|
||||||
|
||
|
Home > Log keyboard software |
Related keywords: keyboard, Keyboard, midi keyboard, keyboard monitor, keyboard macro, keyboard utility, keyboard logger, virtual keyboard, keyboard spy, keyboard macros |
|
|
111. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
112. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
All data collected through the monitoring are saved to an encrypted log file. The program runs completely hidden in the background so you can monitor whenever you want. Stealth technology ensures that PC Activity Monitor Net™ is completely hidden from everyone except you. Only you can launch or delete PC Activity Monitor Net™. This lets you secretly monitor anything viewed on your | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
113. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel. PC Acme Standard supports | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
114. | PestPatrol 3.0 (safersite.com) | ||
areas * Removes trojans and spyware installed in the registry * Logs all activities to a central database PestPatrol can be set to scan any or all files, including archive files, on any mapped drive or by selected folder. The easy to use interface and extensive on-line pest encyclopedia and help | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
115. | ProBot 2.5.0 (nethunter.cc) | ||
and logging. ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. ProBot is easy to integrate into network environment. Engine includes an embedded Web server called Remote Web Console, which allows to | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
116. | ProBot SE 2.3.0 (nethunter.cc) | ||
watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer owner for the exact reconstruction of the computer usage. ProBot SE is very suitable for monitoring Internet activity because it enables you view all of the Web site URLs visited by a subject. ProBot SE is | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
117. | ProtectZ 1.60 (actualsecurity.com) | ||
all EXE or DLL files from rewriting. You may make all file's attributes unmodified. ProtectZ protects files and folders on local hard disk drive, network drive, character device and gives you possibility to view unauthorized access which is stored in the log file. ProtectZ enables you to permit access to protected files and folders by specified processes | |||
Updated: 8, 2004 | Rating: 723 | Author: Konstantin Evseenko | Size: 574 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
118. | Qubit Master 2.1 (quantum-intelligence.com) | ||
take you to the Hotmail site, enter the user name and password and log in. Possible uses are endless. The only limitation is your imagination... Qubit Master allows users to perform any repetitive computer task by giving out a single voice command, menu selection or key combination. Makes you more efficient and more productive! Do emails, visit Web pages, launch programs, and lots | |||
Updated: 9, 2005 | Rating: 0 | Author: Branislav Vasilijevic | Size: 6571 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
119. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
RBackup Remote Backup is the premier Online Backup and Restore system containing a full-featured Client and a powerful online backup Server. Designed for use by commercial Remote Backup services. Easily branded. RBackup replaces troublesome tape drives and forgetful computer users, operating unattended and | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
120. | RebootEx 2.11 (ashkon.com) | ||
ability to reboot, shutdown, shutdown & power off the computer, log off the current user, shutdown remote computer and schedule logon after reboot. A number of additional command line options makes it a highly scriptable efficient and secure tool. RebootEx is a system utility for Windows NT/2000/XP operating systems that allows to automatically shutdown, shutdown at a specific time | |||
Updated: 9, 2005 | Rating: 134 | Author: Ashkon Software | Size: 477 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
|
Home > Log keyboard software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|