|
||||||
|
||
|
Home > Log in software |
|
|
771. | AccountUnity 1.0 (silkmoth.net) | ||
online accounts on a single screen with one password delivered in a totally secure and private environment. AccountUnity delivers unprecedented levels of privacy, security, speed and ease of access to information and services for users who hold accounts with financial, stock broking, insurance, airlines, utilities and other services. View an online summary of all your accounts | |||
Updated: 3, 2005 | Rating: 102 | Author: N/A N/A | Size: 777 kb | Freeware Go to category: Business > Accounting & Finance Similar programs | |||
772. | Digital DJ Music System BE 3.7 (adecmusic.com) | ||
No Repeat continuous music and promos. This is the software used in the ADEC professional entertainment systems. This is your automated intelligent station engineer. Broadcast radio station quality music over the air or internet. Air Play log tracking. Advanced promo-commercial capabilities. Schedule genres of music. Advanced Station Manager functions for affiliate | |||
Updated: 3, 2005 | Rating: 0 | Author: D. Clark | Size: 6986 kb | Demo Go to category: Audio & Multimedia > Other Similar programs | |||
773. | Omniquad Messenger Chat Recorder 1.0 (omniquad.com) | ||
conversation logged and every password attempt is also recorded. The logs captured are tamper proof. It can be operated in two modes - overt and covert. The overt mode makes it easy for users who wish to maintain a record of their own conversations to easily work with the program. The covert or | |||
Updated: 8, 2004 | Rating: 549 | Author: Daniel Sobstel | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
774. | Data Destroyer 1.5 (braintwist-studios.com) | ||
Each application you use generates its own history data, access logs, temporary data files, and each file contains time and date stamps. To ensure corporate and personal data security, this information, along with any Recycle Bin activity, all of which constitutes an electronic data trail, should be securely deleted so to avoid corporate or personal information leakage. But deleting | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
775. | Ghost Keylogger 3.80 (keylogger.net) | ||
surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
776. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
All data collected through the monitoring are saved to an encrypted log file. The program runs completely hidden in the background so you can monitor whenever you want. Stealth technology ensures that PC Activity Monitor Net™ is completely hidden from everyone except you. Only you can launch | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
777. | SysTracker 2.0 (systracker.com) | ||
you visit, and calculate your work time on each application. User's current status monitoring,Multi-user support,URL/website address capture,Invisibility in Windows Task Manager,Analyzer upgrade for free,Free e-mail support,No additional hardware required.Usage Scenarios, Time Management:Record | |||
Updated: 8, 2004 | Rating: 0 | Author: Song Zhenwei | Size: 3184 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
778. | Trash it! 1.71 (trashituninstaller.com) | ||
for Microsoft Windows. If you try out various pograms from CD's or the net, and if you are tired of having them mess up your hard drive with files you don't really need, then Trash it! is for you. Use Trash it! to free up your hard drive of files that you have no need for, thus leaving more space for the files that you really need. Just run Trash it! once before you install a | |||
Updated: 8, 2004 | Rating: 42 | Author: Mustafa Lokhandwala | Size: 1691 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
779. | Windows Uptime 1.6 (rundegren.com) | ||
how long time in days, hours, minutes and seconds that your system has been up. It also displays the exact time of boot and idle time. Ability to log data and display statistics over computer usage. Windows Uptime can also check uptime for remote computers and batch-query machines in a network through commandline switches. Displays how long time in days | |||
Updated: 8, 2004 | Rating: 42 | Author: Anders Rundegren | Size: 141 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
780. | BPS Spyware and Adware Remover 8.2.0.0 (bulletproofsoft.h4host.com) | ||
send information about your surfing habits to ad companies, which, in turn, send you more popup ads. New features include a new Spy Add/Remove utility which uses the installer log files to uninstall all the components that the spyware programs have installed on your PC system, and an automatic | |||
Updated: 8, 2004 | Rating: 1064 | Author: Naglaa Elbanhawy | Size: 7383 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Log in software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|