|
||||||
|
||
|
Home > Log password software |
Related keywords: password, Password, password manager, password protection, password recovery, password generator, password keeper, lost password, password protect, password protected |
|
|
101. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
computer activities and applications, including keyboard strokes, passwords, incoming and outgoing chat conversations, emails, and visited websites. Features which make it unique are its powerful keyboard logger - so powerful, it even logs the keystrokes entered during Windows 2000/XP login. And ActMon has a unique "kernel-level" file protection: Files are not just hidden | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
102. | Advanced Keylogger 1.7 (eltima.com) | ||
every keystroke to encrypted user-friendly easy-to-understand logs. Logs can also be automatically sent to any number of specified e-mails. Advanced Keylogger also monitors the internet activity by logging all web-pages the user visits. Advanced Keylogger keeps track of everything happening on the screen invisibly screenshotting what is on, also being capable of monitoring | |||
Updated: 9, 2005 | Rating: 242 | Author: SoftInfinity | Size: 1146 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
103. | Agent Password 1.8 (agentpassword.com) | ||
Password is your trusted password informer. The program is intended for automatic saving of all logins and passwords entered. It can be used not only as password keeping software but as a password spy, too. The manufacturer is not responsible for any inappropriate use of the program. We simply provide top notch, high quality software applications | |||
Updated: 8, 2004 | Rating: 251 | Author: Pavel Mikhailov | Size: 902 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
104. | AIM Keys 3.10.9522 (aimsoft.com) | ||
to preview and edit macro syntax on the fly! NEW! Macro and Task log files. AIM Keys can automatically track your activities and store them for future reference. NEW! Security options. Now you may secure every facet of AIM Keys interface from macros to the entire application. Encrypt your sensitive macros such as passwords to prevent others from using or viewing them | |||
Updated: 9, 2005 | Rating: 209 | Author: Randy Smith | Size: 2799 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
105. | BlazingTools Perfect Keylogger Lite 1.15 (blazingtools.com) | ||
computer? Some applications of the keylogger: - Monitor children’s activity for parents - Monitor what programs opened and when - Recall what you wrote some time ago - Special purposes Features: - Invisible in Task Manager List - Logging texts typed in every application (including passwords and other hidden texts) - Log file is encrypted and can be protected with a | |||
Updated: 2, 2006 | Rating: 75 | Author: BlazingTools Software | Size: 172 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
106. | Bookmark, Password and Login System by M8 Software 4.30.001 (winm8.com) | ||
website loads, it shows a small window on top with your username and password ready to paste in. With a single click on it's Auto-Insert button it fills the log in form and clicks the submit button. If you have logon screens more complicated than just username and password - No | |||
Updated: 3, 2005 | Rating: 0 | Author: John Turnbull | Size: 1273 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
107. | Boss Everyware 2.85 (bosseveryware.com) | ||
Everyware keeps a log of which programs each user has run, and how much time they've spent on them. In addition, it records all of the users' keystrokes, allowing the computer owner or network administrator to answer questions about what correspondence is being created. Boss Everyware logs | |||
Updated: 2, 2006 | Rating: 16 | Author: Alexander Jmerik | Size: 3077 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
108. | CSS Quick Backup 2.21 (css-software.com) | ||
execution of the backup jobs and provides access to comprehensive log files that show all backup activity. The integrated Job Wizard is used to create backup jobs, define the execution schedule and password protect the archive files as required. Restorations are performed using the integrated | |||
Updated: 3, 2005 | Rating: 0 | Author: Kevin Whynot | Size: 4809 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
109. | D_back 1.60.3 (backupforall.com) | ||
of all startups, errors and warning messages are registered in text log files. In addition exists possibility to notify user by e-mail about starting/ending, errors or warnings of each backup job. Reliable data-backup tool for any computer running Windows. Implements various types of backups in major | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
110. | Desktop Scout 4.0 (globalpatrol.net) | ||
which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop, transfer files, start and stop | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Log password software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|