|
||||||
|
||
|
Home > Security log software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
151. | WIDO Logbook 1.3 (home.t-online.de) | ||
and logoffs of the users (and other accounts), and stores it in a log file, in brief 'logbook' mentioned. So that all logins and logoffs will be registered, the LogbookService must not be stopped. LogbookReports.exe is a 'normal' Windows program and is to start from the start menu. LogbookReports.exe evaluates the 'logbook' led by the LogbookService and generates different | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 1519 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
152. | Winalysis 3.1 (winalysis.com) | ||
for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP traps, email, scripts, the event log... Create user-defined audit | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Fullerton | Size: 3122 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
153. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
154. | WinForcer 3 (winforcer.com) | ||
are implemented immediately without the need to restart Winforcer or log off. You can WinForce any application or Folder through WinForcer Administrators can suspend WinForcer to regain access to the users desktop without having to log out. You can configure multiple machines by using distribution configuration files. So you do not need to individually set up each machines | |||
Updated: 9, 2005 | Rating: 431 | Author: Richard Smee | Size: 2195 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
155. | WinGuardian 3.0 (webroot.com) | ||
a computer. WinGuardian can keep track of what programs a user runs, log any text that is typed into a program, log all web sites that are visited, and even capture screenshots at various specified intervals. Logs can be reviewed to detect if a user is running inappropriate programs such | |||
Updated: 9, 2005 | Rating: 71 | Author: Steve Thomas | Size: 1561 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
156. | Xizzo 1.2 (xizzo.com) | ||
is a password manager utility that helps users securely store their log-in information and enter it into any online form with a single mouse-click. It is more secure than printed cheat sheets or IE's own Auto-Fill function, the standard methods of password "protection" for most users. Xizzo | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Tessov | Size: 758 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
157. | web based msde dba tool - Shusheng SQL Tool 1.0 (websqltool.com) | ||
and performance of SQL server. Kill bad process. o Administrate security for server logins (Windows and SQL accounts), database users and roles. o Assign permission to user(s), role(s), object(s). Support column level permission. o Backup, Restore and Repair database | |||
Updated: 9, 2005 | Rating: 72 | Author: Shusheng Zhou | Size: 819 kb | Freeware Go to category: Business > Databases & Tools Similar programs | |||
158. | wodFTPServer 2.1.9.0 (weonlydo.com) | ||
that implements server side of following protocols: FTP, FTP/S (FTPS or FTP+SSL) both in explicit and implicit modes, and SFTP (secure ftp subsystem on SSH2 secured channel). Support for all 3 protocol is transparent for your programming - you have same set of events, same set of properties and methods, same control over connected users - and just one property to change to | |||
Updated: 2, 2006 | Rating: 16 | Author: Kresimir Petric | Size: 2235 kb | Shareware Go to category: Development > Active X Similar programs | |||
159. | I-Cipher AP 2.2.2 (ambitware.com) | ||
and reliable image file encryptor/decryptor with build-in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
160. | IT Manager Helpdesk 2.0 (168.144.45.89) | ||
that is added, changed, or deleted is written to a history log that displays the type of event, who performed it, when it happened, and before and after pictures of the data. All of these functions have been designed around an easy to navigate user interface. The IT Managerâ„¢ was designed to help effectively and efficiently manage change and growth in IT Manager resources | |||
Updated: 9, 2005 | Rating: 173 | Author: Ertugrul Akbas | Size: 43 kb | Commercial Go to category: Business > Helpdesk & Remote PC Similar programs | |||
|
Home > Security log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|