|
||||||
|
||
|
Home > Security log software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
81. | dfg BackUp XP 3.13.9 (dfg1.netfirms.com) | ||
simply the best! - The fastest, award winning and easy to use back up and restore program for nearly all backup medias - HD, ZIP, FTP, CD R/RW, etc. It is the most effective and fastest you can get today. Unlimited backup profiles are supported. dfg BackUp XP can be configured to start the backup automatically (powerful scheduler using command line options (switches) and to exit | |||
Updated: 9, 2005 | Rating: 16 | Author: victoria gross | Size: 3415 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
82. | Access Boss 2.2 (fspro.net) | ||
Boss is a unique easy-to-use tool, a real lifesaver for a system security administrator that enables you to effectively restrict access to a PC for certain users based on time factor. All you have to do is install Access Boss under an Administrator account, run the program and choose which users' access time should be restricted. To do so, you simply mark the required hour(s) | |||
Updated: 2, 2006 | Rating: 175 | Author: FSPro Labs | Size: 933 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
83. | Access Denied 3.40 (johnru.com) | ||
Security program requests username and password or simple password upon boot-up and locks desktop by one mouse click. It can't be bypassed on Windows 95/98/ME. All unwanted people are kept out to your PC. Very flexible use: multi-user support(up to 450 users), password encryption, integration with | |||
Updated: 9, 2005 | Rating: 58 | Author: Ivan Mayrakov | Size: 536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
84. | Access Lock 2.83 (softheap.com) | ||
Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
85. | Access Lock 2.83 (getfreefile.com) | ||
Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
86. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
security is one of the major concerns these days. Many of us have realized already that leaving our computers unprotected may result in data theft which in turn may affect privacy and business operation. According to multiple studies, the majority of information theft crimes are conducted without having network access to target machine. Most of us prefer not to turn computer | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
87. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
it unique are its powerful keyboard logger - so powerful, it even logs the keystrokes entered during Windows 2000/XP login. And ActMon has a unique "kernel-level" file protection: Files are not just hidden! They are completely inaccessible to unauthorized users. Files cannot be removed or manipulated by an unauthorized user or so called spyware "cleaner" applications or any other | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
88. | AIM Keys 3.10.9522 (aimsoft.com) | ||
to preview and edit macro syntax on the fly! NEW! Macro and Task log files. AIM Keys can automatically track your activities and store them for future reference. NEW! Security options. Now you may secure every facet of AIM Keys interface from macros to the entire application. Encrypt your sensitive macros such as passwords to prevent others from using or viewing them | |||
Updated: 9, 2005 | Rating: 209 | Author: Randy Smith | Size: 2799 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
89. | Ascella Log Monitor 1.0 (file-monitor.com) | ||
users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about events via LAN, which can be received by the Windows NT4/2000 Messenger service, and using e-mail, SMS and ICQ (via e-mail gates) Allows users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about | |||
Updated: 9, 2005 | Rating: 0 | Author: AAR Software Ltd. | Size: 700 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
90. | Ascella Log Monitor Plus 1.5.1 (file-monitor.com) | ||
users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about events via LAN, which can be received by the Windows NT4/2000 Messenger service, and using e-mail, SMS and ICQ (via e-mail gates). Works as Windows service. Allows users to monitor events recorded in the Application, Security, System logs, dispatches | |||
Updated: 2, 2006 | Rating: 42 | Author: AAR Software Ltd. | Size: 799 kb | Demo Go to category: System Utilities > Automation Tools Similar programs | |||
|
Home > Security log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|