|
||||||
|
||
|
Home > Security log software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
91. | WinForcer 3 (winforcer.com) | ||
are implemented immediately without the need to restart Winforcer or log off. You can WinForce any application or Folder through WinForcer Administrators can suspend WinForcer to regain access to the users desktop without having to log out. You can configure multiple machines by using distribution configuration files. So you do not need to individually set up each machines | |||
Updated: 9, 2005 | Rating: 431 | Author: Richard Smee | Size: 2195 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
92. | WinGuardian 3.0 (webroot.com) | ||
a computer. WinGuardian can keep track of what programs a user runs, log any text that is typed into a program, log all web sites that are visited, and even capture screenshots at various specified intervals. Logs can be reviewed to detect if a user is running inappropriate programs such | |||
Updated: 9, 2005 | Rating: 71 | Author: Steve Thomas | Size: 1561 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
93. | SpyAOL 1.01 (spytechonline.com) | ||
SpyAOL is the award winning monitoring solution that allows you to monitor all activities of all AOL users on your PC. SpyAOL is uniquely developed exclusively for America Online users for the best monitoring results available. SpyAOL can record all AOL E-Mails, Instant Messages, Chat conversations, website | |||
Updated: 9, 2005 | Rating: 0 | Author: Nathan Polencheck | Size: 1106 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
94. | SpyMyPC 2.0 (benutec.com) | ||
doing on your own computer while you are not at home (or office). Logs all keystrokes, applications, windows, websites, internet connections, passwords, chat conversations. Install SpyMyPC, set options "Run in Invisible Mode", so that it makes itself invisible to anyone. Shortcut keys helps you fast access to Log View and Unhide Mode. Typical uses for SpyMyPC : Monitor Your | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
95. | SpyPC 7.0 (xelerate.biz) | ||
kids or an intruder really accesses on your PC. Spy PC allows you to Log all keystrokes in chat rooms, create secret screenshots and see (and restrict) what applications are used. WATCH INTRUDERS, because you never know who has accessed your PC while you were out of the office or away from home | |||
Updated: 9, 2005 | Rating: 0 | Author: Hans Fremuth | Size: 3678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
96. | TK8 Safe 2.5 (tk8.com) | ||
Searching, sorting and finding passwords has never been easier. Log in to password protected web pages automatically! Just select "Autofill" from the menu or press a hot key when you are at the login prompt. The program will locate the required entry automatically and fills the login prompt for you. If needed, you can also launch web pages related with password entries and use | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
97. | Ultimate Spy Personal 1.5 (raheel.yi.org) | ||
Auto starts with windows. Not even visible in Run registry. Includes Log Analyser to view log. Home Edition is also available which is best suited for parents to monitor whom their children talking to & what they're talking about. Home Edition is a great tool to ensure safety of your children, while they surf around & chat with strangers! Lite & Pro Editions of the same | |||
Updated: 9, 2005 | Rating: 0 | Author: Raheel Hameed | Size: 1156 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
98. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
a completed inventory card for each computer/client. Upon initial log-in, users are requested to provide the system with the following information: Your Name, Room or department, Computer Brand, ID-Number. Vidamic Netlog then reports any changes made on each client log-in to the inventory | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
99. | Remote Access 1.0 (nawab.1cis.com) | ||
many advanced features like 128-bit encryption , IP Filtering , NT Security , Full control , file transfers , telnetting , remote shutdown , remote log-in/;log-off etc..and very cheap. It is a very essential tool for remote administrator working on remote locatons and also providing | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahamed Abdulla | Size: 2558 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
100. | SafeLogon 2.0 (gemiscorp.com) | ||
the days of the week and the time of the day the user is allowed to log on and use the system. - Define temporary users who expire after a number of logins and/or when the system reaches a date limit. - Keep a log or track of all the users making use of the system, including the failed logon | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 2291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Security log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|