|
||||||
|
||
|
Home > Activity monitoring software |
|
|
151. | FolderClone 1.5.7 (folderclone.com) | ||
and how often you want this done. Once configured, FolderClone monitors the "source" folders for changes or updates and copies new or changed files to the "target". This process runs automatically in the background without any further user-interaction required. Feature List: ========= - Easy to use Interface for simple creation and maintenance of tasks. - Lists of | |||
Updated: 2, 2006 | Rating: 16 | Author: Salty Brine Software | Size: 291 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
152. | Ghost Keylogger 3.80 (keylogger.net) | ||
secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs completly | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
153. | Golden Eye 4.11 (monitoring-spy-software.com) | ||
are doing during work hours? Golden Eye is designed to monitor and record all the activity on your computer. with its bulit-in spy components, It can record keystroke, visited websites, window title,Instant Messengersm, and even screenshot. Golden Eye works like a surveillance camera pointed directly at your computer monitor, monitoring and recording | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin | Size: 1490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
154. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
Edition 2 is a new update to our popular HWPE software. HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth mode option | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
155. | HSLAB Print Logger SE 4.3 (hs-lab.com) | ||
Print Logger is intended for control and auditing of printing activity. The program monitors the print tasks on the computer to which it is installed. HSLAB Print Logger SE's main task is to collect the information about the sizes of printed documents/images and to record this information to a database for subsequent analysis. Print Logger can also compare the | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Golub | Size: 6105 kb | Shareware Go to category: Business > Other Similar programs | |||
156. | IIPwr Package 2.00 (iipwr.com) | ||
own but currently don't have direct access to? With IIPwr's KeySpy this is exactly what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records (logs) activities | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
157. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
158. | Kaspersky Anti-Virus Personal Pro 5.0 (kaspersky.com) | ||
against infection Kaspersky Anti-Virus Personal Pro constantly monitors all sources of possible virus infections: email, the Internet, CDs and more. Personal Pro also protects all parts of your PC: system memory, boot sector, files, mail databases and etc. It also contains unique technology for protecting your MS Office documents. Scanning archived and compressed files Viruses often | |||
Updated: 3, 2005 | Rating: 39 | Author: Andrey Shepelev | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
159. | Keyboard Monitor 1.7 (tropsoft.com) | ||
the activities that take place on your computer with this handy program. Turn it on and it records all the keys that are pressed until turned off. Use it to ensure that your child's (or spouse's!) chat room and email activities are on the up and up. Recorded information and access to the Keyboard Monitor are safely password protected | |||
Updated: 9, 2005 | Rating: 76 | Author: Silvio Kuczynski | Size: 133 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
160. | KGB Free Key Logger 1.93 (refog.com) | ||
unexpectedly crashes, and it keeps the record of all keyboard activity. It allows you to monitor your children's activity at home or to make sure your employees do not use company's computers inappropriately. There are three versions of keylogger - Free KGB Key Logger, KGB Keylogger and KGB Spy. Free KGB Key Logger is absolutely free, contains all | |||
Updated: 2, 2006 | Rating: 2482 | Author: ReFog Software | Size: 1477 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
|
Home > Activity monitoring software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|