|
||||||
|
||
|
Home > Session log software |
Related keywords: session, Session server, User session information, session variables, Session, browsing session manager, automated telnet session, session list |
|
|
91. | Snip-Its 1.00 (pcshareware.com) | ||
to store notes, and create the outline to your literary work. It's ideal for writers wanting to gather facts, bibliographical entries, notes quotations and even first drafts. If you are a software support technician, you can use Snip-Its to create a "Frequently Asked Questions" database of answers. Here are screen snapshots of a few more examples. Snip-Its allows you to store | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Kapusta | Size: 1083 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
92. | TK8 Safe 2.5 (tk8.com) | ||
Searching, sorting and finding passwords has never been easier. Log in to password protected web pages automatically! Just select "Autofill" from the menu or press a hot key when you are at the login prompt. The program will locate the required entry automatically and fills the login prompt for you. If needed, you can also launch web pages related with password entries and use | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
93. | TrafMeter 6.4 (lastbit.com) | ||
You can use it to count useful traffic of your computer (it's free!) or use to build the traffic accounting system for all PCs in your office LAN. It makes easy to count custom IP packets and troubleshooting problems saving your efforts as a network administrator. In TrafMeter, you can set unlimited number of filters for captured traffic, defining network packets which are used | |||
Updated: 2, 2006 | Rating: 16 | Author: Alexey Kazakovsky | Size: 2805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
94. | Transparent Screen Lock PRO for WinNT/2000/XP/2003 4.50 (e-motional.com) | ||
prevent regular users from disabling or tampering with the program. Log file tracks failed logon attempts, and can initiate shutdown/logoff. Save log file locally, to network or to Event Log. Use quick-launch icon to run program immediately, run at a preset time interval or run as | |||
Updated: 2, 2006 | Rating: 16 | Author: Sandra Buckingham | Size: 992 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
95. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
96. | WatchDog 8.4 (sarna.net) | ||
rooms and emails. Record what they type and take screen shots of the session. Spy on what they're doing from wherever you are. WatchDog limits, protects and monitors what your users do on the computer. Limit time spent on the computer, and restrict what they can do. Block websites. Monitor applications, chatrooms and emails. Record what they type and take screen | |||
Updated: 9, 2005 | Rating: 613 | Author: Watchdog Development | Size: 7073 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
97. | WDumpEvt 2.2 (eventlog.com) | ||
it easy to view and manage all the informations from Windows NT/2000 logs: Ask for system, security, application log or file information. View, print or dump the list of events, user, failure or ras sessions, or print jobs. Dump the data to a file in ASCII-delimited, CSV or html format. You can study the log from any remote computer by browsing a tree who | |||
Updated: 9, 2005 | Rating: 0 | Author: Isabelle Vollant | Size: 395 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
98. | Webm8 5.00 (winm8.com) | ||
username and password ready to paste in. With a single click on it's Auto-Insert button WebM8 will fill the log-in form, click the submit button and minimize out of the way. If you have log in screens that are more complicated than just Username and password - No Problem - WebM8 can set | |||
Updated: 9, 2005 | Rating: 0 | Author: John Turnbull | Size: 1766 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
99. | WIDO Logbook 1.3 (home.t-online.de) | ||
and logoffs of the users (and other accounts), and stores it in a log file, in brief 'logbook' mentioned. So that all logins and logoffs will be registered, the LogbookService must not be stopped. LogbookReports.exe is a 'normal' Windows program and is to start from the start menu. LogbookReports.exe evaluates the 'logbook' led by the LogbookService and generates different | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 1519 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
100. | Winvestigator 2.4 (tropsoft.com) | ||
and runs undetectable in Windows capturing keystrokes, URL's, mouse-clicks, and screen shots to an encrypted log file. Winvestigator can be set to email the log for remote viewing. Winvestigator's settings are fully customizable. Each Settings section has mouse-over help that displays a quick explanation at the top of the screen. A web style interface | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 795 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > Session log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|