Does this fit the bill? click here
I expect a user could rename the executable to get round it, but it depends on the security level of the machine in the first place (and the users level of ability of course).
Xiaomi Mi Mix 2 review
What went wrong at the Designs of the Year 2017
iPhone X news: Release date, price, new features & specs
Comment créer, modifier et réinitialiser un compte Apple ?