|
||||||
|
||
|
Home > Personal log software |
|
|
71. | System Locker 2.40 (egtsoft.com) | ||
Locker is a handy utility that allows you to protect your personal computer from unauthorized access. You can use System Locker to restrict access to your PC. It's attractive, secure, and very easy to use. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop on system lock and provides an informative message to other | |||
Updated: 9, 2005 | Rating: 0 | Author: Rick Skinner | Size: 863 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
72. | THE Rename 2.1.6 (herve-thouzard.com) | ||
files. Supports long file names. Replace the prefix with the file's content. Search and replace text. Supports drag and drop with Windows Explorer. Keep track of your 20 favorite directories. Full online Help. Add personal file filters. Add a counter to the end, at the beginning or replace the | |||
Updated: 9, 2005 | Rating: 118 | Author: Hervй Thouzard | Size: 2827 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
73. | Ultimate Spy Personal 1.5 (raheel.yi.org) | ||
Spy Personal Edition is a sophisticated keyboard spying tool / keylogger and activity monitor that lets you see what others are doing on your workstation in your absence. A greatly appreciated, FREE tool. Records all the keystrokes, with advanced filter settings. Runs in super stealth mode. Auto starts with windows. Not even visible in Run registry. Includes Log Analyser | |||
Updated: 9, 2005 | Rating: 0 | Author: Raheel Hameed | Size: 1156 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
74. | SecurDesk! 5.32 (cursorarts.net) | ||
actions; Prevent Ctrl+Alt+Del and other key combos; Task Manager; Log off users after a specified period; limit usage days and times; expire user permissions; restrict to only a single instance of a program; and much more... See how this complete shell replacement can help you control access, maintain a common desktop across multiple machines, protect data, etc. A secure shell | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
75. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
ISA) and for OS Platforms (Windows 2000, NT, XP). Due to it's web based interface Sentry Pro can be configured and administered, locally or remotely, thorough any browser from any location in the world, without needing any client components. By monitoring your network performance, Sentry Pro notifies you each time a specific or critical event occurs, allowing you to take | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
76. | Shutdown Manager and Tools 1.0.0.46 (interdesigner.com) | ||
allows you to setup Shutdown Manager to wait for a specified window(s) to be closed or title changed. - Connect to a remote Shutdown Manager. - Perform special Tasks before closing Windows, automatically (like delete Temp folder's content, Recent Used Files History, IE Cache, IE Cookies, Office XP Most Recent Used Files, Windows Tmp Files, Scandisk files, Typed URL's | |||
Updated: 9, 2005 | Rating: 0 | Author: Daniel Serrano | Size: 2109 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
77. | Password Officer DeLuxe 5.0 (compelson.com) | ||
is the Password Officer so useful? -stores all your passwords and log-in sequences -compresses and encrypts them -enters them in the fastest possible way -runs programs, loads your favorite websites -no errors when typing in the password -creates secure passwords for you -control where passwords will go -no awkward situations when typing in front of an audience - no | |||
Updated: 9, 2005 | Rating: 0 | Author: COMPELSON Laboratories | Size: 934 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
78. | PC Activity Monitor Lite 7.3 (spy-soft.biz) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected while monitoring are saved to the encrypted log file located on the user's machine. The monitoring program works in the | |||
Updated: 9, 2005 | Rating: 139 | Author: Dmitry Bulat | Size: 2888 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
79. | PCWash 3.2 (pcwash.com) | ||
delete sensitive data, cover your tracks and regain your personal privacy with PCWash. PCWash erases/deletes index.dat, internet history, cookies, auto complete, recent files lists, browser cache, browser history logs, site addresses, Windows temporary files, cleans recycle bin, frees up valuable drive space and securely deletes and overwrites any file you selectively | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Wroblewski | Size: 3134 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
80. | Qubit Master 2.1 (quantum-intelligence.com) | ||
take you to the Hotmail site, enter the user name and password and log in. Possible uses are endless. The only limitation is your imagination... Qubit Master allows users to perform any repetitive computer task by giving out a single voice command, menu selection or key combination. Makes you more efficient and more productive! Do emails, visit Web pages, launch programs, and lots | |||
Updated: 9, 2005 | Rating: 0 | Author: Branislav Vasilijevic | Size: 6571 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Personal log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|