|
||||||
|
||
|
Home > System log software |
Related keywords: system, System, system tray, encryption system, SYSTEM, content management system, billing system, system cleaner, system utility, file system |
|
|
391. | Paper Shredder 1.3 (winmeta.com) | ||
and timed intervals Smart Eject CD-ROM, when windows shutdown or log off Compatible with Internet Explorer (4.x or higher) Compatible with Windows 98, 2000, ME, XP Friendly install interface and Complete uninstall capabilities. Paper Shredder is a clean system that helps protect your privacy. It will delete Internet Cache, History, Cookies, Location bar address; Clear | |||
Updated: 9, 2005 | Rating: 0 | Author: Duo Yi | Size: 715 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
392. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
393. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
394. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
395. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
396. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
397. | PowerGREP 3.2.2 (jgsoft.com) | ||
do not know in advance exactly what you are looking for. PowerGREP's rich Perl-compatible regular expression support allows you to search for virtually anything by specifying the form of what you want, and let PowerGREP find the actual text matching that form. PowerGREP's documentation includes a detailed regular expression tutorial, with many simple and complex examples | |||
Updated: 2, 2006 | Rating: 16 | Author: Jan Goyvaerts | Size: 3705 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
398. | SecurDesk! 5.32 (cursorarts.com) | ||
or just need a way to keep novice users from tampering with the system settings, SecurDesk! offers many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide confusing and irrelevant items from selected users, to simplify training tasks, etc. SecurDesk! is a complete replacement for the Windows default | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
399. | SmartSync Pro 2.11 (smsync.com) | ||
reduces synchronization time. A flexible and extensive filtering system lets keep synchronized only the files/folders you need. You will find also a set of built-in features such as task scheduler, data compression, activity logging and password protection. SmartSync Pro can track up to 100 files versions, supports starting of external applications before and after synchronization | |||
Updated: 2, 2006 | Rating: 39 | Author: SmartSync Software | Size: 2167 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
400. | SMB File Sniffer 1.0.0.1 (microolap.com) | ||
transmitted within a LAN. SMB File Sniffer allows you to: - log SMB file operations with two levels of logging: detailed and errors only; - intercept files transmitted within a LAN by SMB protocol (Windows and non-Windows servers are supported); - select one of the network adapters, installed on your system, to log the packet stream of this certain adapter; | |||
Updated: 9, 2005 | Rating: 0 | Author: microOLAP Technologies | Size: 1378 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > System log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|