|
||||||
|
||
|
Home > Log in software |
|
|
131. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
realized already that leaving our computers unprotected may result in data theft which in turn may affect privacy and business operation. According to multiple studies, the majority of information theft crimes are conducted without having network access to target machine. Most of us prefer | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
132. | Active Key Logger 3.0 (winsoul.com) | ||
the program will run when windows starts, and if you enable "Run in Hide Mode" then the program will run by full stealth for others, no one will even think that Active Key Logger is running and logging any activities on the computer. By choosing hot keys that are comfortable for you, you can view log file when the program is running by stealth. Active Key Logger can also send | |||
Updated: 2, 2006 | Rating: 242 | Author: Alex Atushev | Size: 703 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
133. | Access Lock 2.83 (getfreefile.com) | ||
with an audio alert and logged to disk. The only thing is available in this mode is a pop-up password-entry dialog with an input area for the password that restores your desktop to working condition. Access Lock enables you to lock your PC by two methods. The first one hides your desktop and shows a | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
134. | Access Lock 2.83 (softheap.com) | ||
with an audio alert and logged to disk. The only thing is available in this mode is a pop-up password-entry dialog with an input area for the password that restores your desktop to working condition. Access Lock enables you to lock your PC by two methods. The first one hides your desktop and shows a | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
135. | 4Diskclean Gold 5.5 (4diskclean.com) | ||
including temporary data, old backups, duplicated files and DLL's, all files viewed in Web browser and stored in cache, cookies and the history of url's visited. and invalid Windows registry keys (see complete list below). Free disk space , fix and prevent errors in your system and speed it up with 4Diskclean Software. View charts of disk usage and disk | |||
Updated: 2, 2006 | Rating: 214 | Author: RSS Systems | Size: 1462 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
136. | 4Diskclean Gold 5.5 (4diskclean.com) | ||
including temporary data, old backups, duplicated files and DLL's, all files viewed in Web browser and stored in cache, cookies and the history of url's visited. and invalid Windows registry keys (see complete list below). Free disk space , fix and prevent errors in your system and speed it up with 4Diskclean Software. View charts of disk usage and disk | |||
Updated: 2, 2006 | Rating: 107 | Author: RSS Systems | Size: 1462 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
137. | 1st Screen Lock 6.14 (softheap.com) | ||
boot, or at the time you are leaving your PC. You can use the built-in spy utility that works in background and enables you to spy on your PC users by fixing all user moves in a log file. This is very useful, when you need to know what your children or personnel do at the time you | |||
Updated: 2, 2006 | Rating: 479 | Author: Ixis Ltd | Size: 1106 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
138. | 1 Click & Lock 2.83 (softstack.com) | ||
can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from | |||
Updated: 2, 2006 | Rating: 56 | Author: IM Soft | Size: 1338 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
139. | Capturix NETWorks 3.11.156 (capturix.com) | ||
Lookup and a worldwide WHOis client. Exploit tester and Bandwidth Log. Now It brings the Connection Watcher software. PingCheck lets you ping a list of servers and send a e-mail in case of malfunction. Now includes a Packet Sniffer for debugging operations. Capturix NETWorks is a network utility software that ables you to test and diagnose all common problems from any | |||
Updated: 2, 2006 | Rating: 258 | Author: Alexandre Simoes | Size: 3911 kb | Shareware Go to category: Network & Internet > Trace & Ping Tools Similar programs | |||
140. | WebWatchBot Website Monitoring Software 4.0 (exclamationsoft.com) | ||
Web Sites and IP Devices. Maximize availability through accurate, in-depth monitoring and alerting functionality. Analyze historical data for trends and visualize current state with real-time charting and graphs. 8 different monitoring types: Ping, HTTP, HTTPS, SMTP, POP3, FTP, Port, and DNS | |||
Updated: 2, 2006 | Rating: 42 | Author: ExclamationSoft Corporation | Size: 10679 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Log in software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|