|
||||||
|
||
|
Home > Security log software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
181. | KidsWatch Time Control 2.1 (kidswatch.com) | ||
Time Control™ is one of America's leading Parental Control Software packages that allows you to limit and control the time your children spend on the computer, access the Internet or play games. Time Control™ helps you block unwanted software from being downloaded, prevents overuse and helps you to balance your child's day. With KidsWatch Time Control™ you will be able | |||
Updated: 9, 2005 | Rating: 39 | Author: Larry Zarou | Size: 3155 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
182. | LockEXE 2.0 (mazepath.com) | ||
So Easy to Use!!! LockEXE can password protect your programs. Your email, word processor, browser or ANY other programs you choose will only work with your password! Protect your computer and your privacy with LockEXE. Keep your children from browsing the internet without your permission! You LockEXE can password protect your programs. Your email, word processor, browser or ANY other programs you choose will only work with your password! Protect your computer and your privacy with LockEXE | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 145 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
183. | Paper Shredder 1.3 (winmeta.com) | ||
and timed intervals Smart Eject CD-ROM, when windows shutdown or log off Compatible with Internet Explorer (4.x or higher) Compatible with Windows 98, 2000, ME, XP Friendly install interface and Complete uninstall capabilities. Paper Shredder is a clean system that helps protect your privacy. It will delete Internet Cache, History, Cookies, Location bar address; Clear recent | |||
Updated: 9, 2005 | Rating: 0 | Author: Duo Yi | Size: 715 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
184. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
185. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
186. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
187. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
188. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
189. | SecurDesk! 5.32 (cursorarts.com) | ||
many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide confusing and irrelevant items from selected users, to simplify training tasks, etc. SecurDesk! is a complete replacement for the Windows default Explorer.exe | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
190. | SMB File Sniffer 1.0.0.1 (microolap.com) | ||
File Sniffer is a powerful network security utility for logging SMB protocol (sometimes called NetBIOS over TCP) files operations and capturing file bodies, transmitted within a LAN. SMB File Sniffer allows you to: - log SMB file operations with two levels of logging: detailed and errors only; - intercept files transmitted within a LAN by SMB protocol (Windows and | |||
Updated: 9, 2005 | Rating: 0 | Author: microOLAP Technologies | Size: 1378 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Security log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|