|
||||||
|
||
|
Home > Log keyboard software |
Related keywords: keyboard, Keyboard, midi keyboard, keyboard monitor, keyboard macro, keyboard utility, keyboard logger, virtual keyboard, keyboard spy, keyboard macros |
|
|
61. | U-Wipe 2.0 (u-wipe.com) | ||
With U-Wipe, you can easily manage digital certificates through three modes of safety, and delete the tracks in Microsoft Windows and Microsoft Office, temporary files, and more. U-Wipe supports such applications as Microsoft Internet Explorer 4.1 and higher, Microsoft Office 97 and 2000, Netscape 6, Mozilla | |||
Updated: 9, 2005 | Rating: 16 | Author: Artemiy Babamuratov | Size: 1971 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
62. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
63. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
64. | SecurDesk! 5.32 (cursorarts.com) | ||
actions; Prevent Ctrl+Alt+Del and other key combos; Task Manager; Log off users after a specified period; limit usage days and times; expire user permissions; restrict to only a single instance of a program; and much more... See how this complete shell replacement can help you control access, maintain a common desktop across multiple machines, protect data, etc. A secure shell | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
65. | Codename Alvin - PC Spy Software for Windows 2.2.1 (codename-alvin.com) | ||
Alvin PC Spy allows you to monitor keyboard, internet, screen and application activity with ease. Great to keep an eye on what your kids are up to when your not there, or your staff! Easy to use and cheap to register, free download is available so you can try the software fully before registering. PC monitoring software - Its about taking control. Monitors and logs | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Henshaw | Size: 133 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
66. | Desktop Scout 4.0 (globalpatrol.net) | ||
which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop, transfer files, start and stop | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
67. | PAL Keylogger Pro 1.01 (palsol.com) | ||
visited. All this discreetly and will silently email all the logs to you! PAL Keylogger will secretly record EVERY keystroke on any computer including passwords and will record websites visited. All this discreetly and will silently email all the logs to | |||
Updated: 9, 2005 | Rating: 42 | Author: Christian Champion | Size: 1150 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
68. | Advanced KEYLOGGER 1.5 (mykeylogger.com) | ||
including passwords and logins, to encrypted easy-to-understand logs and can send reports secretly to your e-mail address or any number of other e-mails, specified by you. Advanced KEYLOGGER monitors the Internet activity precisely by logging all web-pages the user visits. Advanced KEYLOGGER records visual statistics of everything happening on the screen periodically (customizable | |||
Updated: 9, 2005 | Rating: 251 | Author: Marianna Gorenstein | Size: 918 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
69. | AIM Keys 3.10.9522 (aimsoft.com) | ||
to preview and edit macro syntax on the fly! NEW! Macro and Task log files. AIM Keys can automatically track your activities and store them for future reference. NEW! Security options. Now you may secure every facet of AIM Keys interface from macros to the entire application. Encrypt your sensitive macros such as passwords to prevent others from using or viewing them. NEW | |||
Updated: 9, 2005 | Rating: 61 | Author: Randy Smith | Size: 2799 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
70. | Secure Network Chat 2.10.15 (networkmessengers.com) | ||
Secure Network Chat (SNC) - is a text chat able to solve all the problems in communication between your company staff members cardinally. SNC is especially designed to work with medium and large local area networks, but it is also convenient for small local networks consisting of two and up to several dozens | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
|
Home > Log keyboard software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|