|
||||||
|
||
|
Home > Draught software |
|
|
571. | Remote Keylogger 2.7 (aidsoft.com) | ||
Record every keystroke in a computer and send it to you via email. The log-file includes the title of the application that typed in and the date and time while typing. Record every keystroke in a computer and send it to you via email. The log-file includes the title of the application that typed in and the date and time while typing. | |||
Updated: 9, 2005 | Rating: 998 | Author: Fly Lange | Size: 115 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
572. | RunAs Professional 3 (mast-computer.de) | ||
Professional is a substitute for Microsoft's command runas. RunAs Professional solves the problem that normal runas does not support the commandline parameter password. Now you can use RunAs Professional to install software, use it in batch skripts and much more. If you use RunAs Professional you can start an application with other credentials without log off and log on | |||
Updated: 9, 2005 | Rating: 0 | Author: Steffen Epple | Size: 111 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
573. | SafeLogon 2.0 (gemiscorp.com) | ||
SafeLogon is a multi-user and password-based access control utility that enhances and complements the Windows built-in logon and authentication system. In other words, SafeLogon allows you to protect your system at home and office from unauthorized access. SafeLogon is fully configurable and allows its | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 2291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
574. | SC-KeyLog Free 2.25 (soft-central.net) | ||
SC-KeyLog is a powerful, invisible keylogger that captures all users activity and saves it to an encrypted logfile. The software logs all typed keystrokes, button mouse-clicks, window titles, the date and time of entered characters/mouse-clicks, system information and logged on usernames in stealth. An | |||
Updated: 9, 2005 | Rating: 7925 | Author: Alexander van Trijffel | Size: 407 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
575. | Schedule 3.5.34 (evans-programming.com) | ||
to password dialogs and to other windows. Schedule also has it's own built-in 'EMac' macro language with IDE (Integrated Development Environment). The IDE combines a macro editor, intuitive wizards and macro testing tools to make macro creation easy (for developers and for non-programmers). With EMac you can create macros to automate very complex tasks. Schedule is feature-rich even | |||
Updated: 9, 2005 | Rating: 0 | Author: David Evans | Size: 6006 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
576. | SecurDesk! 5.32 (cursorarts.net) | ||
Whether you are responsible for multiple computers in a corporate office, or just need a way to keep novice users from tampering with the system settings, SecurDesk! offers many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
577. | SecurDesk! LV 5.32 (cursorarts.com) | ||
A highly customizable desktop environment for Windows which locks down icons, buttons and hotspots. Your desktop can hold multiple animated icons, sound, buttons, wallpaper, images, text, and other elements. You can spread icons across multiple password-protected pages so you have much more room to arrange | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 3168 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
578. | SecureWallet 1.01 (coolutils.com) | ||
Passwords are a part of life! Just about everything - your ATM card, your house alarm, your calling card - requires a password. The PC is no exception. These days, not only must you remember the log-on code for your ISP account but also the user names and passwords for the many Web sites that require Just about everything - your ATM card, your house alarm, your calling card - requires a password. The PC is no exception. SecureWallet is a digital key chains for your computer | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Buzaev | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
579. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
ISA) and for OS Platforms (Windows 2000, NT, XP). Due to it's web based interface Sentry Pro can be configured and administered, locally or remotely, thorough any browser from any location in the world, without needing any client components. By monitoring your network performance, Sentry Pro notifies you each time a specific or critical event occurs, allowing you to take | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
580. | Serial Logger Service 1.0 (muconsulting.com) | ||
Records all data received on a serial port to a file on a disk. It was originally designed to record telephone traffic data from a corporate phone system (PBX) for later analysis. For this reason, it was designed to be very robust and includes features to notify an administrator if no data is received in a | |||
Updated: 9, 2005 | Rating: 0 | Author: Claudio Fahey | Size: 450 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Draught software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|