|
||||||
|
||
|
Home > Security log software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
141. | Transparent Screen Lock PRO for WinNT/2000/XP/2003 4.50 (e-motional.com) | ||
prevent regular users from disabling or tampering with the program. Log file tracks failed logon attempts, and can initiate shutdown/logoff. Save log file locally, to network or to Event Log. Use quick-launch icon to run program immediately, run at a preset time interval or run as | |||
Updated: 2, 2006 | Rating: 16 | Author: Sandra Buckingham | Size: 992 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
142. | Ultimate Spy Personal 1.5 (raheel.yi.org) | ||
Auto starts with windows. Not even visible in Run registry. Includes Log Analyser to view log. Home Edition is also available which is best suited for parents to monitor whom their children talking to & what they're talking about. Home Edition is a great tool to ensure safety of your children, while they surf around & chat with strangers! Lite & Pro Editions of the same | |||
Updated: 9, 2005 | Rating: 0 | Author: Raheel Hameed | Size: 1156 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
143. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
a completed inventory card for each computer/client. Upon initial log-in, users are requested to provide the system with the following information: Your Name, Room or department, Computer Brand, ID-Number. Vidamic Netlog then reports any changes made on each client log-in to the inventory | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
144. | VisNetic Firewall 2.3 (deerfield.com) | ||
peace-of-mind through comprehensive intrusion protection. Security-conscious professionals running software and/or hardware Internet sharing solutions are as concerned about internal threats as they are about external threats. There is currently not a hardware firewall solution that protects companies against these threats and existing software firewall solutions are priced | |||
Updated: 2, 2006 | Rating: 0 | Author: Deerfield Com | Size: 4601 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
145. | Visual Audit Trail 2.0 (visual-audit.homeip.net) | ||
or save the entire records data before and after a update. It's up to you. Visual Audit Trail is also more flexible than other auditing solutions with "when and what" should get audited by using conditional expressions. The possibilities are almost limitless. One application handles both Centura and SQL Server databases. Why is auditing important? Allow database | |||
Updated: 3, 2005 | Rating: 42 | Author: Ben Rosato | Size: 4992 kb | Commercial Go to category: Business > Databases & Tools Similar programs | |||
146. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few tools to find out who or what made it happened. Besides critical | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
147. | WatchDog 8.4 (sarna.net) | ||
WatchDog limits, protects and monitors what your users do on the computer. Limit how much they use the computer and when. Put time limits on programs or stop them from ever running. Block web sites other web material. Protect your Windows machine by restricting where they go and what they can change. Monitor | |||
Updated: 9, 2005 | Rating: 613 | Author: Watchdog Development | Size: 7073 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
148. | WDumpEvt 2.2 (eventlog.com) | ||
it easy to view and manage all the informations from Windows NT/2000 logs: Ask for system, security, application log or file information. View, print or dump the list of events, user, failure or ras sessions, or print jobs. Dump the data to a file in ASCII-delimited, CSV or html format. You can study the log from any remote computer by browsing a tree who | |||
Updated: 9, 2005 | Rating: 0 | Author: Isabelle Vollant | Size: 395 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
149. | WebCam Monitor 3.54 (deskshare.com) | ||
to begin and complete recording on a predefined schedule. It's easy to upload your files to any FTP location periodically, or after an alarm condition is detected. In addition to capturing and transmitting video images and audio files, the software also maintains a detailed event log. Up to four camera/microphone units can be easily connected to the PC's USB | |||
Updated: 3, 2006 | Rating: 2799 | Author: Steve P | Size: 8783 kb | Shareware Go to category: Communications > Web/Video Cams Similar programs | |||
150. | Webroot Window Washer 6.0 (webroot.com) | ||
and Netscape. Window Washer includes bleach technology as an added security measure. Bleach completely overwrites files, making recovery impossible. This enhanced version also cleans up hard disk free space to remove evidence of your deleted files. Maintain your preferred Internet settings and | |||
Updated: 9, 2005 | Rating: 0 | Author: Webroot Software | Size: 2700 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
|
Home > Security log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|