|
||||||
|
||
|
Home > Time log software |
Related keywords: time, real time, Time, time tracking, time management, time zone, world time, time clock, time server, time sheet |
|
|
291. | FileTimeEdit 2 2.15 (foryoursoft.com) | ||
the undo function allow you to rollback the operation easily. It's easy to use: Add the files and/or directories that you want to edit to the FileList; use filter to select the exact files you want. You can also pick up the files one by one. Adjust the new date an time, and check the | |||
Updated: 9, 2005 | Rating: 16 | Author: Leo Feng | Size: 825 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
292. | GammaChron 1.0 (DesertViewSoftware.com) | ||
speech, 7 chimes or "Hour Only", chime frequency selection, "Quiet Time" option. Alarm Clock - Dual alarm plus "Nap", plays mp3, WAV, Midi or speech for sound, visual indicators, "Sleep" and "Reset", log. Calendar - Current day of month icon in system tray, scrollable calendar with events, time between selected days, atmosphere data for selected day, events list | |||
Updated: 9, 2005 | Rating: 120 | Author: David Rinehart | Size: 1046 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
293. | Ghost Keylogger 3.80 (keylogger.net) | ||
surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
294. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
2 is a new update to our popular HWPE software. HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
295. | HDD Temperature 1.3 (hddtemperature.com) | ||
users who have only single hard-drive and is totally free. Using S.M.A.R.T. technology included in all modern HDDs, HDD Temperature checks and monitors the temperature of your hard drives; you can also set the maximum value of drive temperature so that you will be warned should this temperature be exceeded. S.M.A.R.T. stands for "Self-Monitoring, Analysis and Reporting | |||
Updated: 3, 2005 | Rating: 48 | Author: Yuri Alexandrov | Size: 1016 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
296. | HSLAB Force Down 2.5 (hs-lab.com) | ||
and Restart; - Normal command Shutdown and Restart; - Command Log Off; - Accelerate shutdown automatically; - Start shutdown from command line; - Using "Hot Keys"; - Hook and execute a Windows shutdown; - Eject Removable media (if inserted). Also, some different external events can be processed: - Shutdown at selected day and time; - Shutdown when selected file | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Golub | Size: 1666 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
297. | IDEM File Synchronization 2.2i (peccatte.karefil.com) | ||
server toward another, checking a list of source folders at regular time intervals and updating target folders with new or modified files including sub-directories. Idem will check and copy files or folders security information ie ACL permissions on NTFS partitions and files and folders attributes ie hidden, system, archive, etc. Synchronize and transfer data across local or | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2203 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
298. | IP Mailer 2004d (wappu.tv) | ||
your ISP gives you a temorary IP address each time you log on, you can email your IP address automatically to your friends and office/home so that you can find your computer for remote access regardless of the constantly changing IP address. If you use your computer remotely or need to have | |||
Updated: 9, 2005 | Rating: 151 | Size: 1600 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
299. | KeyRobot 5.0 (keyrobot.com) | ||
you want it remembered. After that, the KeyRobot will automatically log you in every time you come to that page. NO typing! No remembering! And no more lost passwords! Form Helper: The KeyRobot instantly fills in any online form. When you are shopping online, the KeyRobot can automatically fill in all online forms with one-click. And on forms where the KeyRobot doesn't | |||
Updated: 3, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 2300 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
300. | Locked! 4.7.8 (jcmatt.com) | ||
securely protects your computer against access by others. It's proprietary multi-level structure integrates deeply within the Windows architecture, working with and controlling access until you unlock it with a password. Entries from the keyboard and mouse are blocked. Resetting or powering off the computer will not unlock it. Features include Boot Lock, StartUp Lock, Power Lock | |||
Updated: 2, 2006 | Rating: 0 | Author: James Matt | Size: 2980 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Time log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|