|
||||||
|
||
|
Home > Activity software |
|
|
711. | RemoteExec 3.07 (isdecisions.com) | ||
target computer lists as templates for future use. - Detailed activity result logging. - Command line mode, to remotely run RemoteExec actions from a script or with the task scheduler. EXAMPLES OF USE: - Remotely install Service Packs, security patches, hotfixes, and Windows Installer Packages (.msi files) like XP SP2. - Modify remote registries with .reg file. - Inform | |||
Updated: 9, 2005 | Rating: 0 | Author: Alastair Volrath | Size: 527 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
712. | RJ System File Checker 2.0 (rjudge.freeshell.org) | ||
Getting a lot of Illegal Operations? The problem may be with old versions of system files conflicting with new versions of the same system files. On Windows-based systems, particularly with Windows 95 and 98, software applications that you install may install an updated system file. But instead of replacing | |||
Updated: 8, 2004 | Rating: 0 | Author: Russell Judge | Size: 1058 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
713. | SC-KeyLog Free 2.25 (soft-central.net) | ||
is a powerful, invisible keylogger that captures all users activity and saves it to an encrypted logfile. The software logs all typed keystrokes, button mouse-clicks, window titles, the date and time of entered characters/mouse-clicks, system information and logged on usernames in stealth. An optional mailing feature allows you to automatically send the logfile to a specified | |||
Updated: 9, 2005 | Rating: 7925 | Author: Alexander van Trijffel | Size: 407 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
714. | Secure Disk Pro 3.0 (securedisk.netfirms.com) | ||
Disk Pro completely eliminates all hidden evidence of activities on your computer and allows you to clean up the history of all activities on your PC. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files history, your temporary files, recycle bin, clean recent documents lists for | |||
Updated: 8, 2004 | Rating: 114 | Author: DD Software | Size: 1030 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
715. | Security Task Manager 1.6f (neuber.com) | ||
trojans. SpyProtector deletes traces of your Internet and computer activity and prevents keyboard input monitoring. Furthermore SpyProtector warns you when the registry is changed. Snapfiles.com wrote: "Overall, a very useful TaskManager for novice and advanced users alike, that provides many unique | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
716. | Service Center Manager (SCM) - Server 2.0 (alarit.com) | ||
Along with management it provides profit and statistical analysis of activity by different types of work reports. SCM is built with intuitive interface bound to terms used in service industry. So, it works with "Equipment" having one or more "Defects". "Equipment" is received from "Client". After | |||
Updated: 9, 2005 | Rating: 0 | Author: Max Zotov | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
717. | Service Center Operator 2.3 (newageit.com) | ||
Along with management it provides profit and statistical analysis of activity by different types of work reports. Service Center Operator is built with intuitive interface bound to terms used in service industry. So, it works with "Equipment" having one or more "Defects". "Equipment" is received | |||
Updated: 8, 2004 | Rating: 0 | Author: Matthew Jacobson | Size: 224 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
718. | Service Core Manager (SCM) - Server 2.3 (alarit.com) | ||
Along with management it provides profit and statistical analysis of activity by different types of work reports. SCM is built with intuitive interface bound to terms used in service industry. So, it works with "Equipment" having one or more "Defects". "Equipment" is received from "Client". After | |||
Updated: 9, 2005 | Rating: 0 | Author: Rachel Guillermo | Size: 22 kb | Commercial Go to category: Servers > Other Server Applications Similar programs | |||
719. | ShortKeys 2.1d (shortkeys.com) | ||
how much time ShortKeys can save. ShortKeys monitors the keyboard activity on a global nature and anytime a user defined keystroke combination (ShortKey) is typed in, it will be replaced with the replacement text. ShortKeys is intended for use with programs that allow text input such as a word processor, text editor, e-mail program, etc. It replaces a text string of up to 32 | |||
Updated: 9, 2005 | Rating: 131 | Author: Stan Jones | Size: 3147 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
720. | ShowSize PE 4.2.3 (showsize.com) | ||
Unique Explorer style software reports sizes and numbers of folders, files and file types. It can also help you find files not used in many days and can produce a nice printout of the folder contents. See how your disk space is distributed in various folders and files. Get a list of files not used in many | |||
Updated: 9, 2005 | Rating: 0 | Author: AvniTech Solutions | Size: 2221 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Activity software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|