|
||||||
|
||
|
Home > Log password software |
Related keywords: password, Password, password manager, password protection, password recovery, password generator, password keeper, lost password, password protect, password protected |
|
|
111. | DUST 1.2 (WayBeyondUK.com) | ||
does not involve going to the Windows XP welcome screen and with password saving and automatic logon makes it very quick and easy to switch between sessions. Ideal for multiple sessions controlled by a single person or for a busy home PC shared by the whole family. You can also disconnect to the welcome screen in order to log on as a new user, this is how you create the logged | |||
Updated: 2, 2006 | Rating: 0 | Author: Nicholas Russell | Size: 1436 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
112. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
all windows, applications, file changes etc. User-activity logs are periodically transferred, uploaded or emailed to you for analysis + more! Other features include password-protection, peer-to-peer network support, remote monitoring updates and a comprehensive user-activity log viewer. Monitor the activities of local and remote computer users. e-Surveiller allows | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
113. | Evidence Destructor 2.14 (emailarms.com) | ||
paying your bills online and logging into the websites with passwords, your computer is recording most of the steps you take. For example the history of all the web sites you visited, all the pictures you downloaded, all the pages and text you see, are being recorded by the system. It is done so when you log in to the web site later, you don't have to type a whole name and | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
114. | Ghost Keylogger 3.80 (keylogger.net) | ||
surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
115. | Golden Eye 4.11 (monitoring-spy-software.com) | ||
Have you ever wondered what your children doing on the Internet? Who they talk to and what pictures they see? Are you suspecting your husband or wife is cheating on you? who they email ? what movies they see? who they chat with ? Do you want to know what your employees are doing during work hours? Golden | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin | Size: 1490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
116. | GRBackPro - Professional Backup 6.0.22 (grsoftware.net) | ||
You can compress your files using the standard zip format and also password protect them. Fully customizable: include, exclude files, skip directories. An integrated restore facility allows you to quickly maintain two or more PC aligned. An integrated scheduler let you start your backup automatically | |||
Updated: 2, 2006 | Rating: 0 | Author: Roberto Grassi | Size: 1500 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
117. | HDD Temperature 1.3 (hddtemperature.com) | ||
users who have only single hard-drive and is totally free. Using S.M.A.R.T. technology included in all modern HDDs, HDD Temperature checks and monitors the temperature of your hard drives; you can also set the maximum value of drive temperature so that you will be warned should this temperature be exceeded. S.M.A.R.T. stands for "Self-Monitoring, Analysis and Reporting | |||
Updated: 3, 2005 | Rating: 48 | Author: Yuri Alexandrov | Size: 1016 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
118. | IIPwr Package 2.00 (iipwr.com) | ||
own but currently don't have direct access to? With IIPwr's KeySpy this is exactly what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records (logs) activities (such | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
119. | KeyRobot 5.0 (keyrobot.com) | ||
Helper: Logins? Ids? Passwords? Account numbers? Forget about 'em! The KeyRobot remembers it all for you. If you're asked to fill in a login name and password, the KeyRobot pops up and asks if you want it remembered. After that, the KeyRobot will automatically log you in every time you come to that page. NO typing! No remembering! And no more lost passwords | |||
Updated: 3, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 2300 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
120. | Locked! 4.7.8 (jcmatt.com) | ||
securely protects your computer against access by others. It's proprietary multi-level structure integrates deeply within the Windows architecture, working with and controlling access until you unlock it with a password. Entries from the keyboard and mouse are blocked. Resetting or powering off the computer will not unlock it. Features include Boot Lock, StartUp Lock | |||
Updated: 2, 2006 | Rating: 0 | Author: James Matt | Size: 2980 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Log password software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|