|
||||||
|
||
|
Home > Security log software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
81. | Power Clock 5.26 (powerclock.com) | ||
and export to Intuit Quickbooks Pro, dBase, Text. Advanced change log. The administrator or manager can see at a glance what fields and files were changed, who changed them, and what time they were changed. Small and fast, runs on any Windows computer. Use your old computer that is gathering dust to replace your mechanical time clock. Customizable reports. Customizable | |||
Updated: 9, 2005 | Rating: 0 | Author: Robbie Fletcher | Size: 3716 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
82. | I-Cipher AP 2.2.2 (ambitware.com) | ||
and reliable image file encryptor/decryptor with build-in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
83. | IT Manager Helpdesk 2.0 (168.144.45.89) | ||
that is added, changed, or deleted is written to a history log that displays the type of event, who performed it, when it happened, and before and after pictures of the data. All of these functions have been designed around an easy to navigate user interface. The IT Managerâ„¢ was designed to help effectively and efficiently manage change and growth in IT Manager resources | |||
Updated: 9, 2005 | Rating: 173 | Author: Ertugrul Akbas | Size: 43 kb | Commercial Go to category: Business > Helpdesk & Remote PC Similar programs | |||
84. | PrintView 1.5 (168.144.45.89) | ||
decrease printing related costs and meet the performance and security needs of printing management without any modification on the current network and printers. While doing that, it brings the work into enjoyable and easier form by giving oppertunity to use practical and aesthetic user interface and graphical printer maps. It provides administrators systematically the correct | |||
Updated: 9, 2005 | Rating: 132 | Author: Ertugrul Akbas | Size: 58 kb | Commercial Go to category: Network & Internet > Other Similar programs | |||
85. | web based msde dba tool - Shusheng SQL Tool 1.0 (websqltool.com) | ||
and performance of SQL server. Kill bad process. o Administrate security for server logins (Windows and SQL accounts), database users and roles. o Assign permission to user(s), role(s), object(s). Support column level permission. o Backup, Restore and Repair database | |||
Updated: 9, 2005 | Rating: 72 | Author: Shusheng Zhou | Size: 819 kb | Freeware Go to category: Business > Databases & Tools Similar programs | |||
86. | Xizzo 1.2 (xizzo.com) | ||
is a password manager utility that helps users securely store their log-in information and enter it into any online form with a single mouse-click. It is more secure than printed cheat sheets or IE's own Auto-Fill function, the standard methods of password "protection" for most users. Xizzo | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Tessov | Size: 758 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
87. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few tools to find out who or what made it happened. Besides critical | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
88. | WatchDog 8.4 (sarna.net) | ||
WatchDog limits, protects and monitors what your users do on the computer. Limit how much they use the computer and when. Put time limits on programs or stop them from ever running. Block web sites other web material. Protect your Windows machine by restricting where they go and what they can change. Monitor | |||
Updated: 9, 2005 | Rating: 613 | Author: Watchdog Development | Size: 7073 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
89. | WDumpEvt 2.2 (eventlog.com) | ||
it easy to view and manage all the informations from Windows NT/2000 logs: Ask for system, security, application log or file information. View, print or dump the list of events, user, failure or ras sessions, or print jobs. Dump the data to a file in ASCII-delimited, CSV or html format. You can study the log from any remote computer by browsing a tree who | |||
Updated: 9, 2005 | Rating: 0 | Author: Isabelle Vollant | Size: 395 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
90. | Webroot Window Washer 6.0 (webroot.com) | ||
and Netscape. Window Washer includes bleach technology as an added security measure. Bleach completely overwrites files, making recovery impossible. This enhanced version also cleans up hard disk free space to remove evidence of your deleted files. Maintain your preferred Internet settings and | |||
Updated: 9, 2005 | Rating: 0 | Author: Webroot Software | Size: 2700 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
|
Home > Security log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|