: iexplore.exe -k
Disable USB drives Disables the detection of USB drives. Restarting Windows may be required.
Disable autoplay Disables the Autoplay menu that appears when a new external drive is detected.
Disable shutdown options Disables power actions that shut down the computer on Start Menu, charms bar and lock screen.
Disable fast user switching Disables the ability to switch to a different user without having to log off on Start Menu and lock screen.
Block File Explorer Disables access to File Explorer (Windows Explorer) and derivatives, such as the Control Panel and many other system configuration windows. File Explorer remains intact, but whenever users try to open it, Deskman closes it.
Disable context menu on Explorer and desktop Disables the context menu on Windows Explorer and the desktop.
Disable Explorer options Disables access to folder options on Windows Explorer
Disable main menu, search box, address bar and ribbon Disables top menus and bars on Windows Explorer, and also ribbon on Windows 8 and Windows 10
Hide Computer Hides the Computer/This PC folder on Windows Explorer
Hide Network Hides the Network folder on Windows Explorer
Disable Explorer Drives Access to selected drives will be disabled on Windows Explorer. Click All to disable access to all drives.

Use the App section to stop unwanted applications. Block applications by entering permitted executables, or folders, in the Allowed Applications section. Your executables will be allowed, plus other critical system processes. All other applications will be blocked.

Click the tools button to open the menu, with the following options:

Installed Programs By adding the following folder to the list: c:\program files, installed applications are permitted. Users will be able to run currently installed programs, Windows applications, and nothing else. New software installation will be blocked, and unknown executables as well.
Running Applications This option adds running executables to the list. Thus, users will only be able to run these executables.
Clear Removes all entries from the list.

Deskman is able to filter web browsing: access to all domains will be forbidden, except for the domains that are specifically allowed. To start blocking websites, enter domains in the Allowed Domains section, one at least. To stop blocking websites, remove all entries.

The web filter works as a proxy, blocking/allowing access to HTTP/HTTPS requests. Deskman uses the following proxy server and port: localhost:2280

The web filter works as a whitelist: entered domains will be allowed, everything else will be blocked, with exceptions to let Windows Update operate normally.

The following elements are accepted: domains and IP addresses. Wildcards are also accepted.

To remove all entries, click to open the tools menu and select Clear.


Add commands — with full path and parameters, if necessary — to be executed by Windows at startup. Startup commands are run each time a new user logs in. To remove all entries, click to open the tools menu and select Clear.

Control Center

Every installation includes its own control center from where to manage the list of available installations on the network and keep them in sync.


The control center shows available installations on the network. In order to find other installations, sync must be enabled on them, and they must be able to communicate between each other. Usually, that means being in the same network and not being blocked by antivirus or firewall. Check the troubleshooting guide for details.

Sync Group

If a sync group is entered (Settings), your installation will ignore installations in a different group. Use groups to apply different configurations, or to shield installations from unwanted sync operations.

Sync Hub

If you have multiple networks, not connected between them, you can use one installation as a nexus. Go to Settings and enter address:port in the sync hub box.

Control Center
Ready Synchronization finished successfully
Syncing Synchronization in progress. Some installations are out of sync. The system may be shut down, or inaccessible. In any case, Deskman will keep trying. It may take a few minutes to synchronize all installations.
Total Total is the number of available installations. A disparity between found installations and total installations could be due to: different version, different group, different license, license limit reached or installation unreachable, probably because of firewall.
Host Name of the remote installation
IP Address IP Address of the remote installation
Maintenance Indicates if maintenance is enabled on the remote installation
Status Sync status of the remote installation
Contacted Time and date of last contact
Sync Options
Resync Resync allows you to manually sync restrictions and settings from your installation to the rest.
Maintenance Select installations from the list and click Maintenance to start maintenance on them.
Syncing License

To register all your installations, you just need to register one of them, because licenses are also synced. The maximum number of synchronizable installations will be based on your license. A multi-copy license is required to sync.


Visit the Settings page to change important options. Click Save when finished. If sync is enabled, settings will be automatically synced with other installations.

