|
||||||
|
||
|
Home > Remote control software |
Related keywords: control, remote, access control, parental control, Control, remote access, Remote, version control, activex control, remote administration |
|
|
231. | Task-Menu for Georgia Softworks 2.50 (task-menu.com) | ||
Telnet Server - GSW. Task-Menu can be accessed locally or through remote telnet access. Control almost all server functions: You can access via PDA, Palm or Pocket PC. Manage NT passwords / groups and Windows registry changes. Access your application log files run your configuration batch | |||
Updated: 9, 2005 | Rating: 42 | Author: John East | Size: 1480 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
232. | ChurchBells 4.2.4 (InspiredCode.net) | ||
Church Bell Tower Carillon Chimes System for $140. Great outreach ministry! Beautiful Harmonious Bells. User friendly scheduler. Set often or once all year, add music, times, seasons, events. Now your Desktop, Home, Church, Bank, Clubhouse or Civic Organization can afford its own Clock BellTower. This | |||
Updated: 9, 2005 | Rating: 0 | Author: Robison Bryan | Size: 53710 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
233. | Advanced KEYLOGGER 1.5 (mykeylogger.com) | ||
KEYLOGGER is a powerful surveillance tool, which now can offer total control over computer activity to any PC user in the world. Advanced KEYLOGGER records every keystroke, including passwords and logins, to encrypted easy-to-understand logs and can send reports secretly to your e-mail address or any number of other e-mails, specified by you. Advanced KEYLOGGER monitors the Internet | |||
Updated: 9, 2005 | Rating: 251 | Author: Marianna Gorenstein | Size: 918 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
234. | AlertMobile Pro 4.0.1 (softsecurity.com) | ||
list - Sending of SMS alerts to the security administrator's mobile phone - Receiving of control commands from the security administrator's mobile phone - Protection from unauthorized external access - Protection from unauthorized physical access With control commands you can remotely administer your computer via mobile phone. Just send the | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 593 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
235. | Anasil 3.2 (anasil.net) | ||
for distributed Ethernet networks. System architecture is based on a remote Agent modules what enables IT managers to remotely monitor and manage a multi-segment networks from one central console. Anasil consists of three modules: network discovery and mapping, network traffic monitoring and frame capturing, network event recording and alerting. Anasil delivers detailed and | |||
Updated: 2, 2006 | Rating: 149 | Author: A plus C A plus C | Size: 39924 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
236. | Desktop Scout 4.0 (globalpatrol.net) | ||
hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop, transfer files, start and stop programs, launch web sites and documents, log off, restart or shutdown the computer remotely. Beyond | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
237. | DeviceLock 5.73 (protect-me.com) | ||
gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
238. | R-Studio Data Recovery Software 2.0 (r-tt.com) | ||
recovers files both on local logical and physical disks and disks on remote computers over the networks, even if their partition structures are damaged or deleted. Unformat, unerase and file recovery after FDISK, MBR destruction, FAT damaged, virus infection. Creates drive image for further data recovery. Dynamic disk support. Damaged RAID (Volume and Stripe sets) reconstruction | |||
Updated: 9, 2005 | Rating: 1988 | Size: 2099 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
239. | Stealth Keyboard Interceptor for Win NT/2000/XP 6.0.1 (keylogger.biz) | ||
the powerful program, suitable for perfect monitoring of user's computer activity. Stealth Keyboard Interceptor for Windows NT/2000/ XP (SKIn2000) is a monitoring program which allows to intercept all keystrokes, mouse clicks, captions of active windows, static text and | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation | Size: 467 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
240. | Windows Spy 1.003 (bysoft.se) | ||
Spy monitors a remote computer invisibly by streaming video to a viewer on your computer. You will know exactly what is happening on the remote computer as you see it in real-time. Some applications are: - Monitor your computer from a remote location. - Parents can monitor what their children are doing. - Demonstrate programs remotely. Windows Spy has two | |||
Updated: 9, 2005 | Rating: 42 | Author: Jon Kagstrom | Size: 2000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Remote control software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|