|
||||||
|
||
|
Home > Log on software |
|
|
221. | Advanced KEYLOGGER 1.5 (mykeylogger.com) | ||
including passwords and logins, to encrypted easy-to-understand logs and can send reports secretly to your e-mail address or any number of other e-mails, specified by you. Advanced KEYLOGGER monitors the Internet activity precisely by logging all web-pages the user visits. Advanced KEYLOGGER records visual statistics of everything happening on the screen periodically | |||
Updated: 9, 2005 | Rating: 251 | Author: Marianna Gorenstein | Size: 918 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
222. | AIM Keys 3.10.9522 (aimsoft.com) | ||
3.1 features an new user interface and has been optimized to work on the newest operating systems. NEW! AIM Keys 3 is now an MDI (Multiple Document Interface) application, which allows several AIM Keys data files to operate at the same time. This is a major innovation! NEW! QuickList (formerly the ListBox) offers a larger selection of macros. There are now additional options | |||
Updated: 9, 2005 | Rating: 61 | Author: Randy Smith | Size: 2799 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
223. | Router IP Console 3.3.0.407 (innerdive.com) | ||
and its interfaces; SNMP GET BULK request can be used; raise alarms on critical situations (router's CPU overload, router's RAM exhausted, interface go to 'down' state) and send alert via e-mail; act as SYSLOG daemon: receive and log SYSLOG messages; receive, analyze and log SNMP traps; repeaters monitoring, control of | |||
Updated: 9, 2005 | Rating: 0 | Size: 2089 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
224. | Secure Network Chat 2.10.15 (networkmessengers.com) | ||
does not overload the network with useless traffic, for it occupies only up to 5% of the network resources even in case of the most active work of the chat members. With SNC chat communications are absolutely secure. All the client-server data communications protocol is encrypted with Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
225. | SurfStatsLive Reporting Server 3.0.0.1 (surfstats.com) | ||
product. Web Hosts and Service Providers can provide browser-based on-demand Website Statistics reports for clients with this tool. The program can generate reports down to sub-directory level, which is useful for web hosts with resellers. This program can also be set up as a Statistics Bureau for | |||
Updated: 9, 2005 | Rating: 0 | Author: SurfStats | Size: 18221 kb | Shareware Go to category: Web Development > Log Analysers Similar programs | |||
226. | U-Wipe 2.8 (u-wipe.com) | ||
with whom you are share it. Nobody will know what you are doing on your PC and find out where you have been. U-Wipe allows you to wipe out all your online activities, such as IE browser's cache, history, recent document list, cookies, auto complete forms and other tracks. U-Wipe allows you to clean tracks in MS Windows and MS Office, such as temporary files, MRU lists | |||
Updated: 9, 2005 | Rating: 0 | Author: Artemiy Babamuratov | Size: 2140 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
227. | U-Wipe 2.7 (u-wipe.com) | ||
PC or who you share it with: nobody will know what you are doing on your PC or find out where you have been. U-Wipe cleans all your online activities, such as IE browser's cache, history, recent document list, cookies, auto complete forms and other tracks. U-Wipe lets you clean tracks in MS | |||
Updated: 9, 2005 | Rating: 120 | Author: Artemiy Babamuratov | Size: 2083 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
228. | U-Wipe 2.0 (u-wipe.com) | ||
higher, Microsoft Office 97 and 2000, Netscape 6, Mozilla, and so on. You can plan the deleting process by running the utility manually or automatically (on schedule). An additional "Boss key" feature has been added to hide IE Windows without showing them in the Windows Task Manager by Alt+Space hot keys. In new version 2.0 you will find an inventive option: Pop-up killer | |||
Updated: 9, 2005 | Rating: 60 | Author: Artemiy Babamuratov | Size: 1971 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
229. | U-Wipe 2.5 (u-wipe.com) | ||
with whom you are share it. Nobody will know what you are doing on your PC and find out where you have been. U-Wipe allows you to wipe out all your online activities, such as IE browser's cache, history, recent document list, cookies, auto complete forms and other tracks. U-Wipe allows you to clean tracks in MS Windows and MS Office, such as temporary files, MRU lists | |||
Updated: 9, 2005 | Rating: 16 | Author: Artemiy Babamuratov | Size: 2271 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
230. | HiClock Pro 3.19 (kgsoft.com) | ||
converted to local time and compared with the internal system time on the computer, and adjustments are made if necessary. Time check automatically after connection. The program has advanced alarm system and support skins. The professional version works like a time server in your local network. HiClock Pro gives you an easy and thorough way to synchronize your system clock to the | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Kardailsky | Size: 1052 kb | Shareware Go to category: Network & Internet > Timers & Time Synch Similar programs | |||
|
Home > Log on software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|