|
||||||
|
||
|
Home > Log files software |
Related keywords: files, hide files, Files, PDF files, compare files, protect files, duplicate files, delete files, recover files, multiple files |
|
|
611. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
612. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and profitability | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
613. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
614. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
615. | Ping Alarm 1.4 (Pingalarm.narod.ru) | ||
of a sending requests and their amount. Alarm can issue sound. Log-file is exist. Position of forms are saving before quit. Tray. This small and convenient program is intended for watching for presence computers at the Net. The program sends the request with a specific interval, determined by the user to selected | |||
Updated: 9, 2005 | Rating: 0 | Author: Roman Balabolko | Size: 290 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
616. | PowerGREP 3.2.2 (jgsoft.com) | ||
find information in files and folders across your computer or network, even if you do not know in advance exactly what you are looking for. PowerGREP's rich Perl-compatible regular expression support allows you to search for virtually anything by specifying the form of what you want, and let PowerGREP find the actual text matching that form. PowerGREP's | |||
Updated: 2, 2006 | Rating: 16 | Author: Jan Goyvaerts | Size: 3705 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
617. | SecurDesk! 5.32 (cursorarts.com) | ||
a complete replacement for the Windows default Explorer.exe desktop/file manager shell. SecurDesk! Features Include: a desktop interface which can be custom designed; Logging of system usage; Enhanced file management with optional restrictions; Virtual desktops; Data protection with | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
618. | SmartSync Pro 2.11 (smsync.com) | ||
as backing up My Documents folder or MS Outlook / Outlook Express files. You simply create a backup / sync profile just once and forget all the data mess problems for good. The application replicates only new and updated files which substantially reduces synchronization time. A flexible and | |||
Updated: 2, 2006 | Rating: 39 | Author: SmartSync Software | Size: 2167 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
619. | SMB File Sniffer 1.0.0.1 (microolap.com) | ||
File Sniffer is a powerful network security utility for logging SMB protocol (sometimes called NetBIOS over TCP) files operations and capturing file bodies, transmitted within a LAN. SMB File Sniffer allows you to: - log SMB file operations with two levels of | |||
Updated: 9, 2005 | Rating: 0 | Author: microOLAP Technologies | Size: 1378 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
620. | Trash it! 1.80 (optimussw.com) | ||
Windows platform. If you try out various applications from CD's or the net, and if you are tired of having them mess up your hard drive with files you don't really need, then Trash it! is for you. Use Trash it! to free up your hard drive of files that you have no need for, thus leaving more space for the files that you really need. Just run Trash it! once | |||
Updated: 9, 2005 | Rating: 0 | Author: Mustafa Lokhandwala | Size: 1708 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Log files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|