|
||||||
|
||
|
Home > Activity logging software |
Related keywords: activity, logging, pc activity monitoring, switching logging data print, internet logging, activity based costing, call logging, time logging, Logging, activity timer |
|
|
11. | File Backup Watcher Professional 2.7.3 (dswsoft.com) | ||
are getting more and more widespread. These days, all kinds of activities from home accounting to international corporation business processes are getting automated. According to latest studies, private data and business-critical information make up to 30 per cent of an average hard drive space. Losing this kind of data due to equipment crash, malicious activities of viruses | |||
Updated: 2, 2006 | Rating: 0 | Author: Desktop Software | Size: 2552 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
12. | Evidence Destructor 2.14 (emailarms.com) | ||
you are working on your computer performing the day to day activity like surfing the Internet, paying your bills online and logging into the websites with passwords, your computer is recording most of the steps you take. For example the history of all the web sites you visited, all the pictures | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
13. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
is a powerful user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! and it empowers you to | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
14. | CopyCat 4.1.27 (hahntech.com) | ||
date/time stamps to avoid overwriting previous backups. Extensive logging to verify activities and monitor potential problems. Easy selection of one or multiple source items and creation of the desired backup parameters. Multiple schedules per source items are possible. Source items and parameters can be stored in any number of "Ini" files for re-use. Optional sound and email | |||
Updated: 2, 2006 | Rating: 104 | Author: Tom Hahn | Size: 1184 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
15. | BlazingTools Perfect Keylogger Lite 1.15 (blazingtools.com) | ||
computer? Some applications of the keylogger: - Monitor children’s activity for parents - Monitor what programs opened and when - Recall what you wrote some time ago - Special purposes Features: - Invisible in Task Manager List - Logging texts typed in every application (including passwords and other hidden texts) - Log file is encrypted and can be protected with a | |||
Updated: 2, 2006 | Rating: 75 | Author: BlazingTools Software | Size: 172 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
16. | Active Key Logger 3.0 (winsoul.com) | ||
computer, it will allow you to make program settings for tracking activities on your computer. If you enable "Run Active Key Logger when windows start" then the program will run when windows starts, and if you enable "Run in Hide Mode" then the program will run by full stealth for others, no one will | |||
Updated: 2, 2006 | Rating: 242 | Author: Alex Atushev | Size: 703 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
17. | Zaep AntiSpam 4.1.0.3 (Zaep.com) | ||
challenge-response based system, Zaep AntiSpam verifies the sender's email address before you get the message. This simple procedure is only done once and takes only a few seconds to perform so it doesn't create an inconvenience. Use Zaep Standard to protect each of the email addresses you use at | |||
Updated: 2, 2006 | Rating: 0 | Author: Douglas Papenthien | Size: 1190 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
18. | DiamondCS Port Explorer 2.100 (diamondcs.com.au) | ||
has an intuitive GUI that allows you to quickly see all your network activity, and thanks to its ease of use is allowing people everywhere to do advanced network activities. Providing unprecedented viewing and control over the sockets on your Microsoft Windows system, the data traffic going through it, and the computers that are connected to it, Port Explorer is a completely | |||
Updated: 2, 2006 | Rating: 0 | Author: DiamondCS Support | Size: 1062 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
19. | As-U-Type 3.2 (fanix.com) | ||
you lots of time, giving you accurate and fast typing. As-U-Type's main features include: * Automatic on-the-fly spell checking * Automatic correction of recognized mistakes * Rich options to handle unrecognized mistakes including manual correction, interactive correction and automatic correction | |||
Updated: 2, 2006 | Rating: 197 | Author: Fanix Software | Size: 3310 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
20. | As-U-Type 3.2 (asutype.com) | ||
you lots of time, giving you accurate and fast typing. As-U-Type's main features include: * Automatic on-the-fly spell checking * Automatic correction of recognized mistakes * Rich options to handle unrecognized mistakes including manual correction, interactive correction and automatic correction | |||
Updated: 2, 2006 | Rating: 0 | Author: Fanix Software | Size: 3310 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
|
Home > Activity logging software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|