|
||||||
|
||
|
Home > Log on software |
|
|
721. | @KeyLogger Home 2.10 (activity-tracker.com) | ||
you know what your staff, children, spouse or significant other type on your computer when you are away from it? Are they working on your account - or playing solitaire? @KeyLogger surveillance software can tell you exactly who is doing what on which PC at any time during the day or | |||
Updated: 8, 2004 | Rating: 48 | Author: Konstantin Romanovsky | Size: 959 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
722. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
it unique are its powerful keyboard logger - so powerful, it even logs the keystrokes entered during Windows 2000/XP login. And ActMon has a unique "kernel-level" file protection: Files are not just hidden! They are completely inaccessible to unauthorized users. Files cannot be removed or manipulated by an unauthorized user or so called spyware "cleaner" applications or any other | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
723. | Agent Password 1.8 (agentpassword.com) | ||
saving of all logins and passwords entered. It can be used not only as password keeping software but as a password spy, too. The manufacturer is not responsible for any inappropriate use of the program. We simply provide top notch, high quality software applications. It's up to you how to use the software, folks. The software is quite ingenious but very simple. All | |||
Updated: 8, 2004 | Rating: 251 | Author: Pavel Mikhailov | Size: 902 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
724. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
2 is a new update to our popular HWPE software. HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
725. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel. PC Acme Lite | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
726. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel. PC Acme | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
727. | PestPatrol 3.0 (safersite.com) | ||
tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens, you could lose passwords, customer data, intellectual property - even your web site or, if you telecommute and connect to your office via a VPN, the entire corporate network | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
728. | ProtectZ 1.60 (actualsecurity.com) | ||
for personal and public accessible computers. This software-only solution enables you to restrict access to any non-virtual folders and files, to edit a lot of different system policies of Windows 95/98/Me. ProtectZ enables you to make files and folders invisible or "read-only", to make them undeletable, to forbid rename them, to make them unreadable, to forbid rewrite | |||
Updated: 8, 2004 | Rating: 723 | Author: Konstantin Evseenko | Size: 574 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
729. | SMB File Sniffer 1.0.0.1 (microolap.com) | ||
transmitted within a LAN. SMB File Sniffer allows you to: - log SMB file operations with two levels of logging: detailed and errors only; - intercept files transmitted within a LAN by SMB protocol (Windows and non-Windows servers are supported); - select one of the network adapters, installed on your system, to log the packet stream of this certain | |||
Updated: 8, 2004 | Rating: 0 | Author: microOLAP Technologies | Size: 1378 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
730. | WIDO Logbook 1.3 (home.t-online.de) | ||
again after restart. Note: 'WIDO Logbook' can be installed only by a user with administrator rights. FUNCTIONS. LogbookService.exe is installed as a 'local service'. This service checks the logins and logoffs of the users (and other accounts), and stores it in a log file, in brief 'logbook' mentioned. So that all logins and logoffs will be registered, the | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 1519 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Log on software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|