|
||||||
|
||
|
Home > Key monitoring software |
|
|
51. | Atom Time Synchronizer 3.7.9 (lmhsoft.com) | ||
time between computers, and can also act as a time server. Key Features: 1. Synchronize time with NIST atomic time servers 2. Synchronize time bewteen computers 3. Can act as a time server 4. Proxy support: Socks4/Socks4A/Socks5/HTTP 5. Support SNTP (the Simple Network time protocol) 6. Support the TIME protocol 7. Can be invoked at the command line, and called in | |||
Updated: 2, 2006 | Rating: 130 | Author: - - | Size: 663 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
52. | Ardamax Keylogger 2.4 (ardamax.com) | ||
maintain a backup of your typed data automatically or use it to monitor your kids. Ardamax Keylogger Features: Hidden mode - Ardamax Keylogger will run in hidden mode, preventing users from knowing it is active. It will NOT show in the Uninstall list, the Task Manager, or the Application menu | |||
Updated: 2, 2006 | Rating: 12034 | Author: Maxim Frolov | Size: 286 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
53. | Anti-keylogger 7.1.1 (anti-keyloggers.com) | ||
of very different operation principles. Due to the Anti-keylogger's protection spy software will not be able to record and steal your sensitive information, passwords, logins, PIN (Personal Identification Number) etc. Anti-keylogger works transparently for the user and silently, asking the user no questions thus excluding user's probability of error when making a decision | |||
Updated: 2, 2006 | Rating: 107 | Author: Raytown Corporation LLC | Size: 2979 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
54. | Anti-keylogger 7.1.1 (anti-keyloggers.com) | ||
of very different operation principles. Due to the Anti-keylogger's protection spy software will not be able to record and steal your sensitive information, passwords, logins, PIN (Personal Identification Number) etc. Anti-keylogger works transparently for the user and silently, asking the user no questions thus excluding user's probability of error when making a decision | |||
Updated: 2, 2006 | Rating: 82 | Author: Raytown Corporation LLC | Size: 2979 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
55. | Advanced Registry Tracer 2.04 (elcomsoft.com) | ||
of system and software tweaks. Safely test your Registry using ART's filters that you can customize (and save) for any particular experiment. If you don't like a change, simply use ART's undo function to quickly bring the Registry right back to exactly the way it was before you made the change | |||
Updated: 2, 2006 | Rating: 706 | Author: Vladimir Katalov | Size: 1733 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
56. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at your monitor and he has it all! Introducing Active Screen Lock, the unique security application by DMVSoft, allowing you to do whatever you want to do when you are away from the computer without having to worry a second. Active Screen Lock operates as follows | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
57. | Active Key Logger 3.0 (winsoul.com) | ||
Key Logger this is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Key Logger on your computer, it will allow you to make program settings for tracking activities on your computer. If you enable "Run Active Key Logger when windows start" then the program will run | |||
Updated: 2, 2006 | Rating: 242 | Author: Alex Atushev | Size: 703 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
58. | Remote Task Manager 3.8.2 (ntutility.com) | ||
devices, processes, events, shared resources and performance monitor, making each of these very easy to control. A Systems Administrator can start or stop services or devices, add new services or devices, manage the run level and adjust the security (permissions, auditing and owner). The Process Function and the Task Manager allows remote termination and adjusting of priority. An | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 2339 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
59. | Network Analysis and Troubleshooting PRO5.5 (javvin.com) | ||
allow you to unerstand network health quickly. Packet Analyzer Key Features: Smart Real-time packet capturing and analyzing; Reconstructs TCP/IP sessions and enables you to see data in their original format; Capture, display and save transaction information such as user name and password and the entire message Capture Pop/Pop3, IMAP/IMAP4 and SMTP mails, display and save in | |||
Updated: 2, 2006 | Rating: 17 | Author: Javvin Tech | Size: 5500 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
60. | Mirador Instant Messenger 4.0.2.6 (e-securion.com) | ||
manage additional modules, perform queries on the database, monitor the activity on the server and retrieve statistics for the IM network. Unique to Mirador Instant Messenger is the inclusion of advanced functionality such as Remote Control and a powerful update mechanism requiring minimum intervention from an IT staff. When enabled, the automatic update mechanism ensures that | |||
Updated: 2, 2006 | Rating: 0 | Author: Jack Boulay | Size: 38928 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
|
Home > Key monitoring software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|