|
||||||
|
||
|
Home > Log files software |
Related keywords: files, hide files, Files, PDF files, compare files, protect files, duplicate files, delete files, recover files, multiple files |
|
|
651. | Data Destroyer 1.5 (braintwist-studios.com) | ||
Each application you use generates its own history data, access logs, temporary data files, and each file contains time and date stamps. To ensure corporate and personal data security, this information, along with any Recycle Bin activity, all of which constitutes an electronic data trail, should be securely deleted so to avoid corporate or personal information leakage | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
652. | Downloadz Master 2.8 (otiumation-inc.com) | ||
can help you to create collections of photos, videos and music files easily and automatically! Set your selection criteria and DownloadZ Master will do the work! DownloadZ Master will scan the entire World Wide Web or selected sites and automatically retrieve all pictures, music files and video files that meet your criteria! You can view the files at your own | |||
Updated: 8, 2004 | Rating: 0 | Size: 23022 kb | Demo Go to category: System Utilities > Other Similar programs | |||
653. | Ghost Keylogger 3.80 (keylogger.net) | ||
surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
654. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
All data collected through the monitoring are saved to an encrypted log file. The program runs completely hidden in the background so you can monitor whenever you want. Stealth technology ensures that PC Activity Monitor Net™ is completely hidden from everyone except you. Only you can launch | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
655. | Trash it! 1.71 (trashituninstaller.com) | ||
for Microsoft Windows. If you try out various pograms from CD's or the net, and if you are tired of having them mess up your hard drive with files you don't really need, then Trash it! is for you. Use Trash it! to free up your hard drive of files that you have no need for, thus leaving more space for the files that you really need. Just run Trash it! once | |||
Updated: 8, 2004 | Rating: 42 | Author: Mustafa Lokhandwala | Size: 1691 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
656. | BPS Spyware and Adware Remover 8.2.0.0 (bulletproofsoft.h4host.com) | ||
include a new Spy Add/Remove utility which uses the installer log files to uninstall all the components that the spyware programs have installed on your PC system, and an automatic update system that keeps your level of protection up-to-date. Scans & Removes traces of recognized spy components from your system such as Adware, AdBreak, AdvertBar, Alexa, Aureate, BDE | |||
Updated: 8, 2004 | Rating: 1064 | Author: Naglaa Elbanhawy | Size: 7383 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
657. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
it unique are its powerful keyboard logger - so powerful, it even logs the keystrokes entered during Windows 2000/XP login. And ActMon has a unique "kernel-level" file protection: Files are not just hidden! They are completely inaccessible to unauthorized users. Files cannot be removed or manipulated by an unauthorized user or so called spyware "cleaner" | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
658. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
2 is a new update to our popular HWPE software. HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
659. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel. PC Acme Lite supports | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
660. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel. PC Acme Standard | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Log files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|