|
||||||
|
||
|
Home > Periods software |
|
|
71. | KGB Spy 3.93 (refog.com) | ||
of all keyboard activity. It allows you to monitor your children's activity at home or to make sure your employees do not use company's computers inappropriately. There are three versions of keylogger - Free KGB Key Logger, KGB Keylogger and KGB Spy. Free KGB Key Logger is absolutely free, contains all basic features described above and is intended for non-commercial use at | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
72. | Easy File Protector 4.14 (softstack.com) | ||
schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
73. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
e-Surveiller is a powerful user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
74. | DirSync Directory Synchronizer 3.0.4 (archersoft.com) | ||
DirSync is a powerful tool designed to backup, synchronize, replicate or restore files and folders smartly and quickly. It supports many powerful and flexible features, such as: run as service, remote administration, scheduling, simulation, e-mail reporting, filtering, unicode filename, validation, transfer | |||
Updated: 2, 2006 | Rating: 0 | Author: Frank Archer | Size: 2851 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
75. | Atom Time Synchronizer 3.7.9 (lmhsoft.com) | ||
http://www.lmhsoft.com AtomTime Synchronizer is a useful and handy utility to keep your PC clock accurate. It can periodically check and synchronize your computer time with a NIST atomic time server, or synchronize time between computers, and can also act as a time server. Key Features: 1. Synchronize It can periodically check and synchronize your computer time with a NIST atomic time server, or synchronize time between computers, and can also act | |||
Updated: 2, 2006 | Rating: 130 | Author: - - | Size: 663 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
76. | Anti-keylogger 7.1.1 (anti-keyloggers.com) | ||
of very different operation principles. Due to the Anti-keylogger's protection spy software will not be able to record and steal your sensitive information, passwords, logins, PIN (Personal Identification Number) etc. Anti-keylogger works transparently for the user and silently, asking the user no questions thus excluding user's probability of error when making a decision | |||
Updated: 2, 2006 | Rating: 107 | Author: Raytown Corporation LLC | Size: 2979 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
77. | Anti-keylogger 7.1.1 (anti-keyloggers.com) | ||
of very different operation principles. Due to the Anti-keylogger's protection spy software will not be able to record and steal your sensitive information, passwords, logins, PIN (Personal Identification Number) etc. Anti-keylogger works transparently for the user and silently, asking the user no questions thus excluding user's probability of error when making a decision | |||
Updated: 2, 2006 | Rating: 82 | Author: Raytown Corporation LLC | Size: 2979 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
78. | Access Administrator 4.14 (softheap.com) | ||
protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user "Admin" has | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
79. | Access Administrator Pro 4.14 (getfreefile.com) | ||
list of allowed and disallowed files and folders within certain time periods. The program does not modify your media: in protecting your files, it just uses a high-reliability VXD driver working at Windows kernel level. This guarantees that Access Administrator Pro will never lose your data. Controls | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
80. | Access Administrator Pro 4.14 (softheap.com) | ||
list of allowed and disallowed files and folders within certain time periods. The program does not modify your media: in protecting your files, it just uses a high-reliability VXD driver working at Windows kernel level. This guarantees that Access Administrator Pro will never lose your data. Controls | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Periods software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|