Admin Settings
Username, password It is highly recommended to require authentication. Enter username and password to prevent unauthorized people from using Deskman.
Exclude Windows Administrators after log on Check this option to exclude Windows administrators from restrictions, except for some desktop and system policies. Activating maintenance may still be required for full, unrestricted, access.
Accept weak login passwords Check this option to remove the strong password requirement. Not recommended.
Hide user notifications Check this option to hide user notifications.
Store logs Logs are deleted after 30 days. Check this option to store copies of daily logs in csv format.
Maintenance time Enter the maximum maintenance time, in minutes.
Maintenance hotkey Click change to activate, or remove, a maintenance hotkey and follow the directions. Pressing the hotkey will start maintenance. Pressing the hotkey during maintenance will stop maintenance — after being in maintenance 1 minute, at least.
Maintenance hotkey password Enter a password to be required to start maintenance when pressing the maintenance hotkey.
Sync group Enter a group name, optionally, to sync only with installations of the same group. Recommended to protect your configuration from external, unknown or unwanted sync operations.
Sync hub Enter a sync hub address, optionally, to make Deskman sync with a remote installation. A sync hub will be useful if you have multiple installations, on different networks, allowing you to sync everything through a single address (hub). Enter address:port and make sure it is accessible externally. Note: a hub installation will no be able to start maintenance from the control center.
Brand Enter the name of your organization, optionally. Your brand will be shown on user notifications, when blocking applications or websites, and at the login screen.
Proxy server Optionally, enter address and port of a proxy server and traffic will be forwarded to this proxy after applying restrictions. Note that Deskman will only connect to this proxy server if the web filter is enabled.
Language Select a language, or leave it on Auto-detect to obtain the language from your browser.
Guest Account

Optionally, a guest account can be enabled, in case you need to allow limited access to Deskman.

Guest account Click ON to activate the guest account. Note that the guest account will be disabled until admin username and password have been set.
Username, password Enter username and password for the guest account.
Allow Check sections to be accessible from the guest account. At least one section must be checked.

Click Register to register your copy, following the instructions in your license email.


Visit the Activity page to keep track of what Deskman does: applied restrictions, blocked applications, filtered websites and plenty of other useful information. Use the search box to find specific entries.

Logged events are automatically deleted after 30 days. If you want to keep them, go to Settings and check the Store logs option. Thus, Deskman will automatically export your daily logs to CSV and keep them in the data directory.

To manually export the log, click ⇣CSV, located at the upper right corner.

How to...

Activate Restrictions

Open the restrictions page, select the restrictions you need and click Apply. Most restrictions are activated instantly, but some of them work better after logging off Windows. In case something doesn't work as expected, try logging off. Some extreme cases may require a reboot.

Remove Restrictions

Open the restrictions page, and click Undo. Most restrictions are removed instantly. In case something doesn't work as expected, try logging off Windows. Some extreme cases may require a reboot.

Export Restrictions

Go to the restrictions page and click Export, on the right side of the screen, next to the Help button. Settings are not exported or imported, only restrictions.

Import Restrictions

Go to the restrictions page and click Import, on the right side of the screen, next to the Help button. Click Apply to activate imported restrictions.


First, activate sync from the control center. Once sync is enabled on all your installations, they will appear on the control center, after a few minutes. From this point, when you apply restrictions, or save settings, on any installation, the others will receive the same restrictions and settings.

Pause Restrictions

If you need to pause restrictions, start maintenance:

  • To start maintenance on one installation, go to its dashboard and click Start in the maintenance section.
  • To start maintenance on multiple installations, go to a control center, select installations and click the Maintenance button.

Blacklist Applications

By default, the application filter allows access to your executables and folders — it's a whitelist. In case you need to block specific programs, add > before the executable, like so: >regedit.exe

Disable UNC Paths

If disabling access to drives is not enough, and you also need to disable UNC path access to folders and drives, check this desktop restriction: Disable search and run and Cortana.

Show Organization

If you enter your company name in the Brand box, in Settings, it will be used when notifications show up and at the login screen.

Export Activity Log

To export the activity log to *.csv, go to the Activity page and click ⇣CSV, located at the upper right side of the "Recent Activity" table.

Allow Guest Access

If you need to allow someone to use Deskman, but with limited permissions, go to Settings and enable the Guest Account.

Sync Different Networks

If you have multiple networks, not connected between them, use one Deskman installation as a hub. Go to Settings and enter the external address and port of your installation in the sync hub section. Firewalls and routers will need to be properly configured.


  • Forgot your password?

    Submit a support ticket and we will assist you.

  • Unable to open Deskman?

