|
||||||
|
||
|
Home > Log on software |
|
|
221. | GetAnonymous 1.2 (getanonymous.com) | ||
Internet Explorer Toolbar, Compatibility, Real-time Activity Log). GetAnonymous List of Features is considered the most wide-ranging of online privacy software. First time to introduce the proxy chain technology, GetAnonymous allows you to stand behind multiple proxies. This provides you with more protection and privacy than ever. GetAnonymous not only allows you to use a | |||
Updated: 9, 2005 | Rating: 42 | Author: David Adreson | Size: 5996 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
222. | GetAnonymous V2.0 - Personal Edition 2 (coftware.com) | ||
Internet Explorer Toolbar, Compatibility, and Real-time Activity Log). GetAnonymous List of Features is considered the most wide-ranging of online privacy software. First time to introduce the proxy chain technology, GetAnonymous allows you to stand behind multiple proxies. This provides you with more protection and privacy than ever. GetAnonymous not only allows you to use a | |||
Updated: 9, 2005 | Rating: 90 | Author: Tom Brett | Size: 10240 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
223. | GL-AD Popup Terminator 1.81 (gleanersoft.com) | ||
windows generated by web pages and kill them before they appear on the screen. It includes a user-friendly interface for you to customize it. You can build up your own url list of sites that their popup windows should not be killed, disable/enable ad popup killer, disable/enable tray icon, or even return Internet Explorer context-menu to its original settings. Get this smart popup | |||
Updated: 9, 2005 | Rating: 0 | Author: James Dong | Size: 788 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
224. | Gotta Know Now - Web Page Watcher 2.6m (members.bellatlantic.net) | ||
as well as the web page containing the information just found in it's browser window. It will run in the background while you are away or at your computer doing other work. Thus you can use Gotta Know Now to monitor a business news wire web site for a press release on your stock. Or you can | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick DiRienzo | Size: 787 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
225. | Happy Log 1.61 (axolot.com) | ||
Log is a log file analyzer that examines log files from your web site. Reports are generated as lists or graphs, and can be exported as HTML, Word or Excel files. You will get statistics on: Hits and visitors, which browser and OP-system are used, how the visitors are moving around, search engines, errors, targets (is the visitors doing what you want them to | |||
Updated: 3, 2005 | Rating: 0 | Author: Lars Arvidsson | Size: 1622 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
226. | HiClock Pro 3.19 (hiclock.com) | ||
converted to local time and compared with the internal system time on the computer, and adjustments are made if necessary. Time check automatically after connection. The program has advanced alarm system and support skins. The professional version works like a time server in your local network. HiClock Pro gives you an easy and thorough way to synchronize your system clock to the | |||
Updated: 9, 2005 | Rating: 42 | Author: Alexander Kardailsky | Size: 1052 kb | Shareware Go to category: Network & Internet > Timers & Time Synch Similar programs | |||
227. | HiDialer 2000 PRO 3.2.19 build 1110 (kgsoft.com) | ||
to an ISP using ill-thought built-in Windows tools may be tricky on busy lines. Besides connecting via modem there is a task of keeping the connection alive as long as we want it to be and a task of monitoring connection speed and performance, keeping stats, re-dialing the lost connection and many other tasks a dialing program of our dreams should be able to accomplish. Finding and | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Kardailsky | Size: 812 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
228. | Imaginary Telnet Server 1.0 (whizkidtech.redprince.net) | ||
One of the possible attacks is by using the Telnet protocol to log into your system. If successful, the attacker can gain complete control of your system. With the Imaginary Telnet Server running, he will be served a fake response which will prevent him from accessing any resources available on your system. The server will give him the impression that he has found a top | |||
Updated: 3, 2005 | Rating: 97 | Author: G. Adam Stanislav | Size: 38 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
229. | iNet Shaper 2.191 (winfiles32.com) | ||
of each user, has remote administration, activity monitor, activity logs. Router identifies user by IP address and by MAC address of incoming packet. Also, user can gain access to internet using logon utility included in distribution. Traffic shaper gives the posiibility of bandwidth redistribution among LAN users in case of limited internet connection speed which saves bandwidth for | |||
Updated: 3, 2005 | Rating: 90 | Author: UIP RU | Size: 4100 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
230. | Inox 4.2 (vmoon.com.pl) | ||
activity and mail statistics and browse events logged to system log. Inox is provided with Windows Installer database, which makes installation quick, and system safe. The software is licensed on per-server basis with no user mailbox limitation. Registration price includes 180-days free technical support. Mail connector designed for transfering messages from any POP3 | |||
Updated: 3, 2005 | Rating: 0 | Size: 2379 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Log on software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|