|
||||||
|
||
|
Home > Access log software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access, last access |
|
|
181. | dfg ShutDown XP 3.9.1 (dfg1.netfirms.com) | ||
thorough time controlled and automatic way to shutdown, restart or log off your system with optional power off and shutdown forcing (no questioning). Optionally it will run as a NTservice. An optional Countdown Counter (visual and acoustic) enables you to cancel the system shutdown within a time period of up to 99 seconds. The program also has a built in alarm clock function (alarm | |||
Updated: 9, 2005 | Rating: 42 | Author: victoria gross | Size: 1113 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
182. | Absolute Key Logger 2.5.283 (lastbit.com) | ||
Key Logger is a small program that records all keystrokes into a log file, so that you can use this data later. You can use Absolute Key Logger to: - restore lost typed text. Computers can suddenly crash, freeze or get accidentally reloaded. Or you can lose your text data while filling out web forms (this happens quite frequently due to sever misconfiguration or bad connection) | |||
Updated: 9, 2005 | Rating: 82 | Author: Vitas Ramanchauskas | Size: 613 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
183. | Access Boss 2.2 (fspro.net) | ||
Access Boss is a unique easy-to-use tool, a real lifesaver for a system security administrator that enables you to effectively restrict access to a PC for certain users based on time factor. All you have to do is install Access Boss under an Administrator account, run the program and | |||
Updated: 2, 2006 | Rating: 175 | Author: FSPro Labs | Size: 933 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
184. | Access Denied 3.40 (johnru.com) | ||
encryption, integration with your favorite screensaver, color's highlight log files with integrity test, setup of colored text for requesting passwords, possibility use Access Denied usernames as Windows logon names and other pleasant additions including hidden measures that can stop | |||
Updated: 9, 2005 | Rating: 58 | Author: Ivan Mayrakov | Size: 536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
185. | Access Lock 2.83 (softheap.com) | ||
Access Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
186. | Access Lock 2.83 (getfreefile.com) | ||
Access Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
187. | Active Key Logger 3.0 (winsoul.com) | ||
By choosing hot keys that are comfortable for you, you can view log file when the program is running by stealth. Active Key Logger can also send the log file to your e-mail, thus enabling you to view it from other places and track any activities on your computer. If you want to know what's going on your computer then you need Active Key Logger. Active Key Logger this is | |||
Updated: 2, 2006 | Rating: 242 | Author: Alex Atushev | Size: 703 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
188. | Active System Locker 3.0 (sowsoft.com) | ||
that allows you to protect your personal computer from unauthorized access. You can use System Locker to restrict access to your PC. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop on | |||
Updated: 9, 2005 | Rating: 138 | Author: Vladimir Sinitsyn | Size: 611 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
189. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
of information theft crimes are conducted without having network access to target machine. Most of us prefer not to turn computer off while we are away for coffee or going to the lavatory or have to attend a meeting in a conference room next door. That is the point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
190. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
it unique are its powerful keyboard logger - so powerful, it even logs the keystrokes entered during Windows 2000/XP login. And ActMon has a unique "kernel-level" file protection: Files are not just hidden! They are completely inaccessible to unauthorized users. Files cannot be removed or manipulated by an unauthorized user or so called spyware "cleaner" applications or any other | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Access log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|