|
||||||
|
||
|
Home > Security log software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
41. | GetAnonymous 1.2 (getanonymous.com) | ||
Internet Explorer Toolbar, Compatibility, Real-time Activity Log). GetAnonymous List of Features is considered the most wide-ranging of online privacy software. First time to introduce the proxy chain technology, GetAnonymous allows you to stand behind multiple proxies. This provides you with more protection and privacy than ever. GetAnonymous not only allows you to use a proxy | |||
Updated: 9, 2005 | Rating: 42 | Author: David Adreson | Size: 5996 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
42. | GetAnonymous V2.0 - Personal Edition 2 (coftware.com) | ||
Internet Explorer Toolbar, Compatibility, and Real-time Activity Log). GetAnonymous List of Features is considered the most wide-ranging of online privacy software. First time to introduce the proxy chain technology, GetAnonymous allows you to stand behind multiple proxies. This provides you with more protection and privacy than ever. GetAnonymous not only allows you to use a proxy | |||
Updated: 9, 2005 | Rating: 90 | Author: Tom Brett | Size: 10240 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
43. | Imaginary Telnet Server 1.0 (whizkidtech.redprince.net) | ||
One of the possible attacks is by using the Telnet protocol to log into your system. If successful, the attacker can gain complete control of your system. With the Imaginary Telnet Server running, he will be served a fake response which will prevent him from accessing any resources available on your system. The server will give him the impression that he has found a top secret | |||
Updated: 3, 2005 | Rating: 97 | Author: G. Adam Stanislav | Size: 38 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
44. | iNet Shaper 2.191 (winfiles32.com) | ||
of each user, has remote administration, activity monitor, activity logs. Router identifies user by IP address and by MAC address of incoming packet. Also, user can gain access to internet using logon utility included in distribution. Traffic shaper gives the posiibility of bandwidth redistribution among LAN users in case of limited internet connection speed which saves bandwidth for | |||
Updated: 3, 2005 | Rating: 90 | Author: UIP RU | Size: 4100 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
45. | Instant Message Grabber 2.0 (bitsplash.com) | ||
passworded access and monitoring functions to supervise children's activity online. IM Grabber is a utility to automatically record AOL Instant Messenger or AOL IM conversations. Additonal features include: Searching, Ignoring and Closing IMs from specific users. Optional security and monitoring functions are also | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Bent | Size: 1705 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
46. | Internet Timer 3 3.0.348 (internet-timer.co.uk) | ||
ultimate online tracking and control software, designed to log online usage while displaying real-time session costs on-screen. iT3 supports world call schemes, application processing, custom events, restrictions, limits and includes a comprehensive log viewer showing filterable listings, user | |||
Updated: 9, 2005 | Rating: 39 | Author: Peter Chamberlin | Size: 4332 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
47. | ActMon STARR Computer and Internet Monitoring *PRO Edition* 3.27a (iOpus.com) | ||
individuals to track the use / abuse of PCs easily and invisibly. It logs screenshots, keystrokes, user names, passwords, path names, access times, windows titles, BOTH sides of a CHAT conversation, AOL and visited websites into a password protected encrypted file. In the stealth mode STARR does NOT | |||
Updated: 2, 2006 | Rating: 222 | Author: ActMon GmbH | Size: 998 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
48. | KF Web Server 2.5 (keyfocus.net) | ||
and amateur web developers alike. Supports: CGI, sophisticated security settings, multiple ports, file caching, HTTP Compression, MIME settings, directory indexes, custom error messages and remote administration. KF Web Server is a free HTTP Server that can host an unlimited number of web sites. Its small size, low system requirements and easy administration make it the perfect | |||
Updated: 9, 2005 | Rating: 42 | Author: KeyFocus Team | Size: 694 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
49. | Link Logger - Linksys nonProtocol 2.1.0.19 (LinkLogger.com) | ||
and when your users are going on the internet. With LINK LOGGER's comprehensive traffic analysis features you can generate professional reports and graphs showing all aspect of your network and internet usage, exportable in a number of formats. LINK LOGGER is an affordable professional logging tool with all the features including remote notification, custom alarms, hostname and whois | |||
Updated: 9, 2005 | Rating: 0 | Author: Blake McNeill | Size: 2910 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
50. | Link Logger - Linksys Protocol 2.1.0.19 (LinkLogger.com) | ||
and when your users are going on the internet. With LINK LOGGER's comprehensive traffic analysis features you can generate professional reports and graphs showing all aspect of your network and internet usage, exportable in a number of formats. LINK LOGGER is an affordable professional logging tool with all the features including remote notification, custom alarms, hostname and whois | |||
Updated: 9, 2005 | Rating: 0 | Author: Blake McNeill | Size: 2842 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
|
Home > Security log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|