|
||||||
|
||
|
Home > Security log software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
91. | Asmw PC-Optimizer pro 7.6 (asmwsoft.com) | ||
to Speed up your Internet connection by up to 300%; Scan Drive(S) For zero size (empty) folders; automatic memory recovery tool; Track and report on changes made to your Folders when installing programs; Powerful disk catalog; website address organizer; address book organizer; view and remove fonts; Securely encrypt decrypt files; One-step PC Maintenance Wizard; Schedule system | |||
Updated: 2, 2006 | Rating: 264 | Author: Asmw Soft Systems | Size: 6400 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
92. | Auto ShutDown XP Professional with Auto Login 2003 (gillit.com) | ||
time you use it. Lots of other functions and features such as Security, Quick Shutdown and Auto Login. The most advanced Auto ShutDown application on the market. Functions include Schedules, Conditional shutdown, Security, Prevent PC Restarts, Quick Shutdown, Remote systems shutdown, Auto Login, user guide and lots | |||
Updated: 9, 2005 | Rating: 160 | Author: R Gill | Size: 1659 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
93. | BatteryMon 2.0 1006 (passmark.com) | ||
current capacity, bias settings, device names and serial numbers. A log file is maintained of the battery charge level and other statistics for later analysis and the software comes with a comprehensive help file. Monitor the performance of laptop computer batteries and uninterruptible power supplies | |||
Updated: 9, 2005 | Rating: 1082 | Author: David Wren | Size: 913 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
94. | ChatBlocker 2.6 (exploreanywhere.net) | ||
to ensure that they do NOT take place. When coupled with ChatBlocker's powerful security features, it's powerful stealth mode feature, and remote log viewing capabilities (via e-mail) - it makes ChatBlocker must have for any parent, employer, or anyone else looking to moderate | |||
Updated: 2, 2006 | Rating: 0 | Author: Bryan Hammond | Size: 1555 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
95. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
information and protect yourself against identity theft and data security breaches. ComputerSafe safeguards a virtually unlimited number of files. Its unique combination of file protection, event recording, and notification messaging guards critical programs and data to protect against loss, corruption and unwanted access. File and Folder Locking, Hiding and/or File Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
96. | Comm-Logger 1.0 (wcscnet.com) | ||
is a very easy to use serial communication data logger. It can log data directly from the serial port to a standard file. Up to 32 ports may be logged concurrently. Comm-Logger supports logging serial communication data from one or more serial ports to one or more files. Comm-Logger is ideal for logging serial data from applications like PBXes, security systems, or any | |||
Updated: 9, 2005 | Rating: 132 | Author: Egberto Willies | Size: 5303 kb | Shareware Go to category: Communications > Other Comms Tools Similar programs | |||
97. | Data Destroyer 1.5 (braintwist-studios.com) | ||
Each application you use generates its own history data, access logs, temporary data files, and each file contains time and date stamps. To ensure corporate and personal data security, this information, along with any Recycle Bin activity, all of which constitutes an electronic data trail, should be securely deleted so to avoid corporate or personal information leakage. But | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
98. | Desktop Scout 4.0 (globalpatrol.net) | ||
which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop, transfer files, start and stop | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
99. | Directory Watch 4.0 (lohja-associates.com) | ||
You use the Directory Watch application to monitor a file system and react when a number of files in the directories exceed your threshold. This makes it possible for you to quickly and easily launch business processes. For example, you have a mail, fax, print, or web server that accepts request in forms | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Lohja | Size: 731 kb | Demo Go to category: System Utilities > Other Similar programs | |||
100. | DirSync Directory Synchronizer 3.0.4 (archersoft.com) | ||
e-mail reporting, filtering, unicode filename, validation, transfer security attributes, transfer folder creation/modification time, keep deletion files, file revisioning, pre/post-sync process, error handling, path variables and detailed log, etc. The synchronization is based on the policy specified by user to copy those files which are different between source and target | |||
Updated: 2, 2006 | Rating: 0 | Author: Frank Archer | Size: 2851 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Security log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|