|
||||||
|
||
|
Home > Log on software |
|
|
1. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
2. | My Diary 4.0 (aidsoft.com) | ||
is the perfect computer program for anyone who want's a diary. This program lets you record your most privatethoughts, the things you did on any day, or anything else you want to record. This program features: Unlimited number ofentries and more. This is the perfect computer program for anyone who want's a diary. This program lets you record your most | |||
Updated: 3, 2006 | Rating: 0 | Author: Robert W. Benjamin | Size: 852 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
3. | Alpha Journal 3.5.1.0 (alpharealms.com) | ||
Journal lets anyone keep a private journal, diary or log for personal or business use, but that's not all... Entries are stored in an encrypted file with optional password protection and can contain formatted text, pictures, sounds and even other documents. Entries can be added, deleted, edited, browsed by day, month, year or entry date, searched, printed, imported, exported | |||
Updated: 3, 2006 | Rating: 81 | Author: Alpha Realms | Size: 2760 kb | Shareware Go to category: Home & Hobby > Personal Interest Similar programs | |||
4. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
5. | ESBCalc Pro 5.3.1 (esbconsult.com) | ||
User Interface. The calculator can have "Prefix Functions" turned on so that when calculating log (25), you can enter log 25 rather than the traditional 25 log. The Calculator also has an expression editor that allows the data that has been entered can be then edited and recalculated. Precedence can be turned off so that 5 + 2 * 3 = 21 rather than 11 | |||
Updated: 3, 2006 | Rating: 0 | Author: Glenn Crouch | Size: 1209 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
6. | 007 Spy Software 3.86 (e-spy-software.com) | ||
track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just like a surveillance camera directly point at the computer monitor. Features | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
7. | Serv-U 6.2.0.1 (Serv-U.com) | ||
the FTP protocol to share files across the Internet. Serv-U is not only 100% compliant with the current FTP standard, but also includes numerous features unique to Serv-U that make it a perfect file sharing solution for virtually everyone. Regardless of the purpose behind your FTP server, everyone | |||
Updated: 3, 2006 | Rating: 871 | Author: Mark Peterson | Size: 2442 kb | Shareware Go to category: Servers > FTP Servers Similar programs | |||
8. | File Substring Replacement Utility 10.1 (gammadyne.com) | ||
It was designed specifically for computer programmers working on large projects with many source code files, however any type of file can be used, including HTML. Search and replace operations can also be performed on filenames (mass renaming). A detailed log is kept of every substring that is found and replaced. Case-insensitive, whole-word, wildcards, and command | |||
Updated: 3, 2006 | Rating: 0 | Author: Greg Wittmeyer | Size: 2335 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
9. | PowrClik Suite 2.7.4.104 (genntt.webs.com.ua) | ||
Main functions: put computer to standby or hibernation and wake up, log off Windows session, restart computer, power off computer. Additional functions: run screen saver, turn off monitor, lock computer, hang up modem connection, run Task Scheduler, run file, play sound on alarm, measure performance. Preventive functions: disable screen saver, prevent suspend mode activation | |||
Updated: 3, 2006 | Rating: 1651 | Author: Genntt Productions | Size: 315 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
10. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Log on software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|