|
||||||
|
||
|
Home > Time log software |
Related keywords: time, real time, Time, time tracking, time management, time zone, world time, time clock, time server, time sheet |
|
|
241. | dfg ShutDown XP 3.9.1 (dfg1.netfirms.com) | ||
program is a professional shutdown, automation, atomic time synchronizing, disk cleaning and PC protection utility - the best you can get today. dfg ShutDown XP gives you an easy and thorough time controlled and automatic way to shutdown, restart or log off your system with optional power off and shutdown forcing (no questioning). Optionally it will run as a NTservice | |||
Updated: 9, 2005 | Rating: 42 | Author: victoria gross | Size: 1113 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
242. | Absurd Terminator 2.9 (nesoft.org) | ||
improved; - minor bugs fixed. Main functions:- Shutdown/Restart/Log off Windows with help of hot keys or by one click on system tray icon; - Shutdown/Restart/Log off Windows from command line, using terminator.exe /shutdown /restart /logoff (for .bat-files or shedullers and planers); - Terminate any running program, task or process quicker and comfortable than in standard | |||
Updated: 9, 2005 | Rating: 134 | Author: Alexey Rykov | Size: 304 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
243. | Access Boss 2.2 (fspro.net) | ||
to effectively restrict access to a PC for certain users based on time factor. All you have to do is install Access Boss under an Administrator account, run the program and choose which users' access time should be restricted. To do so, you simply mark the required hour(s) of any day of | |||
Updated: 2, 2006 | Rating: 175 | Author: FSPro Labs | Size: 933 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
244. | Access Lock 2.83 (softheap.com) | ||
a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio alert and logged to disk. The only thing | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
245. | Access Lock 2.83 (getfreefile.com) | ||
a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio alert and logged to disk. The only thing | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
246. | AccuBell Talking Caller ID 3.2 (accubell.com) | ||
distance call. Pop-up window shows callers Name, Number, Date and Time before you answer. Date and Time have region and country choices. Easy two button navigation on Main Display. Stores unlimited calls log history with full sorting capability of callers name, number, date and | |||
Updated: 9, 2005 | Rating: 158 | Author: John King | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
247. | Active System Locker 3.0 (sowsoft.com) | ||
an informative message to other users. You can set start/stop times for users to limit their access to your PC. Any action performed by System Locker is optionally recorded to log file and accompanimented with sound. Main features of System Locker: secure mouse and keyboard input blocking, powerful startup and automation options, audit and scheduling features, resistance | |||
Updated: 9, 2005 | Rating: 138 | Author: Vladimir Sinitsyn | Size: 611 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
248. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at your monitor and he has it all! Introducing Active Screen Lock, the unique security application by DMVSoft, allowing you to do whatever you want to do when you are away from the computer | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
249. | Advanced CheckSum Verifier 1.5.0 (irnis.net) | ||
files will allow in further easily to verify their integrity at any time. This program is especially effective if you have many files, many subdirectories, or both. And it's extremely fast and lightweight. Uses checksum files fully compatible with popular md5sum utility for MD5 and SFV (Simple File Verification) for CRC32. The program features: -- Possibility to | |||
Updated: 9, 2005 | Rating: 530 | Author: Irnis Haliullin | Size: 348 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
250. | Advanced Web-Page Efficiency Analysis (AWPEA) 1.5.2 (aks-labs.com) | ||
Log-analyzers can tell you how many times where the page requested form you server and a lot of other interest but useless information. AWPEA tells you nothing besides the level of page efficiency. AWPEA was designed as a tool that helps software authors to find out the efficiency of some | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Savkin | Size: 528 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Time log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|