|
||||||
|
||
|
Home > Access log software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access, last access |
|
|
51. | D_back 1.60.3 (backupforall.com) | ||
of all startups, errors and warning messages are registered in text log files. In addition exists possibility to notify user by e-mail about starting/ending, errors or warnings of each backup job. Reliable data-backup tool for any computer running Windows. Implements various types of backups in major | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
52. | D_back 1.60.3 (svap.pp.ru) | ||
of all startups, errors and warning messages are registered in text log files. In addition exists possibility to notify user by e-mail about starting/ending, errors or warnings of each backup job. Reliable data-backup tool for any computer running Windows. Implements various types of backups in major | |||
Updated: 2, 2006 | Rating: 0 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
53. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
of information theft crimes are conducted without having network access to target machine. Most of us prefer not to turn computer off while we are away for coffee or going to the lavatory or have to attend a meeting in a conference room next door. That is the point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
54. | Active Key Logger 3.0 (winsoul.com) | ||
By choosing hot keys that are comfortable for you, you can view log file when the program is running by stealth. Active Key Logger can also send the log file to your e-mail, thus enabling you to view it from other places and track any activities on your computer. If you want to know what's going on your computer then you need Active Key Logger. Active Key Logger this is | |||
Updated: 2, 2006 | Rating: 242 | Author: Alex Atushev | Size: 703 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
55. | Access Lock 2.83 (getfreefile.com) | ||
Access Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
56. | Access Lock 2.83 (softheap.com) | ||
Access Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
57. | Access Boss 2.2 (fspro.net) | ||
Access Boss is a unique easy-to-use tool, a real lifesaver for a system security administrator that enables you to effectively restrict access to a PC for certain users based on time factor. All you have to do is install Access Boss under an Administrator account, run the program and | |||
Updated: 2, 2006 | Rating: 175 | Author: FSPro Labs | Size: 933 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
58. | 1st Screen Lock 6.14 (softheap.com) | ||
enables you to spy on your PC users by fixing all user moves in a log file. This is very useful, when you need to know what your children or personnel do at the time you are away. Each user of 1st Screen Lock has its own password used to unlock locked PC. Password protection works in such a way that your users are unable to see user statistics, change options, or remove the program | |||
Updated: 2, 2006 | Rating: 479 | Author: Ixis Ltd | Size: 1106 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
59. | 1 Click & Lock 2.83 (softstack.com) | ||
can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from the system tray, log access attempts, and apply a custom | |||
Updated: 2, 2006 | Rating: 56 | Author: IM Soft | Size: 1338 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
60. | Capturix NETWorks 3.11.156 (capturix.com) | ||
Lookup and a worldwide WHOis client. Exploit tester and Bandwidth Log. Now It brings the Connection Watcher software. PingCheck lets you ping a list of servers and send a e-mail in case of malfunction. Now includes a Packet Sniffer for debugging operations. Capturix NETWorks is a network utility software that ables you to test and diagnose all common problems from any | |||
Updated: 2, 2006 | Rating: 258 | Author: Alexandre Simoes | Size: 3911 kb | Shareware Go to category: Network & Internet > Trace & Ping Tools Similar programs | |||
|
Home > Access log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|