|
||||||
|
||
|
Home > Security log software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
171. | U-Wipe 2.0 (u-wipe.com) | ||
With U-Wipe, you can easily manage digital certificates through three modes of safety, and delete the tracks in Microsoft Windows and Microsoft Office, temporary files, and more. U-Wipe supports such applications as Microsoft Internet Explorer 4.1 and higher, Microsoft Office 97 and 2000, Netscape 6, Mozilla | |||
Updated: 9, 2005 | Rating: 60 | Author: Artemiy Babamuratov | Size: 1971 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
172. | U-Wipe 2.5 (u-wipe.com) | ||
you to wipe out all your online activities, such as IE browser's cache, history, recent document list, cookies, auto complete forms and other tracks. U-Wipe allows you to clean tracks in MS Windows and MS Office, such as temporary files, MRU lists, last logon user name, file removing from contextual menu and much more. U-Wipe has an additional feature of pop up killer mode for | |||
Updated: 9, 2005 | Rating: 16 | Author: Artemiy Babamuratov | Size: 2271 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
173. | WebScout 2.1 (globalpatrol.net) | ||
speed throttle MP3, EXE and ZIP file downloads to a maximum of 10 KB/s per user. WebScout includes a usage counter which records how much bandwidth and time each user or workstations has spent on the Internet on a daily, weekly and monthly basis. Usage limits can be applied to users so that when a | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1068 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
174. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
175. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
176. | 007 Spy Software 3.86 (e-spy-software.com) | ||
track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just like a surveillance camera directly point at the computer monitor. Features | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
177. | dfg BackUp XP 3.7.2 (members.aon.at) | ||
simply the best! - The fastest, award winning and easy to use back up and restore program for nearly all backup medias - HD, ZIP, FTP, CD R/RW, etc. It is the most effective and fastest you can get today. Unlimited backup profiles are supported. dfg BackUp XP can be configured to start the backup automatically (powerful scheduler using command line options (switches) and to | |||
Updated: 9, 2005 | Rating: 0 | Author: victoria gross | Size: 2233 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
178. | AIM Keys 3.10.9522 (aimsoft.com) | ||
to preview and edit macro syntax on the fly! NEW! Macro and Task log files. AIM Keys can automatically track your activities and store them for future reference. NEW! Security options. Now you may secure every facet of AIM Keys interface from macros to the entire application. Encrypt your sensitive macros such as passwords to prevent others from using or viewing them | |||
Updated: 9, 2005 | Rating: 61 | Author: Randy Smith | Size: 2799 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
179. | Ascella Log Monitor 1.0 (filemonitor.net) | ||
users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about events via LAN, which can be received by the Windows NT4/2000 Messenger service, and using e-mail, SMS and ICQ (via e-mail gates) Allows users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about | |||
Updated: 9, 2005 | Rating: 0 | Author: AAR Software Ltd. | Size: 700 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
180. | Desktop Scout 4.0 (globalpatrol.net) | ||
which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop, transfer files, start and stop | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Security log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|