|
||||||
|
||
|
Home > Log off software |
|
|
161. | Surf Spy 2.10 (bysoft.se) | ||
encrypted file. For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal for parents who want to monitor their children while they are away. In the stealth mode, Surf Spy does not show up in the system tray, task bar, or task list. Surf Spy is compatible with all web browsers. Internet Explorer, Netscape Navigator, Opera | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
162. | TimesUp 1.22 (timesup.hartsoft.com) | ||
deleting files after a given number of days. Delete old tmp files, log files and orphaned directories. Can check based upon last accessed date. Command-line tool for deleting files after a given number of days. Delete old tmp files, log files and orphaned directories. Can check based upon last accessed | |||
Updated: 9, 2005 | Rating: 0 | Author: JJ van der Hart | Size: 62 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
163. | TK ChildLock! 1.0 (competent-software.com) | ||
ChildLock! you can limit an user's log on or log off times. Define when users can log on to your PC. If a specified user is already logged on your system on a non-logon-time, it is possible to log him off automatically. I.e. parents can control their children, so that they cannot be logged on to the computer after 7 p.m. So the parents can | |||
Updated: 9, 2005 | Rating: 0 | Author: Timo Kosiol | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
164. | TK8 Safe 2.5 (tk8.com) | ||
Searching, sorting and finding passwords has never been easier. Log in to password protected web pages automatically! Just select "Autofill" from the menu or press a hot key when you are at the login prompt. The program will locate the required entry automatically and fills the login prompt for you. If needed, you can also launch web pages related with password entries and use | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
165. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
a completed inventory card for each computer/client. Upon initial log-in, users are requested to provide the system with the following information: Your Name, Room or department, Computer Brand, ID-Number. Vidamic Netlog then reports any changes made on each client log-in to the inventory | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
166. | RegWorks 1.3.2 (regwrks.com) | ||
names of applications and processes that access registry keys and logs all relevant data (returned function code, registry key accessed, registry values etc.). This feature is critical to quickly diagnosing and solving any access rights issues that frequently arise in the corporate network environment. Importantly, RegWorks monitor features flexible filtering options that can be | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Loskutov | Size: 896 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
167. | Remote Access 1.0 (nawab.1cis.com) | ||
control , file transfers , telnetting , remote shutdown , remote log-in/;log-off etc..and very cheap. It is a very essential tool for remote administrator working on remote locatons and also providing remote Support and help . Compared to other softwares on the internet , Remote Access 1.0 is a very cheap and affordable software . Special Discounts are offered to | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahamed Abdulla | Size: 2558 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
168. | RunAs Professional 3 (mast-computer.de) | ||
Professional is a substitute for Microsoft's command runas. RunAs Professional solves the problem that normal runas does not support the commandline parameter password. Now you can use RunAs Professional to install software, use it in batch skripts and much more. If you use RunAs Professional you can start an application with other credentials without log off | |||
Updated: 9, 2005 | Rating: 0 | Author: Steffen Epple | Size: 111 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
169. | SafeLogon 2.0 (gemiscorp.com) | ||
the days of the week and the time of the day the user is allowed to log on and use the system. - Define temporary users who expire after a number of logins and/or when the system reaches a date limit. - Keep a log or track of all the users making use of the system, including the failed logon | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 2291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
170. | SecurDesk! 5.32 (cursorarts.net) | ||
novice users from tampering with the system settings, SecurDesk! offers many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide confusing and irrelevant items from selected users, to simplify training tasks, etc. SecurDesk | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Log off software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|