|
||||||
|
||
|
Home > Access log software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access, last access |
|
|
181. | IIPwr Package 2.00 (iipwr.com) | ||
to spy on a computer you own but currently don't have direct access to? With IIPwr's KeySpy this is exactly what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
182. | IP Mailer 2004d (wappu.tv) | ||
your ISP gives you a temorary IP address each time you log on, you can email your IP address automatically to your friends and office/home so that you can find your computer for remote access regardless of the constantly changing IP address. If you use your computer remotely or need to have | |||
Updated: 9, 2005 | Rating: 151 | Size: 1600 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
183. | LanHunter 1.50 (waterfallsoft.com) | ||
files using wildcards. -Ability to search resources with limited access. -Ability to search individual computers or the whole network. -Ability to search through hidden network resources. -Flexible search settings (search for files by date, size and so on). -Ability to export search results | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Vdovin | Size: 1017 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
184. | Launch-n-Go 2.0 (tethyssolutions.com) | ||
Use keyboard shortcuts to perform common Windows tasks such as log off, shutdown or volume control. Launch-n-Go is a smart, reliable quick launch toolbar for fast access to anything on your computer or the Internet. It even allows you to perform custom searches. For e.g., assign a keyword ebay & a search URL & perform searches on eBay. By typing ‘ebay;books’ in the | |||
Updated: 9, 2005 | Rating: 39 | Author: Tethys Solutions | Size: 2334 kb | Shareware Go to category: Development > Other Similar programs | |||
185. | LetUknow 2.03 (mhsoftware.co.uk) | ||
to different tests, using differing alert methods. You can view a log of all test conducted, or just those which passed or failed. You can run any or all of the tests with just a mouse click. Tests can be temporarily disabled without the need to delete and re-create them. LetUknow is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Mace | Size: 2101 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
186. | LockEXE 2.0 (mazepath.com) | ||
So Easy to Use!!! LockEXE can password protect your programs. Your email, word processor, browser or ANY other programs you choose will only work with your password! Protect your computer and your privacy with LockEXE. Keep your children from browsing the internet without your permission! You LockEXE can password protect your programs. Your email, word processor, browser or ANY other programs you choose will only work with your password! Protect your computer and your privacy with LockEXE | |||
Updated: 9, 2005 | Rating: 16 | Author: John Hooper | Size: 145 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
187. | Lockout Desktop Security 1.1.652 (dynamicdesigns.co.uk) | ||
and restrictions for specific users and groups, control access to certain applications, restrict when your PC can be used, restrict CD usage, log Internet usage, and log attempts at restricted activities. Note: This is a 30-day trial. After 30 days, the program will be disabled after 15 minutes of use. The full-version retail price is £30. Some Of | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Wilkinson | Size: 2857 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
188. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
189. | ECSync 1.0 (EUROCOMP.info) | ||
for periodic tasks. Runs with and without user intervention. Creates log files. Very fast! A must for every notebook owner! ECSync! works on the same drive, on another drive or across a network. Works in both directions to ensure that all files are up to date. Can save source and target locations | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Osthege | Size: 5007 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
190. | FileSpy 3.0 (ic.net) | ||
who are using a specific file. It also allows viewing of the user's rights to the file/directory, how the file was opened, the user's network address, and the date and time the user logged in to the network. With FileSpy you can also send messages to selected network users and if you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2014 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
|
Home > Access log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|