|
||||||
|
||
|
Home > Log in software |
|
|
481. | Socket Workbench 3.1 (tcpiq.com) | ||
or a socket server. - Allows any number of clients to connect while in Server mode. - Intercept and analyse socket communications using the Pass-Through mode. - Includes a library of the well-known socket port numbers and servers. - Author and send e-mails using the e-mail protocol template | |||
Updated: 9, 2005 | Rating: 0 | Author: Dave Apelt | Size: 4440 kb | Shareware Go to category: Communications > Other Comms Tools Similar programs | |||
482. | Stealth Activity Reporter 4.6 (trading-tools.com) | ||
and abuse easily and invisibly using password-protected encrypted log files. You can deploy this tool using e-mail. Simply send an e-mail to the person using the computer you want to monitor. STAR will then be installed silently on this computer and the person will never notice that this programm is running. This application monitors and logs: Keystrokes User names | |||
Updated: 9, 2005 | Rating: 65 | Author: Peter Zierl | Size: 1510 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
483. | SurfStatsLive Reporting Server 2.1.0.1 (aidsoft.com) | ||
product. It is an on-demand live stats solution for hosts, ISP's and other organizations. It provides browser-based real-time reports for clients. SurfStatsLive can read log sources from the Windows web server it is installed on and log sources on other web servers on the local area network (LAN). It can also be set up as a Statistics Bureau. Some of the features | |||
Updated: 9, 2005 | Rating: 0 | Author: John Calitz | Size: 12824 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
484. | TelnetXQ Server 2.6.2 (datawizard.net) | ||
scripts, optional NT integrated authentication, concurrent logons, log access, real-time session shadowing, configurable ports, and banners. Also includes built in network diagnostics showing all network card/IP address information, routing table information, current network connections, byte | |||
Updated: 9, 2005 | Rating: 0 | Author: Rahim Mawji | Size: 3803 kb | Commercial Go to category: Servers > Other Server Applications Similar programs | |||
485. | ThePhoneBOT 3.0 (thephonebot.com) | ||
with mapquest like maps. Screensavers. Trillian Plugin!! Here's how it works. First, when the phone rings, PhoneBOT will alert you by verbally announcing who is calling using callerID and windows speech technology. A custom "skinable" window appears detailing the callerID info as well as any image you have associated with that caller. (ie, a picture of mom appears when she | |||
Updated: 9, 2005 | Rating: 0 | Author: marksch | Size: 1280 kb | Shareware Go to category: Communications > Telephony Similar programs | |||
486. | PopX 1.5 (mysite.verizon.net) | ||
itself automatically. There is no forever-running program sitting in the system tray, monitoring browser activities and using up system resources. PopX is a smart popup zapper. It neither asks you to maintain a black list nor blindly blocks any new windows. Instead PopX uses an intelligent algorithm to decide which pop-up windows are "real" pop-ups and block them even before they | |||
Updated: 9, 2005 | Rating: 0 | Author: Software PopX | Size: 1445 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
487. | PresenTense NTP Auditor 3.7 (bytefusion.com) | ||
NTP Auditor monitors your computer's built-in clock and compares it's time to the real time. Most computer clocks lose or gain time so within a few days, your computer does not show the real time. Many software packages claim to synchronize your computer to atomic clocks or satellite clocks on the internet but how do you really know that your computer's | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 1731 kb | Demo Go to category: System Utilities > Other Similar programs | |||
488. | PrivacyDefence 1.3 (privacydefence.com) | ||
programs and system tracks without breaking their functionality, it's fully customizable and supports 18 programs. Left as is, unwanted system logs can seriously impair your confidentiality because all your Internet activity can be easily recovered: Web pages you've viewed, pictures you've opened, videos you've seen, programs you've launched are all in these logs | |||
Updated: 9, 2005 | Rating: 0 | Author: MCMK Corp. | Size: 1594 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
489. | Ranking Booster 2.0 (rankingbooster.com) | ||
Popularity. We are here to help you with the biggest asset and that's traffic! The Ranking Booster® software will boost your Alexa rankings but it will also help increase your Google® listings as well!! When Google® index's your site it will see in your log that you are receiving | |||
Updated: 9, 2005 | Rating: 39 | Author: Amedeo Caputo | Size: 617 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
490. | ReGet Deluxe 3.3 (deluxe.reget.com) | ||
or dial-up connection, dial-up users can utilize the built-in dial-up integration to schedule dialing up to your ISP, downloading and then hanging up. Built-in Search pane helps you to find music in MP3 format and other files. Another innovative feature valuable to dial-up users is ReGet Deluxe's ability to lower its traffic if you're browsing the web-sites | |||
Updated: 9, 2005 | Rating: 0 | Author: ReGet Software | Size: 1542 kb | Shareware Go to category: Network & Internet > Download Managers Similar programs | |||
|
Home > Log in software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|