|
||||||
|
||
|
Home > Log software |
|
|
271. | Modem Spy 3.4 (modemspy.com) | ||
6) Has built-in software automatic gain control (AGC). 7) Detect and log Caller ID information. 8) Pop up caller ID info. 9) Super Spy mode will hide Modem Spy behaviour. Nobody will know that you are recording phone calls. Modem spy records all telephone calls, records from microphone, plays back | |||
Updated: 9, 2005 | Rating: 0 | Author: SoftCab Inc | Size: 253 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
272. | ASP - IIS real-time monitor and log 2.60 (pstruh.cz) | ||
current state and progress of each running request in IIS. Lets you log IIS state. Real-time monitoring of running ISAPI scripts (.asp, .cgi, .idc, .idq ...) Real-time monitoring of big downloads Current number of running requests (scripts/downloads) Current state of the request Script start time and running time with precision up to milisecond. Request and response content-length | |||
Updated: 9, 2005 | Rating: 16 | Author: Antonin Foller | Size: 1091 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
273. | U-Wipe 2.0 (u-wipe.com) | ||
With U-Wipe, you can easily manage digital certificates through three modes of safety, and delete the tracks in Microsoft Windows and Microsoft Office, temporary files, and more. U-Wipe supports such applications as Microsoft Internet Explorer 4.1 and higher, Microsoft Office 97 and 2000, Netscape 6, Mozilla | |||
Updated: 9, 2005 | Rating: 16 | Author: Artemiy Babamuratov | Size: 1971 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
274. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
275. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
276. | SecurDesk! 5.32 (cursorarts.com) | ||
actions; Prevent Ctrl+Alt+Del and other key combos; Task Manager; Log off users after a specified period; limit usage days and times; expire user permissions; restrict to only a single instance of a program; and much more... See how this complete shell replacement can help you control access, maintain a common desktop across multiple machines, protect data, etc. A secure shell | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
277. | SMB File Sniffer 1.0.0.1 (microolap.com) | ||
transmitted within a LAN. SMB File Sniffer allows you to: - log SMB file operations with two levels of logging: detailed and errors only; - intercept files transmitted within a LAN by SMB protocol (Windows and non-Windows servers are supported); - select one of the network adapters, installed on your system, to log the packet stream of this certain adapter; - collect | |||
Updated: 9, 2005 | Rating: 0 | Author: microOLAP Technologies | Size: 1378 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
278. | Trash it! 1.80 (optimussw.com) | ||
Windows platform. If you try out various applications from CD's or the net, and if you are tired of having them mess up your hard drive with files you don't really need, then Trash it! is for you. Use Trash it! to free up your hard drive of files that you have no need for, thus leaving more space for the files that you really need. Just run Trash it! once before you install a | |||
Updated: 9, 2005 | Rating: 0 | Author: Mustafa Lokhandwala | Size: 1708 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
279. | Utalk Network Messenger 1.00 (unicorntech.net) | ||
Network (LAN) Messenger with File Transfer, Reminder Service and Logs. Message Encryption with Blowfish Algorithm. Multicasting and Broadcasting Supported. Multiple File Attachments Supported. Attractive Interface and Easy to Use. Reminder Utility Added. Logs of The communication Supported. A Network (LAN) Messenger with File Transfer, Reminder Service and Logs | |||
Updated: 9, 2005 | Rating: 0 | Author: Parish Meghani | Size: 623 kb | Commercial Go to category: Communications > Chat & Instant Messaging Similar programs | |||
280. | Windows Spy 1.003 (bysoft.se) | ||
Windows Spy monitors a remote computer invisibly by streaming video to a viewer on your computer. You will know exactly what is happening on the remote computer as you see it in real-time. Some applications are: - Monitor your computer from a remote location. - Parents can monitor what their children are | |||
Updated: 9, 2005 | Rating: 42 | Author: Jon Kagstrom | Size: 2000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|