|
||||||
|
||
|
Home > Fishing log software |
Related keywords: fishing, freshwater fishing, fishing lure, Best Fishing Times, fishing database, fishing software, fishing buddy, bass fishing, fishing tackle, fishing boat |
|
|
181. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
records unauthorized access violations in a protected event-log file with a time and date stamped description of the threat. The system records key stroke activity that may provide clues as to the intruder’s intentions or their identity. Notification Services – Theft Recovery ComputerSafe sends various types of remote notifications when violations occur - pages | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
182. | Control Freak 1.3 (windsweptsoftware.com) | ||
an Address Bar, The Command Line, which starts were Explorer's Address Bar leaves off. Mail Call Mail Call is a full-featured email client supporting the SMTP Internet email protocol. It has support for HTML, plain text, and full web pages. Supports multiple mail accounts and has a Remote | |||
Updated: 9, 2005 | Rating: 0 | Author: Greg DeBacker | Size: 2808 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
183. | ConversionTool 4.2.2 (keper.com) | ||
Access database into a SQL Server database, unlike the Microsoft’s UpSize Wizard preserving all table structure details, and supports the conversion of the views and procedures. Moreover, the tool supports solution of structural problems between Access and SQL Server like making the implicit behavior | |||
Updated: 9, 2005 | Rating: 6616 | Author: Burkhard Lau | Size: 3151 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
184. | Downloadz Master 2.8 (otiumation-inc.com) | ||
to surf and download materials Set time limits for DownloadZ Master's Internet connection Set limits on how many pages DownloadZ Master will surf on each site Select the type of materials and files to be downloaded Set size limitations on downloaded files Comes with a complete log of | |||
Updated: 8, 2004 | Rating: 0 | Size: 23022 kb | Demo Go to category: System Utilities > Other Similar programs | |||
185. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
186. | Event Log Janitor 1.0 (streiff-is.com) | ||
Log Janitor Emails Event Logs at predefined Intervals (in hours) that you specify and you can optionally clear them. Supported logs: APPLICATION, SECURITY, SYSTEM, DIRECTORY SERVICE, FILE REPLICATION SERVICE, and DNS Server. Simple to use, requires no SMTP Server setup - specify DNS Server, email address(es), hour interval to email, and whether or not to clear the | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Streiff | Size: 972 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
187. | Event Log Watchdog 3.0 (keroonsoftware.com) | ||
Log Watchdog monitor's your Windows Event Logs and notifies you via Email or Syslog when a new event is logged. You can define which Event Logs you wish to monitor and what types of events you wish to receive Email notification of. One license per machine. Event Log Watchdog monitor's your Windows Event Logs and notifies you via Email when a | |||
Updated: 2, 2006 | Rating: 0 | Author: Rob Rhodes | Size: 7224 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
188. | FileSpy 3.0 (ic.net) | ||
who are using a specific file. It also allows viewing of the user's rights to the file/directory, how the file was opened, the user's network address, and the date and time the user logged in to the network. With FileSpy you can also send messages to selected network users and if you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2014 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
189. | Ghost Keylogger 3.80 (keylogger.net) | ||
surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
190. | HDD Temperature 1.3 (hddtemperature.com) | ||
users who have only single hard-drive and is totally free. Using S.M.A.R.T. technology included in all modern HDDs, HDD Temperature checks and monitors the temperature of your hard drives; you can also set the maximum value of drive temperature so that you will be warned should this temperature be exceeded. S.M.A.R.T. stands for "Self-Monitoring, Analysis and Reporting | |||
Updated: 3, 2005 | Rating: 48 | Author: Yuri Alexandrov | Size: 1016 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Fishing log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|