|
||||||
|
||
|
Home > Log password software |
Related keywords: password, Password, password manager, password protection, password recovery, password generator, password keeper, lost password, password protect, password protected |
|
|
171. | Instant Message Grabber 1.97 (bitsplash.com) | ||
contain a specific word or phrase. IM Grabber also includes optional passworded access and monitoring functions to supervise children's activity online. IM Grabber is a utility to automatically record AOL Instant Messenger or AOL IM conversations. Additonal features include: Searching, Ignoring | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Bent | Size: 586 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
172. | Task-Menu for Georgia Softworks 2.50 (task-menu.com) | ||
functions: You can access via PDA, Palm or Pocket PC. Manage NT passwords / groups and Windows registry changes. Access your application log files run your configuration batch files. Task-Menu is totally user configurable. Setup & configuration text menu for Georgia Softworks Telnet Server. Access locally or remote telnet access, via PDA, Palm or Pocket PC. Manage NT | |||
Updated: 9, 2005 | Rating: 42 | Author: John East | Size: 1480 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
173. | WebScout 2.1 (globalpatrol.net) | ||
speed throttle MP3, EXE and ZIP file downloads to a maximum of 10 KB/s per user. WebScout includes a usage counter which records how much bandwidth and time each user or workstations has spent on the Internet on a daily, weekly and monthly basis. Usage limits can be applied to users so that when a | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1068 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
174. | 007 Spy Software 3.86 (e-spy-software.com) | ||
track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just like a surveillance camera directly point at the computer monitor | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
175. | AB System Spy 5.00 (ab_software.tripod.com) | ||
allows you to record any activity on your computer. The log file can be saved in TXT or HTM format. It will record all the keys pressed, pastes from clipboard, all the running processes. A scheduler, a screen capturer are included. If you save the log in HTML format, it will be added a link to | |||
Updated: 3, 2005 | Rating: 315 | Author: AB Software | Size: 971 kb | Shareware Similar programs | |||
176. | Advanced KEYLOGGER 1.5 (mykeylogger.com) | ||
in the world. Advanced KEYLOGGER records every keystroke, including passwords and logins, to encrypted easy-to-understand logs and can send reports secretly to your e-mail address or any number of other e-mails, specified by you. Advanced KEYLOGGER monitors the Internet activity precisely by logging all web-pages the user visits. Advanced KEYLOGGER records visual statistics of | |||
Updated: 9, 2005 | Rating: 251 | Author: Marianna Gorenstein | Size: 918 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
177. | AIM Keys 3.10.9522 (aimsoft.com) | ||
to preview and edit macro syntax on the fly! NEW! Macro and Task log files. AIM Keys can automatically track your activities and store them for future reference. NEW! Security options. Now you may secure every facet of AIM Keys interface from macros to the entire application. Encrypt your sensitive macros such as passwords to prevent others from using or viewing them | |||
Updated: 9, 2005 | Rating: 61 | Author: Randy Smith | Size: 2799 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
178. | D_back 1.60.3 (svap.pp.ru) | ||
of all startups, errors and warning messages are registered in text log files. In addition exists possibility to notify user by e-mail about starting/ending, errors or warnings of each backup job. Reliable data-backup tool for any computer running Windows. Implements various types of backups in major | |||
Updated: 2, 2006 | Rating: 0 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
179. | Desktop Scout 4.0 (globalpatrol.net) | ||
which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop, transfer files, start and stop | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
180. | Ghost Keylogger 3.80 (keylogger.net) | ||
surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs | |||
Updated: 3, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 600 kb | Demo Similar programs | |||
|
Home > Log password software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|