|
||||||
|
||
|
Home > Monitor note software |
Related keywords: monitor, note, network monitor, Monitor, Note, server monitor, sticky note, note taking, web monitor, keyboard monitor |
|
|
51. | Fraction Shape-Up 1.00 (meritsoftware.com) | ||
be referred to during practice. The program is self-paced and self-monitored. Students advance as they demonstrate readiness. Scores are tracked in a record management system that allows teachers to view and print detailed reports. Designed for students in U.S. grades 3 through 5 (ages 8 and up), the software can also be used by older students. Fraction Shape-Up. Introduces | |||
Updated: 9, 2005 | Rating: 0 | Author: Ben Weintraub | Size: 58 kb | Shareware Go to category: Education > Mathematics Similar programs | |||
52. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few tools to | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
53. | WatchDog 8.4 (sarna.net) | ||
limits, protects and monitors what your users do on the computer. Limit how much they use the computer and when. Put time limits on programs or stop them from ever running. Block web sites other web material. Protect your Windows machine by restricting where they go and what they can change. Monitor web sites, applications, chat rooms and emails. Record what they type and | |||
Updated: 9, 2005 | Rating: 613 | Author: Watchdog Development | Size: 7073 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
54. | WDumpEvt 2.2 (eventlog.com) | ||
WDumpEvt is an administration tool that makes it easy to view and manage all the informations from Windows NT/2000 logs: Ask for system, security, application log or file information. View, print or dump the list of events, user, failure or ras sessions, or print jobs. Dump the data to a file in Ask for eventlog information. View, print, dump list of events, user/ras sessions, or print jobs. Dump the data in ASCII-delimited, CSV or html format. Schedule all these actions | |||
Updated: 9, 2005 | Rating: 0 | Author: Isabelle Vollant | Size: 395 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
55. | Winvestigator 2.4 (tropsoft.com) | ||
and runs undetectable in Windows capturing keystrokes, URL's, mouse-clicks, and screen shots to an encrypted log file. Winvestigator can be set to email the log for remote viewing. Winvestigator's settings are fully customizable. Each Settings section has mouse-over help that displays a quick explanation at the top of the screen. A web style interface and thorough | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 795 kb | Demo Go to category: System Utilities > Other Similar programs | |||
56. | Stealth KeySpy 2.0.0 (professionalglobalmarketing.com) | ||
IMPORTANT ANNOUNCEMENT for wives, husbands, parents, girlfriends, boyfriends, employers, teachers… ANYONE with a computer! * Have you ever suspected your spouse or partner of CHEATING online and wanted to know NOW? * Have you ever wondered what your kids are REALLY doing and seeing on the computer for · A reliable way to protect your kids online. · A powerful encryption utility for all your e-mails and personal documents. · A secure "real time" data back-up system. · An automated utility that records all PC activities | |||
Updated: 9, 2005 | Rating: 48 | Author: Tom Eagar | Size: 700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
57. | RemoteExec 3.07 (isdecisions.com) | ||
action scheduler. - Interactive and background run modes - Monitor remote script and batch launching from the administration console. - Run “telnet like” sessions on a remote computer. - Perform conditional updates according to: OS version, Computer (workstation/server), Internet Explorer version, Service Pack level, or a specific registry value/key. - Create and save | |||
Updated: 9, 2005 | Rating: 0 | Author: Alastair Volrath | Size: 527 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
58. | Plug-and-Play Monitor 1.0 (Build 6.2) (noeld.com) | ||
Monitor is an experimental tool which displays plug-and-play notifications from the system. To start monitoring, select a device type from the drop-down list or tick Monitor all device types and click Start. If a network adapter is plugged or unplugged while the program monitors Network Adapters, the program should display the name of the adapter | |||
Updated: 9, 2005 | Rating: 0 | Author: Noel DANJOU | Size: 84 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
59. | Print Censor ME 1.0 (usefulsoft.com) | ||
Print Censor ME is a very simple in use program for management of statistics of printed jobs on the printers, used on Your computers. This program is invoked to help to you, when it is not enough of standard means of audit Windows. Using Print Censor ME you always will know who, how many, when and what | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Egorov | Size: 228 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
60. | ProBot 2.5.0 (nethunter.cc) | ||
is a powerful and effective computer monitoring solution. Primary task of this feature-packed surveillance system is user activity event interception and logging. ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Monitor note software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|