|
||||||
|
||
|
Home > Log keyboard software |
Related keywords: keyboard, Keyboard, midi keyboard, keyboard monitor, keyboard macro, keyboard utility, keyboard logger, virtual keyboard, keyboard spy, keyboard macros |
|
|
51. | 1 Click & Lock 2.83 (softstack.com) | ||
can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from | |||
Updated: 2, 2006 | Rating: 56 | Author: IM Soft | Size: 1338 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
52. | 12Ghosts ShutDown 7.10 (12ghosts.com) | ||
NT/2000/XP, restarts without user intervention. It allows you to log off your computer after a specified time of inactivity, or makes sure to restart your computer weekly. It saves you time by automating the shut down process, and even terminates not responding programs. Shut down with one click or with one key stroke. Run scan disk and backup programs programs, daily or at certain | |||
Updated: 9, 2005 | Rating: 147 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
53. | 1st Atomic Time 2.12 (greenparrots.com) | ||
the time at Windows startup without wasting your computer's resources. You can keep a log of all operations to check the activity. You can configure 1st Atomic Time to operate as a time server. Then you can ensure you have the exact time on any computer in your network. 1st Atomic Time can adjust the system time correctly even if you have irregular Windows time | |||
Updated: 9, 2005 | Rating: 0 | Author: Green Parrots Software | Size: 707 kb | Shareware Go to category: Network & Internet > Timers & Time Synch Similar programs | |||
54. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
restrict access to the IE browser options. Also the program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents anybody to run the program and change settings and uninstall the program. The 'Import/Export' function helps you set up the same settings on several computers very easy | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
55. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
restrict access to the IE browser options. Also the program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents anybody to run the program and change settings and uninstall the program. The "Import/Export" function helps you set up the same settings on several computers very easy | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
56. | 4Diskclean Gold 5.5 (4diskclean.com) | ||
including temporary data, old backups, duplicated files and DLL's, all files viewed in Web browser and stored in cache, cookies and the history of url's visited. and invalid Windows registry keys (see complete list below). Free disk space , fix and prevent errors in your system and speed it up with 4Diskclean Software. View charts of disk usage and disk settings to help you | |||
Updated: 2, 2006 | Rating: 214 | Author: RSS Systems | Size: 1462 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
57. | Absolute Key Logger 2.5.283 (lastbit.com) | ||
Key Logger is a small program that records all keystrokes into a log file, so that you can use this data later. You can use Absolute Key Logger to: - restore lost typed text. Computers can suddenly crash, freeze or get accidentally reloaded. Or you can lose your text data while filling out web forms (this happens quite frequently due to sever misconfiguration or bad connection) | |||
Updated: 9, 2005 | Rating: 82 | Author: Vitas Ramanchauskas | Size: 613 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
58. | Absurd Terminator 2.9 (nesoft.org) | ||
improved; - minor bugs fixed. Main functions:- Shutdown/Restart/Log off Windows with help of hot keys or by one click on system tray icon; - Shutdown/Restart/Log off Windows from command line, using terminator.exe /shutdown /restart /logoff (for .bat-files or shedullers and planers); - Terminate any running program, task or process quicker and comfortable than in standard | |||
Updated: 9, 2005 | Rating: 134 | Author: Alexey Rykov | Size: 304 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
59. | Access Lock 2.83 (softheap.com) | ||
a password by several methods, prevent unauthorized access on boot, log the attemps of breaking the lock, allow people around to leave messages while your system is | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
60. | Access Lock 2.83 (getfreefile.com) | ||
a password by several methods, prevent unauthorized access on boot, log the attemps of breaking the lock, allow people around to leave messages while your system is | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Log keyboard software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|