|
||||||
|
||
|
Home > Log analysis software |
|
|
1. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
2. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
3. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
4. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
5. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
6. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
7. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
8. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
9. | IP2Location ActiveX/COM DLL 2006.03 (ip2location.com) | ||
and abuse of service; 5. Reduce credit card fraud; 6. Web log stats and analysis; 7. Auto-selection of country on forms; 8. Filter access from countries you do not do business with; 9. Geo-targeting for increased sales and click-throughs. Demo version is fully functional except with a 5-second delay. IP2Location(tm) is an active server component that translates | |||
Updated: 2, 2006 | Rating: 82 | Author: MK Wong | Size: 250 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
10. | Detective 2.1e (omniquad.com) | ||
is Omniquad's solution for organizations and individuals who are concerned about how and for what their computer systems were used. It examines computer activity BACKWARDS, detects illicit content and then displays a detailed log for inspection describing what illicit material was stored, when and where. In addition to the existing extensive vocabulary set, user input is | |||
Updated: 2, 2006 | Rating: 16 | Author: Daniel Sobstel | Size: 1239 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Log analysis software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|