|
||||||
|
||
|
Home > Log keyboard software |
Related keywords: keyboard, Keyboard, midi keyboard, keyboard monitor, keyboard macro, keyboard utility, keyboard logger, virtual keyboard, keyboard spy, keyboard macros |
|
|
81. | Desktop Scout 4.0 (globalpatrol.net) | ||
which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop, transfer files, start and stop | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
82. | Disk and Registry Alert 2.09 (softdd.com) | ||
Complete uninstaller which will track, view, and monitor any changes done to your pc. Capture before and after snapshots of both your hard drive and registry, allowing you to monitor and keep track of all files and programs that were added or removed on your system. This provides a sure way to identify if any | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftDD Software | Size: 707 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
83. | Downloadz Master 2.8 (otiumation-inc.com) | ||
to surf and download materials Set time limits for DownloadZ Master's Internet connection Set limits on how many pages DownloadZ Master will surf on each site Select the type of materials and files to be downloaded Set size limitations on downloaded files Comes with a complete log of | |||
Updated: 8, 2004 | Rating: 0 | Size: 23022 kb | Demo Go to category: System Utilities > Other Similar programs | |||
84. | Dr.Web Anti-Virus for Workstations 4.31.a (advancedforce.com) | ||
for Workstations and it will do all the work for you. The scanner’s unique ability of testing the system memory, detecting the most sophisticated Trojans and backdoor programs running in the background, which are untraceable by ordinary means, makes it a powerful weapon against any non-traditional | |||
Updated: 3, 2005 | Rating: 0 | Author: Igor Daniloff | Size: 4253 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
85. | DUST 1.2 (WayBeyondUK.com) | ||
family. You can also disconnect to the welcome screen in order to log on as a new user, this is how you create the logged on sessions between which you can subsequently switch. If you prefer the classic logon prompt but are not using it because you also want Fast User Switching, then this utility is what you want. It allows you to enable the classic logon prompt (via the setup | |||
Updated: 2, 2006 | Rating: 0 | Author: Nicholas Russell | Size: 1436 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
86. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
all windows, applications, file changes etc. User-activity logs are periodically transferred, uploaded or emailed to you for analysis + more! Other features include password-protection, peer-to-peer network support, remote monitoring updates and a comprehensive user-activity log viewer. Monitor the activities of local and remote computer users. e-Surveiller allows you to | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
87. | EugeneShutdown 1.00 (eugenesoft.com) | ||
systems that allows to automatically shutdown, power off, reboot or log off current user at a specific time on your local computer and initiate shutdown of remote computer. The program provides the following key features: ability to force shutdown, force if hung applications shutdown, shutdown remote | |||
Updated: 9, 2005 | Rating: 34 | Author: Eugene Konovalov | Size: 641 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
88. | eXtended Task Manager 1.95 (warecase.com) | ||
give fast solutions for sudden problems which may arise in a product's functioning. - Debugging and improving application development. - A rich workstation investigation tool. - White box testing sessions for the QA department. - Investigation tool for integration possibilities. - And much | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Ritter | Size: 2464 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
89. | EzSearch 3.6 (soft9000.com) | ||
work on the files that EzSearch has found for you: While EzSearch's file-location robot is searching, it doesn't even tie-up EzSearch! . EzSearch keeps real-time records: The number of folders searched, number of files rejected, number of files qualified, and elapsed search-time, are just some of the data available to help you gauge the effectiveness of your search. These counters | |||
Updated: 9, 2005 | Rating: 0 | Author: R. Nagy | Size: 1763 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
90. | Ghost Keylogger 3.80 (keylogger.net) | ||
surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > Log keyboard software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|