|
||||||
|
||
|
Home > Logs software |
Related keywords: server logs, referrer logs, NT event logs, raw logs, raw server logs, web logs, http logs, Windows logs |
|
|
901. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
902. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
903. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
904. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
905. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
906. | Ping Alarm 1.4 (Pingalarm.narod.ru) | ||
of a sending requests and their amount. Alarm can issue sound. Log-file is exist. Position of forms are saving before quit. Tray. This small and convenient program is intended for watching for presence computers at the Net. The program sends the request with a specific interval, determined by the user to selected | |||
Updated: 9, 2005 | Rating: 0 | Author: Roman Balabolko | Size: 290 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
907. | Power Shutdown 4.0 (snowportion.com) | ||
It has 14 commands: Turn off the computer, restart the computer, log off, screen saver, standby, disconnect the modem, close a program or all programs, and turn off the monitor and many more. Power Shutdown can launch tasks after a certain amount of time or at an exact time. It also provides RIGHT-LAUNCH technology which let you launch the commands even when you do not know | |||
Updated: 2, 2006 | Rating: 61 | Author: Taein Kim | Size: 1017 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
908. | PowerGREP 3.2.2 (jgsoft.com) | ||
do not know in advance exactly what you are looking for. PowerGREP's rich Perl-compatible regular expression support allows you to search for virtually anything by specifying the form of what you want, and let PowerGREP find the actual text matching that form. PowerGREP's documentation includes a detailed regular expression tutorial, with many simple and complex examples | |||
Updated: 2, 2006 | Rating: 16 | Author: Jan Goyvaerts | Size: 3705 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
909. | SecurDesk! 5.32 (cursorarts.com) | ||
actions; Prevent Ctrl+Alt+Del and other key combos; Task Manager; Log off users after a specified period; limit usage days and times; expire user permissions; restrict to only a single instance of a program; and much more... See how this complete shell replacement can help you control access, maintain a common desktop across multiple machines, protect data, etc. A secure shell | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
910. | SmartSync Pro 2.11 (smsync.com) | ||
starting of external applications before and after synchronization. Log reports and error notifications can be sent by email. As a unique feature, SmartSync Pro allows synchronizing files and folders when computers cannot be connected over a local network (e.g. home/office PCs). The program | |||
Updated: 2, 2006 | Rating: 39 | Author: SmartSync Software | Size: 2167 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Logs software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|