|
||||||
|
||
|
Home > Key log software |
|
|
81. | Desktop Scout 4.0 (globalpatrol.net) | ||
which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop, transfer files, start and stop | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
82. | Disk and Registry Alert 2.09 (softdd.com) | ||
to monitoring your hard drive, you can also view any registry keys that are added or deleted. Simply run the self-extracting file to install. (Runs on all Windows systems). Uninstaller which will track, view, and save any changes done to your pc. Capture before and after snapshots of both your hard drive and registry, showing all files and programs that were added or removed | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftDD Software | Size: 707 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
83. | Downloadz Master 2.8 (otiumation-inc.com) | ||
to surf and download materials Set time limits for DownloadZ Master's Internet connection Set limits on how many pages DownloadZ Master will surf on each site Select the type of materials and files to be downloaded Set size limitations on downloaded files Comes with a complete log of | |||
Updated: 8, 2004 | Rating: 0 | Size: 23022 kb | Demo Go to category: System Utilities > Other Similar programs | |||
84. | Dr.Web Anti-Virus for Workstations 4.31.a (advancedforce.com) | ||
for Workstations and it will do all the work for you. The scanner’s unique ability of testing the system memory, detecting the most sophisticated Trojans and backdoor programs running in the background, which are untraceable by ordinary means, makes it a powerful weapon against any non-traditional | |||
Updated: 3, 2005 | Rating: 0 | Author: Igor Daniloff | Size: 4253 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
85. | DUST 1.2 (WayBeyondUK.com) | ||
allows you to switch to another logged on session using a chosen hot key combination just like you use Alt+Tab to switch tasks. This does not involve going to the Windows XP welcome screen and with password saving and automatic logon makes it very quick and easy to switch between sessions. Ideal for | |||
Updated: 2, 2006 | Rating: 0 | Author: Nicholas Russell | Size: 1436 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
86. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
all windows, applications, file changes etc. User-activity logs are periodically transferred, uploaded or emailed to you for analysis + more! Other features include password-protection, peer-to-peer network support, remote monitoring updates and a comprehensive user-activity log viewer. Monitor the activities of local and remote computer users. e-Surveiller allows you to | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
87. | EugeneShutdown 1.00 (eugenesoft.com) | ||
systems that allows to automatically shutdown, power off, reboot or log off current user at a specific time on your local computer and initiate shutdown of remote computer. The program provides the following key features: ability to force shutdown, force if hung applications shutdown, shutdown remote computer with user-defined message and timeout. EugeneShutdown is a system | |||
Updated: 9, 2005 | Rating: 34 | Author: Eugene Konovalov | Size: 641 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
88. | eXtended Task Manager 1.95 (warecase.com) | ||
give fast solutions for sudden problems which may arise in a product's functioning. - Debugging and improving application development. - A rich workstation investigation tool. - White box testing sessions for the QA department. - Investigation tool for integration possibilities. - And much | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Ritter | Size: 2464 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
89. | EzSearch 3.6 (soft9000.com) | ||
work on the files that EzSearch has found for you: While EzSearch's file-location robot is searching, it doesn't even tie-up EzSearch! . EzSearch keeps real-time records: The number of folders searched, number of files rejected, number of files qualified, and elapsed search-time, are just some of the data available to help you gauge the effectiveness of your search. These counters | |||
Updated: 9, 2005 | Rating: 0 | Author: R. Nagy | Size: 1763 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
90. | Ghost Keylogger 3.80 (keylogger.net) | ||
surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > Key log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|