|
||||||
|
||
|
Home > Service log software |
Related keywords: service, customer service, Service, service centers, service center software, web service, customer service software, service management, service calls, appels de service |
|
|
261. | UserMonitor for Classroom or Computer Lab 1.7 (neuber.com) | ||
Ideal for teachers, instructors, or administrators. Monitoring: UserMonitor shows you what other network computer users see on their display screen. All programs being used are also listed (with path detail) in real time. A history and warning function is included. Demonstrating: UserMonitor is brilliant for | |||
Updated: 9, 2005 | Rating: 39 | Author: Alexander Neuber | Size: 1881 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
262. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
a completed inventory card for each computer/client. Upon initial log-in, users are requested to provide the system with the following information: Your Name, Room or department, Computer Brand, ID-Number. Vidamic Netlog then reports any changes made on each client log-in to the inventory | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
263. | Registry Analyst 1.2 (yavsoft.com) | ||
your computer's work is slow? Does your system crashes often? The reason of those problems possibly is a system registry. Each peace of software you install writes its own info into the system registry and sometimes does not clear this information after you removed it. Your system registry grows bigger and bigger and gets filled with out-of-date information. This can cause system | |||
Updated: 9, 2005 | Rating: 0 | Author: Yavsoft Corporation | Size: 440 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
264. | RegWorks 1.3.2 (regwrks.com) | ||
names of applications and processes that access registry keys and logs all relevant data (returned function code, registry key accessed, registry values etc.). This feature is critical to quickly diagnosing and solving any access rights issues that frequently arise in the corporate network environment. Importantly, RegWorks monitor features flexible filtering options that can be | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Loskutov | Size: 896 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
265. | RunAs Professional 3 (mast-computer.de) | ||
Professional is a substitute for Microsoft's command runas. RunAs Professional solves the problem that normal runas does not support the commandline parameter password. Now you can use RunAs Professional to install software, use it in batch skripts and much more. If you use RunAs Professional you can start an application with other credentials without log off and | |||
Updated: 9, 2005 | Rating: 0 | Author: Steffen Epple | Size: 111 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
266. | SafeLogon 2.0 (gemiscorp.com) | ||
the days of the week and the time of the day the user is allowed to log on and use the system. - Define temporary users who expire after a number of logins and/or when the system reaches a date limit. - Keep a log or track of all the users making use of the system, including the failed logon | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 2291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
267. | SecurDesk! 5.32 (cursorarts.net) | ||
actions; Prevent Ctrl+Alt+Del and other key combos; Task Manager; Log off users after a specified period; limit usage days and times; expire user permissions; restrict to only a single instance of a program; and much more... See how this complete shell replacement can help you control access, maintain a common desktop across multiple machines, protect data, etc. A secure shell | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
268. | SecureWallet 1.01 (coolutils.com) | ||
The PC is no exception. These days, not only must you remember the log-on code for your ISP account but also the user names and passwords for the many Web sites that require registration. The solution to this mess is a SecureWallet. SecureWallet saves all your passwords securely in an encrypted file so that you never forget any password again. The encryption is done by strong | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Buzaev | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
269. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
ISA) and for OS Platforms (Windows 2000, NT, XP). Due to it's web based interface Sentry Pro can be configured and administered, locally or remotely, thorough any browser from any location in the world, without needing any client components. By monitoring your network performance, Sentry Pro notifies you each time a specific or critical event occurs, allowing you to take | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
270. | Serial Logger Service 1.0 (muconsulting.com) | ||
Unlike most other serial logging applications, Serial Logger Service runs as a service so that it starts as soon as the operating system starts and doesn't require a user to log in and run it. Records all data received on a serial port to a file on a disk. It was originally designed to record telephone traffic data from a corporate phone system (PBX) for later | |||
Updated: 9, 2005 | Rating: 0 | Author: Claudio Fahey | Size: 450 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Service log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|