|
||||||
|
||
|
Home > Activity recorder software |
Related keywords: recorder, activity, sound recorder, mp3 recorder, audio recorder, keystroke recorder, wav recorder, macro recorder, Recorder, pc activity monitoring |
|
|
141. | File Backup Watcher Professional 2.7.3 (dswsoft.com) | ||
are getting more and more widespread. These days, all kinds of activities from home accounting to international corporation business processes are getting automated. According to latest studies, private data and business-critical information make up to 30 per cent of an average hard drive space. Losing this kind of data due to equipment crash, malicious activities of viruses | |||
Updated: 2, 2006 | Rating: 0 | Author: Desktop Software | Size: 2552 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
142. | FontRenamer 1.0 (neuber.com) | ||
in English and German language (auto detect). That software doesn't record activities, doesn't require runtimes, doesn't require installation, doesn't write to the registry, doesn't modify files outside of its own directories, isn't adware. FontRenamer is free and renames truetype font files | |||
Updated: 9, 2005 | Rating: 124 | Author: Alexander Neuber | Size: 51 kb | Freeware Go to category: Graphic Apps > Font Tools Similar programs | |||
143. | Free Spyware Scanner 8.0.5 (adaware.info) | ||
files--and looks for traces of recognized adware modules. When it's finished searching, it displays a list of what it found and lets you select the items you'd like to remove from your system. Free Spyware Scanner identifies and removes these surreptitiously installed applications. Using updateable "reflists," which are sort of like antivirus DAT files, Ad-aware scours your | |||
Updated: 8, 2004 | Rating: 0 | Author: Leo van Opstal | Size: 5466 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
144. | GetDataBack for FAT 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, FAT or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a | |||
Updated: 9, 2005 | Rating: 1267 | Author: Ragnhild Fesel | Size: 2811 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
145. | GetDataBack for NTFS 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, MTF or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a | |||
Updated: 9, 2005 | Rating: 1729 | Author: Ragnhild Fesel | Size: 2789 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
146. | Ghost Keylogger 3.80 (keylogger.net) | ||
Ghost Keylogger is an invisible easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
147. | Golden Eye 4.11 (monitoring-spy-software.com) | ||
doing during work hours? Golden Eye is designed to monitor and record all the activity on your computer. with its bulit-in spy components, It can record keystroke, visited websites, window title,Instant Messengersm, and even screenshot. Golden Eye works like a surveillance camera | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin | Size: 1490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
148. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
149. | HSLAB Print Logger SE 4.3 (hs-lab.com) | ||
Print Logger is intended for control and auditing of printing activity. The program monitors the print tasks on the computer to which it is installed. HSLAB Print Logger SE's main task is to collect the information about the sizes of printed documents/images and to record this information to a database for subsequent analysis. Print Logger can also compare the | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Golub | Size: 6105 kb | Shareware Go to category: Business > Other Similar programs | |||
150. | IIPwr Package 2.00 (iipwr.com) | ||
own but currently don't have direct access to? With IIPwr's KeySpy this is exactly what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records (logs) activities | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Activity recorder software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|