|
||||||
|
||
|
Home > Time log software |
Related keywords: time, real time, Time, time tracking, time management, time zone, world time, time clock, time server, time sheet |
|
|
271. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
records unauthorized access violations in a protected event-log file with a time and date stamped description of the threat. The system records key stroke activity that may provide clues as to the intruder’s intentions or their identity. Notification Services – Theft Recovery ComputerSafe sends various types of remote notifications when violations occur | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
272. | CSS Quick Backup 2.21 (css-software.com) | ||
execution of the backup jobs and provides access to comprehensive log files that show all backup activity. The integrated Job Wizard is used to create backup jobs, define the execution schedule and password protect the archive files as required. Restorations are performed using the integrated Restore | |||
Updated: 3, 2005 | Rating: 0 | Author: Kevin Whynot | Size: 4809 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
273. | D_back 1.60.3 (backupforall.com) | ||
results of all backup activities can be completely checked up at any time. The standard output of scheduled tasks, the history of all startups, errors and warning messages are registered in text log files. In addition exists possibility to notify user by e-mail about starting/ending, errors or | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
274. | Data Destroyer 1.5 (braintwist-studios.com) | ||
Each application you use generates its own history data, access logs, temporary data files, and each file contains time and date stamps. To ensure corporate and personal data security, this information, along with any Recycle Bin activity, all of which constitutes an electronic data trail, should be securely deleted so to avoid corporate or personal information leakage. But | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
275. | Delenda 2.415 (peccatte.karefil.com) | ||
of files in each structure. It lets you define daily purge time and exclude some days of the week. With Delenda you can suppress files in one directory when they reach 7 days, transfer those that have more than 12 hours to another directory and move those documents not accessed during last 3 months to an archive folder on the same disk or toward a network drive. Once set up | |||
Updated: 2, 2006 | Rating: 203 | Author: Patrick Peccatte | Size: 2232 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
276. | Desktop Scout 4.0 (globalpatrol.net) | ||
contains several integrated tools which work together at the same time to record all programs used, keystrokes typed, web sites visited, files created or changed, and a screenshot logger which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
277. | DirSync Directory Synchronizer 3.0.4 (archersoft.com) | ||
transfer security attributes, transfer folder creation/modification time, keep deletion files, file revisioning, pre/post-sync process, error handling, path variables and detailed log, etc. The synchronization is based on the policy specified by user to copy those files which are different | |||
Updated: 2, 2006 | Rating: 0 | Author: Frank Archer | Size: 2851 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
278. | Downloadz Master 2.8 (otiumation-inc.com) | ||
You can view the files at your own convenience without wasting your time waiting for downloads. Features of DownloadZ Master include: Pre-selected address collections or you can create your own list of addresses to surf and download materials Set time limits for DownloadZ Master's Internet connection Set limits on how many pages DownloadZ Master will surf on each | |||
Updated: 8, 2004 | Rating: 0 | Size: 23022 kb | Demo Go to category: System Utilities > Other Similar programs | |||
279. | Dr.Web Anti-Virus for Workstations 4.31.a (advancedforce.com) | ||
for Workstations and it will do all the work for you. The scanner’s unique ability of testing the system memory, detecting the most sophisticated Trojans and backdoor programs running in the background, which are untraceable by ordinary means, makes it a powerful weapon against any non-traditional | |||
Updated: 3, 2005 | Rating: 0 | Author: Igor Daniloff | Size: 4253 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
280. | DUST 1.2 (WayBeyondUK.com) | ||
family. You can also disconnect to the welcome screen in order to log on as a new user, this is how you create the logged on sessions between which you can subsequently switch. If you prefer the classic logon prompt but are not using it because you also want Fast User Switching, then this utility is what you want. It allows you to enable the classic logon prompt (via the setup | |||
Updated: 2, 2006 | Rating: 0 | Author: Nicholas Russell | Size: 1436 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Time log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|