|
||||||
|
||
|
Home > Log on software |
|
|
521. | Remind! 5.53 (crystaloffice.com) | ||
start applications or open documents; and shut down, reboot, log off, or power down your system. A reminder can also check for new email, dial phone numbers, display startup messages, synchronize system time via the Internet, send messages, and open a specified Web address. In addition, you can display a stay-on-top Clock, as well as have the program chime or speak the | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 2022 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
522. | Remote Access 1.0 (nawab.1cis.com) | ||
control , file transfers , telnetting , remote shutdown , remote log-in/;log-off etc..and very cheap. It is a very essential tool for remote administrator working on remote locatons and also providing remote Support and help . Compared to other softwares on the internet , Remote Access 1.0 is a very cheap and affordable software . Special Discounts are offered to | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahamed Abdulla | Size: 2558 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
523. | RPN Engineering Calculator 6.3.2 (j-a-associates.com) | ||
y-reg; xВІ; square root of x; 1/x; and 8 constants involving pi are on all but the Binary keypad. Standard, Engineering and Trig keypads also have a function to convert between polar and rectangular coordinates. Engineering and Magnetics keypads let you select the units used in many of the | |||
Updated: 2, 2006 | Rating: 0 | Author: Jim Allen | Size: 1466 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
524. | RunAs Professional 3 (mast-computer.de) | ||
Professional is a substitute for Microsoft's command runas. RunAs Professional solves the problem that normal runas does not support the commandline parameter password. Now you can use RunAs Professional to install software, use it in batch skripts and much more. If you use RunAs Professional you can start an application with other credentials without log off and | |||
Updated: 9, 2005 | Rating: 0 | Author: Steffen Epple | Size: 111 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
525. | SafeLogon 2.0 (gemiscorp.com) | ||
the days of the week and the time of the day the user is allowed to log on and use the system. - Define temporary users who expire after a number of logins and/or when the system reaches a date limit. - Keep a log or track of all the users making use of the system, including the failed logon attempts. - Export the whole program configuration to easily extend it from one | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 2291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
526. | SC-KeyLog Free 2.25 (soft-central.net) | ||
users activity and saves it to an encrypted logfile. The software logs all typed keystrokes, button mouse-clicks, window titles, the date and time of entered characters/mouse-clicks, system information and logged on usernames in stealth. An optional mailing feature allows you to automatically send the logfile to a specified email address on a user defined interval. Use | |||
Updated: 9, 2005 | Rating: 7925 | Author: Alexander van Trijffel | Size: 407 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
527. | Scopeware Vision 2.2 (scopeware.com) | ||
Vision catalogs every file and email on your PC or shared network drive. A simple word search instantly brings up every match, similar to a search engine only for your desktop files and email. Scopeware Vision also lets you browse your information by creating a visual 3D like desktop, piled high with virtual index cards each representing a file or email. These cards are | |||
Updated: 3, 2005 | Rating: 46 | Author: James McGann | Size: 18758 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
528. | SecurDesk! 5.32 (cursorarts.net) | ||
actions; Prevent Ctrl+Alt+Del and other key combos; Task Manager; Log off users after a specified period; limit usage days and times; expire user permissions; restrict to only a single instance of a program; and much more... See how this complete shell replacement can help you control access, maintain a common desktop across multiple machines, protect data, etc. A secure | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
529. | SecureWallet 1.01 (coolutils.com) | ||
card - requires a password. The PC is no exception. These days, not only must you remember the log-on code for your ISP account but also the user names and passwords for the many Web sites that require registration. The solution to this mess is a SecureWallet. SecureWallet saves all your passwords securely in an encrypted file so that you never forget any password | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Buzaev | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
530. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
ISA) and for OS Platforms (Windows 2000, NT, XP). Due to it's web based interface Sentry Pro can be configured and administered, locally or remotely, thorough any browser from any location in the world, without needing any client components. By monitoring your network performance, Sentry Pro notifies you each time a specific or critical event occurs, allowing you to take | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Log on software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|