|
||||||
|
||
|
Home > Security log software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
191. | SIGNS 6.12 (rad2themax.com) | ||
S.I.G.N.S. is a feature-rich, customizable software package designed for SERIOUS investigative professionals. From dispatch through incident reporting, case management to extensive administrative reports, S.I.G.N.S. will not only AUTOMATE your work flow, but give you the tools you | |||
Updated: 3, 2005 | Rating: 55 | Author: Paul Pleasant | Size: 22648 kb | Demo Go to category: Business > Databases & Tools Similar programs | |||
192. | Visual Audit Trail 2.0 (visual-audit.homeip.net) | ||
or save the entire records data before and after a update. It's up to you. Visual Audit Trail is also more flexible than other auditing solutions with "when and what" should get audited by using conditional expressions. The possibilities are almost limitless. One application handles both Centura and SQL Server databases. Why is auditing important? Allow database | |||
Updated: 3, 2005 | Rating: 42 | Author: Ben Rosato | Size: 4992 kb | Commercial Go to category: Business > Databases & Tools Similar programs | |||
193. | AccountUnity 1.0 (silkmoth.net) | ||
environment. AccountUnity delivers unprecedented levels of privacy, security, speed and ease of access to information and services for users who hold accounts with financial, stock broking, insurance, airlines, utilities and other services. View an online summary of all your accounts in real time, then | |||
Updated: 3, 2005 | Rating: 102 | Author: N/A N/A | Size: 777 kb | Freeware Go to category: Business > Accounting & Finance Similar programs | |||
194. | Data Destroyer 1.5 (braintwist-studios.com) | ||
Each application you use generates its own history data, access logs, temporary data files, and each file contains time and date stamps. To ensure corporate and personal data security, this information, along with any Recycle Bin activity, all of which constitutes an electronic data trail, should be securely deleted so to avoid corporate or personal information leakage. But | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
195. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
All data collected through the monitoring are saved to an encrypted log file. The program runs completely hidden in the background so you can monitor whenever you want. Stealth technology ensures that PC Activity Monitor Net™ is completely hidden from everyone except you. Only you can launch or delete PC Activity Monitor Net™. This lets you secretly monitor anything viewed on your | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
196. | @KeyLogger Home 2.10 (activity-tracker.com) | ||
is the highly flexible, all-round desktop security monitoring solution used by concerned parents, small businesses, and "Fortune 500" companies alike. @KeyLogger is also popular for many special tasks like software usability testing or scientific studies of PC usage. So how do you know what your staff, children, spouse or significant other type on your computer when you are | |||
Updated: 8, 2004 | Rating: 48 | Author: Konstantin Romanovsky | Size: 959 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
197. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
it unique are its powerful keyboard logger - so powerful, it even logs the keystrokes entered during Windows 2000/XP login. And ActMon has a unique "kernel-level" file protection: Files are not just hidden! They are completely inaccessible to unauthorized users. Files cannot be removed or manipulated by an unauthorized user or so called spyware "cleaner" applications or any other | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
198. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
2 is a new update to our popular HWPE software. HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
199. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
200. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel. PC Acme Standard supports | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Security log software |
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|