|
||||||
|
||
|
Home > Key log software |
|
|
51. | 1 Click & Lock 2.83 (softstack.com) | ||
can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from | |||
Updated: 2, 2006 | Rating: 56 | Author: IM Soft | Size: 1338 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
52. | 12Ghosts ShutDown 7.10 (12ghosts.com) | ||
down with one click or with one key stroke. Run maintenance programs, daily or at certain days of the week, for example scan disk and backup programs. Just one click, then leave your computer and it will power-off automatically after all programs finished. Initiate an "auto-logon as a different user" - without waiting for the insert-password-now dialog box. Dual-boot directly into a | |||
Updated: 9, 2005 | Rating: 147 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
53. | 1st Atomic Time 2.12 (greenparrots.com) | ||
the time at Windows startup without wasting your computer's resources. You can keep a log of all operations to check the activity. You can configure 1st Atomic Time to operate as a time server. Then you can ensure you have the exact time on any computer in your network. 1st Atomic Time can adjust the system time correctly even if you have irregular Windows time | |||
Updated: 9, 2005 | Rating: 0 | Author: Green Parrots Software | Size: 707 kb | Shareware Go to category: Network & Internet > Timers & Time Synch Similar programs | |||
54. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
Network, Passwords, Printers, and System. You can disable your boot keys, DOS programs, Registry editing and network access. You have got an ability to hide your desktop icons, individual drives, Start menu items and the taskbar features, it enables you to stop others from tampering with your desktop. If you set up the special list of allowed applications nobody will run unwanted | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
55. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
Network, Passwords, Printers, and System. You can disable your boot keys, DOS programs, Registry editing and network access. You have got an ability to hide your desktop icons, individual drives, Start menu items and the taskbar features, it enables you to stop others from tampering with your desktop. If you set up the special list of allowed applications nobody will run unwanted | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
56. | 4Diskclean Gold 5.5 (4diskclean.com) | ||
including temporary data, old backups, duplicated files and DLL's, all files viewed in Web browser and stored in cache, cookies and the history of url's visited. and invalid Windows registry keys (see complete list below). Free disk space , fix and prevent errors in your system and speed it up with 4Diskclean Software. View charts of disk usage and disk settings to | |||
Updated: 2, 2006 | Rating: 214 | Author: RSS Systems | Size: 1462 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
57. | Absolute Key Logger 2.5.283 (lastbit.com) | ||
Key Logger is a small program that records all keystrokes into a log file, so that you can use this data later. You can use Absolute Key Logger to: - restore lost typed text. Computers can suddenly crash, freeze or get accidentally reloaded. Or you can lose your text data while filling out web forms (this happens quite frequently due to sever misconfiguration or | |||
Updated: 9, 2005 | Rating: 82 | Author: Vitas Ramanchauskas | Size: 613 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
58. | Absurd Terminator 2.9 (nesoft.org) | ||
improved; - minor bugs fixed. Main functions:- Shutdown/Restart/Log off Windows with help of hot keys or by one click on system tray icon; - Shutdown/Restart/Log off Windows from command line, using terminator.exe /shutdown /restart /logoff (for .bat-files or shedullers and planers); - Terminate any running program, task or process quicker and comfortable than in | |||
Updated: 9, 2005 | Rating: 134 | Author: Alexey Rykov | Size: 304 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
59. | Access Lock 2.83 (softheap.com) | ||
to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio alert and logged to disk. The only thing is available in this mode is a pop-up password-entry dialog with an input area for the password that restores your desktop to working condition. Access Lock enables | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
60. | Access Lock 2.83 (getfreefile.com) | ||
to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio alert and logged to disk. The only thing is available in this mode is a pop-up password-entry dialog with an input area for the password that restores your desktop to working condition. Access Lock enables | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Key log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|