|
||||||
|
||
|
Home > Key log software |
|
|
71. | AxCrypt 1.6.2.3 (axcrypt.sourceforge.net) | ||
for Windows 98/ME/NT/2K/XP using the AES algorithm with 128-bit keys. It combines strong symmetric encryption with compression and double-click editing/viewing. Encrypted files have a '.AXX' extension added to their names, and are shown with a new icon. To encrypt a file, right-click it in Windows Explorer and select 'AxCrypt | Encrypt'. To edit or view an encrypted file | |||
Updated: 2, 2006 | Rating: 337 | Author: Svante Seleborg | Size: 1034 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
72. | BlazingTools Perfect Keylogger Lite 1.15 (blazingtools.com) | ||
computer? Some applications of the keylogger: - Monitor children’s activity for parents - Monitor what programs opened and when - Recall what you wrote some time ago - Special purposes Features: - Invisible in Task Manager List - Logging texts typed in every application (including passwords and other hidden texts) - Log file is encrypted and can be protected with a password | |||
Updated: 2, 2006 | Rating: 75 | Author: BlazingTools Software | Size: 172 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
73. | BlazingTools Smart Type Assistant 1.42 (blazingtools.com) | ||
fromthe -> from the; seperate -> separate; i -> I; -Smart Diary logs and saves the texts you type to prevent losing of data when system crashes and organize your text archive. -Clipboard history - stores the last 15 Clipboard text contents for instant pasting; -Correct two initial capitals Examples: HEllo -> Hello; OUr -> our; Correct accidental usage of Caps Lock Examples: qUICK | |||
Updated: 2, 2006 | Rating: 0 | Author: BlazingTools Software | Size: 384 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
74. | Boss Everyware 2.85 (bosseveryware.com) | ||
Everyware keeps a log of which programs each user has run, and how much time they've spent on them. In addition, it records all of the users' keystrokes, allowing the computer owner or network administrator to answer questions about what correspondence is being created. Boss Everyware logs | |||
Updated: 2, 2006 | Rating: 16 | Author: Alexander Jmerik | Size: 3077 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
75. | Catalog Hot Files Pro 1.51 (drive-software.com) | ||
audio mixer controllers, dial-up connections, hibernate, stand by, log off, shut down the system, paste text, toggle any window's "always on top" status etc. Utility that allows you to set hotkeys to do common tasks like running applications/folders/documents/web pages, ejecting your cdrom drives, restarting your computer, controlling windows, Winamp and changing volume | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitri DriveSoft | Size: 810 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
76. | ChatBlocker 2.6 (exploreanywhere.net) | ||
to ensure that they do NOT take place. When coupled with ChatBlocker's powerful security features, it's powerful stealth mode feature, and remote log viewing capabilities (via e-mail) - it makes ChatBlocker must have for any parent, employer, or anyone else looking to moderate Internet | |||
Updated: 2, 2006 | Rating: 0 | Author: Bryan Hammond | Size: 1555 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
77. | Codename Alvin - PC Spy Software for Windows 2.2.1 (codingworkshop.com) | ||
PC monitoring software - Its about taking control. Monitors and logs keyboard, application, screen and internet events. Easy to use, cheap to register. Great to keep an eye on what your kids are up to when your not | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Henshaw | Size: 133 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
78. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
records unauthorized access violations in a protected event-log file with a time and date stamped description of the threat. The system records key stroke activity that may provide clues as to the intruder’s intentions or their identity. Notification Services – Theft Recovery ComputerSafe sends various types of remote notifications when violations occur | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
79. | Comm-Logger 1.0 (wcscnet.com) | ||
is a very easy to use serial communication data logger. It can log data directly from the serial port to a standard file. Up to 32 ports may be logged concurrently. Comm-Logger supports logging serial communication data from one or more serial ports to one or more files. Comm-Logger is ideal for logging serial data from applications like PBXes, security systems, or any | |||
Updated: 9, 2005 | Rating: 132 | Author: Egberto Willies | Size: 5303 kb | Shareware Go to category: Communications > Other Comms Tools Similar programs | |||
80. | ConversionTool 4.2.2 (keper.com) | ||
Access database into a SQL Server database, unlike the Microsoft’s UpSize Wizard preserving all table structure details, and supports the conversion of the views and procedures. Moreover, the tool supports solution of structural problems between Access and SQL Server like making the implicit behavior | |||
Updated: 9, 2005 | Rating: 6616 | Author: Burkhard Lau | Size: 3151 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
|
Home > Key log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|