|
||||||
|
||
|
Home > Warnings log software |
|
|
131. | Auto ShutDown XP Professional with Auto Login 2003 (gillit.com) | ||
the PC once it has been shutdown for a period up to 24 hours. Warning messages Warning messages can be customised; a snooze button has also been added to let the user continue to use the PC for a few minutes more before it is shutdown. Alarms An optional alarm can sound when the | |||
Updated: 9, 2005 | Rating: 160 | Author: R Gill | Size: 1659 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
132. | AxCrypt 1.6.2.3 (axcrypt.sourceforge.net) | ||
File encryption for Windows 98/ME/NT/2K/XP using the AES algorithm with 128-bit keys. It combines strong symmetric encryption with compression and double-click editing/viewing. Encrypted files have a '.AXX' extension added to their names, and are shown with a new icon. To encrypt a file, right-click | |||
Updated: 2, 2006 | Rating: 337 | Author: Svante Seleborg | Size: 1034 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
133. | Backup-2006 Studio 5.1.2.202 (backup2004.com) | ||
FTP, FTPS, HTTP servers. It offers a graphical backup map, catalog, log files and can email you when a job is done. It supports File Access Manager technology to backup or copy any file in use, including SQL databases like Oracle, SQL Server, Microsoft Exchange... Backup-2006 Studio is able to manage | |||
Updated: 3, 2006 | Rating: 211 | Author: RD Technologies Inc | Size: 14275 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
134. | Bookmark, Password and Login System by M8 Software 4.30.001 (winm8.com) | ||
username and password ready to paste in. With a single click on it's Auto-Insert button it fills the log in form and clicks the submit button. If you have logon screens more complicated than just username and password - No Problem - It can set options and drop downs as well as fill any number of text fields. The small window can also be used without a bookmark to paste details | |||
Updated: 3, 2005 | Rating: 0 | Author: John Turnbull | Size: 1273 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
135. | Boss Everyware 2.85 (bosseveryware.com) | ||
Everyware keeps a log of which programs each user has run, and how much time they've spent on them. In addition, it records all of the users' keystrokes, allowing the computer owner or network administrator to answer questions about what correspondence is being created. Boss Everyware logs | |||
Updated: 2, 2006 | Rating: 16 | Author: Alexander Jmerik | Size: 3077 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
136. | Brooks RPM 9X LPD Print Server 2.5.1.28 (brooksnet.com) | ||
logging in RPM provides each message in an easy to read format. Each log message shows a unique RPM event number, the time, the source of the message, the application that generated the message, and the message text. Easily translate and convert text from different formats. Translate EBCDIC data, ASA | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Tomasetti | Size: 4556 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
137. | Brooks RPM Select LPD Print Manager 4.5.1.9 (brooksnet.com) | ||
logging in RPM provides each message in an easy to read format. Each log message shows a unique RPM event number, the time, the source of the message, the application that generated the message, and the message text. Easily translate and convert text from different formats. Translate EBCDIC data, ASA | |||
Updated: 9, 2005 | Rating: 59 | Author: Frank Tomasetti | Size: 4487 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
138. | CalculatorX 1. 2 (xoyosoft.com) | ||
by using CalculatorX. Here is just a short list of CalculatorX's major features: - Arithmetic operation - Logic and Bitwise operation - Relation operation - Built-In Functions - Constant support, such as PI, E, TRUE, FALSE etc. - Alias for operators and functions, eg."sh" and "hsin" is the same function - Unlimited nesting for expression - The mixed operation for | |||
Updated: 2, 2006 | Rating: 0 | Author: XoYo Li | Size: 1311 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
139. | CheckSpace 3.3.0 (competent-software.com) | ||
If the drive or directory reach a defined limit, CheckSpace sends a warn e-mail to an user defined address. The event log monitor sends you the new entries by mail if they are written in the log. The Dr. Watson monitor cachts Watson errors and send you a detailed error report if an error | |||
Updated: 9, 2005 | Rating: 0 | Author: Timo Kosiol | Size: 2733 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
140. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
records unauthorized access violations in a protected event-log file with a time and date stamped description of the threat. The system records key stroke activity that may provide clues as to the intruder’s intentions or their identity. Notification Services – Theft Recovery ComputerSafe sends various types of remote notifications when violations occur - pages | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Warnings log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|