|
||||||
|
||
|
Home > Security log software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
181. | iNet Shaper 2.191 (winfiles32.com) | ||
of each user, has remote administration, activity monitor, activity logs. Router identifies user by IP address and by MAC address of incoming packet. Also, user can gain access to internet using logon utility included in distribution. Traffic shaper gives the posiibility of bandwidth redistribution among LAN users in case of limited internet connection speed which saves bandwidth for | |||
Updated: 3, 2005 | Rating: 24 | Author: UIP RU | Size: 4100 kb | Freeware Similar programs | |||
182. | 007 Spy Software 3.01 (e-spy-software.com) | ||
track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just like a surveillance camera directly point at the computer monitor. Features | |||
Updated: 3, 2005 | Rating: 1455 | Author: Demi He | Size: 2176 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
183. | Anti-BO 1.5b (swiftp.com) | ||
vulnerable to those who scan the internet for infected machines, and logs attempts of entry with your attackers IP address & date/time info, and the type of program they used. Anti-BO is a listening device which sits in your system tray awaiting hack attempts from Trojan applications. The program simulates an infected machine and logs all access | |||
Updated: 3, 2005 | Rating: 95 | Author: Ben Hynes | Size: 1100 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
184. | Webcam Watchdog 4.0 (webcam123.com) | ||
capture data forever in a maintenance-free mode. The program's built-in web server makes it easy to retrieve your video archives securely and remotely. There is even a log that keeps track of who accessed Webcam Watchdog remotely. In addition to using the program as a web server, it can | |||
Updated: 3, 2005 | Rating: 48 | Author: Kaiwen Cheng | Size: 9467 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
185. | Snoop 1.1 (yoursnoop.com) | ||
every day. Once installed on a PC, you can view computer activity by logs created or Snoop can send activity log reports to a remote e-mail address you specify. You can specify to send reports daily, weekly or monthly. Your Snoop report can include any of the following: application activity, all | |||
Updated: 3, 2005 | Rating: 0 | Author: Snoop Internet Security | Size: 1390 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
186. | Imaginary Telnet Server 1.0 (whizkidtech.redprince.net) | ||
One of the possible attacks is by using the Telnet protocol to log into your system. If successful, the attacker can gain complete control of your system. With the Imaginary Telnet Server running, he will be served a fake response which will prevent him from accessing any resources available on your system. The server will give him the impression that he has found a top secret | |||
Updated: 3, 2005 | Rating: 97 | Author: G. Adam Stanislav | Size: 38 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
187. | iNet Shaper 2.191 (winfiles32.com) | ||
of each user, has remote administration, activity monitor, activity logs. Router identifies user by IP address and by MAC address of incoming packet. Also, user can gain access to internet using logon utility included in distribution. Traffic shaper gives the posiibility of bandwidth redistribution among LAN users in case of limited internet connection speed which saves bandwidth for | |||
Updated: 3, 2005 | Rating: 90 | Author: UIP RU | Size: 4100 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
188. | Log-Me-In 1.00.001 (winm8.com) | ||
Log-Me-In is the ideal utility for anyone who regularly has to insert user names and passwords to gain access to internet sites. It can log you in to sites which ask the same security questions with a single click while still catering for sites which ask different security questions each time. Inserts user names and passwords in a flash | |||
Updated: 3, 2005 | Rating: 0 | Author: John Turnbull | Size: 1024 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
189. | Security Forms 1.0 (securitylanding.com) | ||
of security and human resources related forms including; Absentee report, Acknowledgment of receipt of company property, Applicant information release, Attendance record, Cash over short log, Checklists for handling workers, Daily time sheet, Discipline documentation form, Driving record check, Drug testing consent form, Drug testing policy, Educational record check | |||
Updated: 3, 2005 | Rating: 110 | Author: Paul Pleasant | Size: 173 kb | Freeware Go to category: Business > Other Similar programs | |||
190. | NS Reports Manager for Crystal Reports 9 2.0 (nerdosoft.com) | ||
handy feature for our multinational customers), implement role-based security to segregate access to reports, containing sensitive information (sales, salaries, etc.). Security can be at application level or integrated with Windows OS (no need to remember extra password). Incremental search by | |||
Updated: 3, 2005 | Rating: 42 | Author: Nerdosoft LLC | Size: 34921 kb | Commercial Go to category: Business > Databases & Tools Similar programs | |||
|
Home > Security log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|