    Deskman is accessible anywhere on your network. You only need the local IP address of the computer in question and then add the Deskman port (2288). Open a web browser and enter http://ip_address:2288

  • Firewall and antivirus

    Make sure your firewall and antivirus software do not block Deskman, or put deskman.exe, deskmanbar.exe or deskmansvc.exe in sandbox/quarantine mode. In addition, the firewall must allow deskmansvc.exe and deskmanbar.exe to establish IN/OUT connections.

  • Restrictions are not applied

    Check the following:

    1. Make sure you have applied restrictions
    2. Some restrictions may require a log off or reboot
    3. If you are excluded, restrictions will not apply to you — see below.
    4. Check if you are in maintenance mode
    5. Check if your antivirus or firewall are blocking Deskman
  • Windows administrators are not excluded

    If the "Exclude Windows Administrators after log on" setting is enabled Deskman will not apply restrictions when administrators log on. However, the following desktop and system restrictions (policies) will remain applied unless maintenance is enabled and startup programs, as well:

    1. Disallow making changes to the Start Menu
    2. Disable search and run
    3. Disable access to All Programs list
    4. Lock the taskbar
    5. Disable taskbar context menu
    6. Ctrl-alt-del
    7. Disable Control Panel and Settings
    8. Use IE in kiosk mode
    9. Disable USB drives
    10. Disable autoplay
    11. Disable shutdown options
    12. Disable fast user switching
    13. Disable context menu on File Explorer and desktop
    14. Disable File Explorer options
    15. Hide This PC
    16. Hide Network
    17. Disable Explorer Drives
  • Syncing issues

    Syncing takes time at the beginning because Deskman needs to find remote installations in the first place. Once they are found, synchronization events are not immediate: a few minutes should suffice, but it depends on availability, speed and network configuration.

    To solve syncing issues turn sync OFF and ON again to reset the list.

    Check the following, in case issues persist:

    1. Sync needs to be enabled on every installation
    2. License must be synced
    3. Installing more copies than permitted by your license will create syncing issues
    4. Deskman versions need to be the same
    5. Firewall exceptions need to be in place
    6. System date and time must be correct — synchronized by an Internet time server, ideally
    7. Network proxies will probably stop sync operations
    8. Installations on a (different) sync group are ignored
  • Web filter issues

    The web filter is proxy-based, meaning web browsers request Deskman permission before accessing websites.

    Check the following:

    1. Changes are instant but some applications may need you to log off to notice changes
    2. If there's already a proxy in place, it will be disabled when Deskman's web filter is enabled
    3. To make Deskman use your own proxy, go to Settings and enter a proxy server
    4. Analyze won't work properly if multiple Deskman pages are open on the same system
    5. Analyze only works on localhost
    6. Make sure there are no proxy extensions enabled on your browser
    7. The proxy server should be set to localhost:2280 to work
  • About maintenance
    1. Maintenance stays in effect until maintenance time expires, after manually stopped or until the system is restarted
    2. Change the maintenance time in Settings
    3. Maintenance only applies to the installation in question, or to remote installations if activated from the control center
  • A browser error message is displayed when blocking websites

    This is a correct behaviour. Deskman does not tamper with HTTP/HTTPS, thus making impossible to insert messages into the browser.

  • A website is not fully displayed even though it's been allowed

    Websites tend to contact multiple domains while loading. Check the activity log for blocked domains. Remember you can use keywords and wildcards when adding domains, like *facebook* or *.facebook.*. Use Analyze to help you add domains.

  • Integrity

    Deskman automatically monitors its own components to detect tampering. If your installation fails the integrity check, some of Deskman's critical files may have been modified or corrupted. Deskman should be reinstalled and the security level increased. If there are no integrity warnings on your dashboard, everything is fine.

  • Uninstalling Deskman

    Before uninstallation, go to the restrictions page and click Undo to remove restrictions.


What information does Anfibia Software collect regarding Deskman?

Deskman is not an online service. Deskman is self-hosted software. The software is installed on your computer, and only you have access to it. As such, we do not remotely collect data of any kind: emails, passwords, credit card numbers, phone numbers, usernames, configurations, logs, IP addresses, etc.

When you purchase a Deskman license, we store name, organization, address, and email, as provided by you, the buyer -directly- or through our e-commerce partners Stripe and FastSpring. Check their Privacy Policy here and here, respectively.

When you register your copy, we store (and validate) your registration key in our server.

What is done with the information?

