|
||||||
|
||
|
Home > Kid protect software |
Related keywords: protect, Protect, password protect, protect files, protect folders, protect folder, protect privacy, protect file, password protect folder, exe protect |
|
|
131. | StarLogger 1.4 (willebois.nl) | ||
keystroke made on your computer on every window, even on password protected boxes. This key logger is completely undetectable and starts up whenever your computer starts up. See everything being typed: emails, messages, documents, web pages, usernames, passwords, and more. StarLogger can email its | |||
Updated: 9, 2005 | Rating: 0 | Author: Maurijn van der Does | Size: 1327 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
132. | Stealth KeySpy 2.0.0 (professionalglobalmarketing.com) | ||
online and wanted to know NOW? * Have you ever wondered what your kids are REALLY doing and seeing on the computer for hours on end? * Have you ever wondered if your students are ONLY using school computers for educational purposes? * Have you ever wanted to find out how much time your employees are REALLY wasting online? Now, With The Help Of Stealth KeySpy 2.0, You Can | |||
Updated: 9, 2005 | Rating: 48 | Author: Tom Eagar | Size: 700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
133. | SysTracker 2.0 (systracker.com) | ||
you visit, and calculate your work time on each application. User's current status monitoring,Multi-user support,URL/website address capture,Invisibility in Windows Task Manager,Analyzer upgrade for free,Free e-mail support,No additional hardware required.Usage Scenarios, Time Management:Record and calculate how much time you or your team spend on a specific application, such as Word | |||
Updated: 8, 2004 | Rating: 0 | Author: Song Zhenwei | Size: 3184 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
134. | Windows Startup Manager 3.0 (gigabest.com) | ||
for user action as an icon on the taskbar. All of them uses computer's resources (memory, CPU time...) With USM you can easily manage all these programs. Ultimate Startup Manager acts completely different way than other startup tools - you create profiles which contain any set of programs. During | |||
Updated: 9, 2005 | Rating: 16 | Author: Marcin Szczesny | Size: 2169 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
135. | WinScheduler 6.30 (pitrinec.com) | ||
- Fully featured macro editor with integrated debugger. - Password protected macros. - Share macros in corporate network. The WinScheduler allows you to automate many repetitive tasks and do timeconsuming job even if you are out of office. The WinScheduler allows user to create macros working in | |||
Updated: 2, 2006 | Rating: 0 | Author: Petr Pitrinec | Size: 1721 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
136. | XPCSpy 2.01 (x-pcsoft.com) | ||
a powerful spy software that runs stealthy under MS Windows, and it's very easy to use. This spy software allows you to monitor and record all activities(include ICQ,MSN,AOL/AIM,YAHOO! Messenger chat conversation) on your pc when you leave, then you can create reports and send it to the predefined | |||
Updated: 8, 2004 | Rating: 42 | Author: Sun Xiao | Size: 1209 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
137. | Image Vault 1.01 (cyber-matrix.com) | ||
Vault is a password protected image viewer and image archive application. Image Vault is ideal for graphic artists, web developers, image collectors or anyone else who must manage and control access to large image collections. With Image Vault you can: Manage large image collections by storing the images in one or more databases. Micro manage the databases by assigning | |||
Updated: 9, 2005 | Rating: 0 | Author: Cyber Matrix | Size: 849 kb | Demo Go to category: Graphic Apps > Viewers Similar programs | |||
138. | Apocgraphy - Full spectrum e-mail protection 1.0.1 (Apocgraphy.com) | ||
that works with your current e-mail reader analyzing your e-mail and protecting you against a full range of damaging and time wasting e-mails. Apocgraphy utilizes a full range of methods to analyze your e-mail including keyword analysis, collaborative information sharing, adaptive algorithms, heuristics, blackholes, automatic whitelisting and blacklists. Apocgraphy comes preset | |||
Updated: 9, 2005 | Rating: 16 | Author: sean kahil | Size: 2336 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
139. | EZ Macros 5.0A (americansys.com) | ||
EZ Macros lets you create "secure" macros. A secure macro is protected by a password created by you. Secure macros can only be edited, deleted, or scheduled by entering the password and no one can see the keystrokes that activate them! With EZ Macros 5.0A you can also create menus to make your macros even easier to use. Pick existing macros, place them in a list, give each a | |||
Updated: 9, 2005 | Rating: 48 | Author: Matt Porter | Size: 758 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
140. | DownUp2U 1.16 (downup2u.com) | ||
with category by protocol. *Refer to records with 2 modes:It's easy to find,you can arrange by[ URL,filename,size,category,protocol,comment,download time...].Even you had lots of records,it also can go there quickly. 1.Category Mode:create unlimited nesting categories,support dragging,renaming,adding comment,finding... 2.Date Mode:Refer to records by date,support | |||
Updated: 9, 2005 | Rating: 209 | Author: xiaoqing wang | Size: 2966 kb | Adware Go to category: Network & Internet > Download Managers Similar programs | |||
|
Home > Kid protect software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|