|
||||||
|
||
|
Home > Log url software |
|
|
61. | Darn! Passwords! 3.1.03.41 (odarn.com) | ||
web sites. Just pick the password, and drag it and it's log-in (if there is one) into the program or web site that uses it. No retyping is necessary (even in programs that do not accept the drag, you can just paste the password in). Go to the URL of a password protected site with the click of a button. Its simple interface makes using your passwords convenient | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Thornton | Size: 2454 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
62. | Flystrike Spam Interrogator 1.6 (softwarepromoting.com) | ||
origin of messages; and ban them according to both MD5 Signature and URL pointers. The banning of these elements allows Flystrike to perform auto deletion of e-mail messages if required by the user. A log of deleted messages allows the user to discover any false positives. A threat list is available that allows the user to enter e-mails associated with particular worms or | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4950 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
63. | Flystrike Spam Interrogator 2.4.0.63 (downloads.flystrike.com) | ||
origin of messages; and ban them according to both MD5 Signature and URL pointers. The banning of these elements allows Flystrike to perform auto deletion of e-mail messages if required by the user. A log of deleted messages allows the user to discover any false positives. A threat list is available that allows the user to enter e-mails associated with particular worms or | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4920 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
64. | 4Diskclean Gold 5.5 (4diskclean.com) | ||
including temporary data, old backups, duplicated files and DLL's, all files viewed in Web browser and stored in cache, cookies and the history of url's visited. and invalid Windows registry keys (see complete list below). Free disk space , fix and prevent errors in your system and speed it up with 4Diskclean Software. View charts of disk usage and disk settings to | |||
Updated: 2, 2006 | Rating: 107 | Author: RSS Systems | Size: 1462 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
65. | LockEXE 2.0 (mazepath.com) | ||
So Easy to Use!!! LockEXE can password protect your programs. Your email, word processor, browser or ANY other programs you choose will only work with your password! Protect your computer and your privacy with LockEXE. Keep your children from browsing the internet without your permission! You LockEXE can password protect your programs. Your email, word processor, browser or ANY other programs you choose will only work with your password! Protect your computer and your privacy with LockEXE | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 145 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
66. | ASP - IIS real-time monitor and log 2.60 (iis-asp-script-real-time-monitor.pstruh.cz) | ||
current state and progress of each running request in IIS. Lets you log IIS state. Real-time monitoring of running ISAPI scripts (.asp, .cgi, .idc, .idq ...) Real-time monitoring of big downloads Current number of running requests (scripts/downloads) Current state of the request Script start time and running time with precision up to milisecond. Request and response content-length | |||
Updated: 9, 2005 | Rating: 16 | Author: Antonin Foller | Size: 1091 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
67. | ASP - IIS real-time monitor and log 2.60 (pstruh.cz) | ||
current state and progress of each running request in IIS. Lets you log IIS state. Real-time monitoring of running ISAPI scripts (.asp, .cgi, .idc, .idq ...) Real-time monitoring of big downloads Current number of running requests (scripts/downloads) Current state of the request Script start time and running time with precision up to milisecond. Request and response content-length | |||
Updated: 9, 2005 | Rating: 16 | Author: Antonin Foller | Size: 1091 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
68. | Spytector 1.2.8 (spytector.com) | ||
the keystrokes, opened windows, applications etc.) and delivers the logs to you via Email or/and FTP. In the delivered logs are also included the Protected Storage passwords (Outlook, MSN and others) and URL history (visited websites). The keylogger is using advanced hooking and stealth | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrei Radu Poleacu | Size: 1006 kb | Shareware Similar programs | |||
|
Home > Log url software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|