We may contact you using your email address to inform you of new versions or for customer support; if you wish for us to not do that, please reply and let us know.

How is my information protected?

The Deskman websites and servers use industry standard protocols to protect all information obtained including SSL encryption (secure socket layers), and hardware firewalls.

Why and how does Deskman use cookies?

A cookie is a small piece of data sent to your web browser by a server and stored on your hard drive. Many websites leave a cookie on your machine in order to identify you should you return. Cookies can not read any data from your hard drive other than what is already included in the cookie. Deskman stores a cookie on your computer so that you do not have to re-enter your username and password every time, but only if you decide to activate the Remember me option.

How is Deskman protected from remote intrusions?

The user is able to activate a login screen which asks for user and password in order to access Deskman. Passwords are not stored—hashes are, which means that the original passwords cannot be retrieved. Synchronization is disabled by default.

How is user's privacy affected?

Being a desktop security tool, Deskman provides the administrator with the ability to take desktop screenshots, log blocked applications and websites, and running processes. No other specific user information is collected.

What if I have a question or problem related to my privacy?

Please contact us at or


You must consent to this privacy policy to use Deskman.


End-user Software License Agreement

Notice to users: Carefully read the following legal agreement. Use of the software provided with this agreement (the "software") constitutes your acceptance of these terms. If you do not agree to the terms of this agreement, do not install and/or use this software. User's use of this software is conditioned upon compliance by user with the terms of this agreement.

1. License grant. Anfibia Software grants you a license to use one copy of this software on any one system for as many licenses as you purchase. "You" means the company, entity or individual whose funds are used to pay the license fee. "Use" means storing, loading, installing, executing or displaying the software. You may not modify the software or disable any licensing or control features of the software except as an intended part of the software's programming features. When you first obtain a copy of the software, you are granted an evaluation period of not more than 30 days, after which time you must pay for the software according to the terms discussed in the software's documentation, or you must remove the software from your system. This license is not transferable to any other system, or to another organization or individual. You are expected to use the software on your system and to thoroughly evaluate its usefulness and functionality before making a purchase. This "try before you buy" approach is the ultimate guarantee that the software will perform to your satisfaction; therefore, you understand and agree that there is no refund policy for any purchase of the software.

1.1 Software misuse. This software should never be installed, or used, without the PC administrator's consent. This software is designed for use when any required consents have been obtained. Anfibia Software declines all responsibility concerning any illicit usage.

2. Ownership. The software is owned and copyrighted by Anfibia Software. Your license confers no title or ownership in the software and should not be construed as a sale of any right in the software.

3. Copyright. The software is protected by European copyright laws and international treaty provisions. You acknowledge that no title to the intellectual property in the software is transferred to you. You further acknowledge that title and full ownership rights to the software will remain the exclusive property of Anfibia Software and you will not acquire any rights to the software except as expressly set forth in this license. You agree that any copies of the software will contain the same proprietary notices which appear on and in the software.

4. Reverse engineering. You agree that you will not attempt to reverse compile, modify, translate, or disassemble the software in whole or in part.

5. No other warranties. Anfibia Software does not warrant that the software is error free. Anfibia Software disclaims all other warranties with respect to the software, either express or implied, including but not limited to implied warranties of merchantability, fitness for a particular purpose and noninfringement of third party rights. Some jurisdictions do not allow the exclusion of implied warranties or limitations on how long an implied warranty may last, or the exclusion or limitation of incidental or consequential damages, so the above limitations or exclusions may not apply to you. This warranty gives you specific legal rights and you may also have other rights which vary from jurisdiction to jurisdiction.

6. Severability. In the event of invalidity of any provision of this license, the parties agree that such invalidity shall not affect the validity of the remaining portions of this license.

7. No liability for consequential damages. In no event shall Anfibia Software be liable to you for any consequential, special, incidental or indirect damages of any kind arising out of the delivery, performance or use of the software, even if Anfibia Software has been advised of the possibility of such damages. In no event will Anfibia Software's liability for any claim, whether in contract, tort or any other theory of liability, exceed the license fee paid by you, if any.

8. Governing law. This license will be governed by the European law. The united nations convention on contracts for the international sale of goods is specifically disclaimed.

9. Entire agreement. This is the entire agreement between you and Anfibia Software which supersedes any prior agreement or understanding, whether written or oral, relating to the subject matter of this license.

Deskman Copyright © 2000-2018 by Anfibia Software. All rights reserved.