|
||||||
|
||
|
Home > Computers software |
|
|
471. | LaptopLocate.net 2.9.2 (tometasoftware.com) | ||
LaptopLocate.net is a software utility that will monitor a computer's IP address to allow server administrators and general users to locate their computer. Using cutting edge technology, each time a computer that has LaptopLocate.net is turned on, the IP address of the computer is transmitted to a pre-determined location via email and logged for | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 4839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
472. | Keylogger Hunter 2.1 (styopkin.com) | ||
of a keylogger. Thus, you have an opportunity to install on your computer and use a special program, which would play a role of a “second echelon” for your data security. Utility for blocking the activity of keyboard monitoring programs presumably running on your PC. Neutralizes up to 90% of keyloggers, depriving them of information about the pressed | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexander Styopkin | Size: 611 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
473. | KGB Free Key Logger 1.93 (refog.com) | ||
- it records all typed data, so that you won't lose it when your computer unexpectedly crashes, and it keeps the record of all keyboard activity. It allows you to monitor your children's activity at home or to make sure your employees do not use company's computers inappropriately. There are three versions of keylogger - Free KGB Key Logger, KGB Keylogger and | |||
Updated: 2, 2006 | Rating: 2482 | Author: ReFog Software | Size: 1477 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
474. | KGB Spy 3.93 (refog.com) | ||
- it records all typed data, so that you won't lose it when your computer unexpectedly crashes, and it keeps the record of all keyboard activity. It allows you to monitor your children's activity at home or to make sure your employees do not use company's computers inappropriately. There are three versions of keylogger - Free KGB Key Logger, KGB Keylogger and | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
475. | Junk-Out for Outlook 2003/2002/2000 1.0 (theofficemaven.com) | ||
Junk-Out keeps junk mail out of your Microsoft Outlook Inbox, using a combination of statistical methods (Bayesian filtering) and information you provide, to show only e-mail messages you want to see. The more you use Junk-Out, the better it gets at distinguishing useful e-mail, and getting junk out of your | |||
Updated: 2, 2006 | Rating: 0 | Author: Mike Craven | Size: 10536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
476. | JIT Scheduler 8.30 (gibinsoft.net) | ||
as well as launch an application (.exe). You can also turn off your computer at the desired time and show text messages which remind about some important events. It is useful for scheduling different routines : virus scanning, disk checking and defragmentation, system shutdown etc. You don't need to | |||
Updated: 2, 2006 | Rating: 42 | Author: Igor V. Polyakoff | Size: 678 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
477. | Instant File Name Search 1.4 (sowsoft.com) | ||
of name or mask (*.pdf, pentium?.jpg, *nirvana*.mp3 etc.) on your computer or local network. IFNS offers support of Boolean operators (AND, OR, NOT), database management (you can create several search databases: my computer, all music, CD etc.), hot keys and a convenient, Explorer like | |||
Updated: 2, 2006 | Rating: 0 | Author: Vladimir Sinitsyn | Size: 460 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
478. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of information | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
479. | IdentaFone Multi-Line Caller ID Software 3.99 (identafone.com) | ||
downloads calls from the hardware that were received when the computer is shut down for weekends and evenings. CID screen pops that use multi-line Caller ID hardware from Rochelle, TCI, Zeus Phonstuff Inc, or YES Telecom for monitoring up to 100+ lines. CID over LAN, line status, memos, forwarding to pagers and email, reports, speech and detailed | |||
Updated: 2, 2006 | Rating: 0 | Author: IdentaFone Software | Size: 2752 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
480. | IconChanger 3.5 (shelllabs.com) | ||
is a software application that makes changing icons fun and easy. It's a hassle-free way to personalize your desktop without having to open up any computer manuals. Simply click the icon you want to change, point at the one you like and that's all. Change icons to make navigation easier, to group similar applications together, or merely to customize and spice up your | |||
Updated: 2, 2006 | Rating: 434 | Author: Marat Maksyutov | Size: 1128 kb | Shareware Go to category: Graphic Apps > Icon Tools Similar programs | |||
|
Home > Computers software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|