|
||||||
|
||
|
Home > Keyboard keys software |
Related keywords: keyboard, keys, Keyboard, hot keys, midi keyboard, keyboard monitor, keyboard macro, keyboard utility, keyboard logger, virtual keyboard |
|
|
141. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
142. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
143. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
144. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
145. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
146. | PEERNET File Conversion Center 2.6 (peernet.com) | ||
faxing, displaying on screen, or displaying in a web browser. (Trial key required) File Conversion Center features are integrated into both your desktop and your Windows Explorer application, enabling you to convert files and folders as easily as you would copy, paste, and delete them. Either | |||
Updated: 9, 2005 | Rating: 0 | Author: PEERNET Support | Size: 9364 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
147. | PopMessenger 1.61 (leadmind.com) | ||
opportunity to win the race and beat the competition. One of the key factors of successful business operation is well-thought staff communication system. Good managers know that each minute of work time spent in vain means profit loss. That is why building fast and convenient personnel communication environment is so important, these days. Common means of communication, such as | |||
Updated: 9, 2005 | Rating: 0 | Author: LeadMind Development | Size: 1606 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
148. | Power Mixer 1.7 (actualsolution.com) | ||
the sound volume by simply rotating the mouse wheel or by using keyboard hot keys. It includes an audio mixer with advanced volume controls support, a scheduler, an on-screen display, command line support, the ability to store and recall different unlimited presets via one mouse click or system-wide hot keys. By using presets you can change all parameters of sound | |||
Updated: 2, 2006 | Rating: 1527 | Author: Andrew Mindrin | Size: 433 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
149. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
PrivacyKeyboard for Microsoft Windows 2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs (keyloggers) and keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
150. | PrivacyKeyboard 6.1 (anti-keylogger.com) | ||
PrivacyKeyboard for Microsoft Windows 2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs (keyloggers) and keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
151. | Private InfoKeeper 2.7 (ablazesoft.com) | ||
actions can be performed with help of carefully designed wizards and key-shortcuts. Combined easily customizable information representation and built-in powerful password generator APIK is the best available secure storage software. Elegant, unique featured, powerful and secure personal information | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Jones | Size: 538 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
152. | Quick Hide Windows 1.8.7 (cronosoft.com) | ||
Quick Hide Windows by CronoSoft is great for hiding program windows with a press of a hotkey combination. You easily bring them back with another combo. Hiding the taskbar and desktop icons is just awesome. Password protection allows you to lock QHW to prevent intruders from trying to show invisible | |||
Updated: 9, 2005 | Rating: 154 | Author: Alex Adrian | Size: 994 kb | Demo Go to category: System Utilities > Other Similar programs | |||
153. | Quicknote 5.2 (jens.metz-furniere.de) | ||
on the top of your screen with the mouse or by pressing shortcut keys. In its resizable window you can jot down your notes and organize them in categories or even sketch small drawings. Still, this tiny tool has more possibilities than it seems on the first thought! Beneath the normal text functions, it can convert units, let you directly access frequently run programs, encrypt | |||
Updated: 2, 2006 | Rating: 16 | Author: Jens Müller | Size: 2086 kb | Freeware Go to category: Business > Other Similar programs | |||
154. | RAM Saver Pro 5.0 (wintools.net) | ||
Easy-to-use RAM optimizer tool that will keep your computer running faster. It increases the operation system performance by making more memory available for your applications. RAM Saver Pro will: - defragment system memory for faster access time; - increasing the efficiency of your CPU and Motherboard | |||
Updated: 2, 2006 | Rating: 164 | Author: Ruslan Smekalov | Size: 406 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
155. | Read-e PLUS 1.0.133 (dyslexia-software.com) | ||
a richer form of browsing the Web. If so you'll want to try Read-e. Key features include: 1) Will read aloud the vast majority of web pages and page elements 2) Choose your reader's voice from 11 languages as well as either sex (male/female) 3) Unique multi-sensory user interface 4) Quick word look-up, which is also read aloud in the same way 5) Pop-up and child browser | |||
Updated: 9, 2005 | Rating: 16 | Author: Phil Teare | Size: 6502 kb | Shareware Go to category: Audio & Multimedia > Speech Similar programs | |||
156. | Recovery for SQL Server 2.1.0543 (officerecovery.com) | ||
recovery is supported. Also the software repairs damaged primary keys, unique key, indexes (including "IGNORE_DUP_KEY", "CLUSTERED", "STATISTICS_NORECOMPUTE", "FILLFACTOR") and foreign keys. Recovery for SQL Server is able to process really large databases (actually, the corrupted file size is limited only by the file system specifications, e.g. FAT32 won't support | |||
Updated: 2, 2006 | Rating: 0 | Author: Recoveronix | Size: 977 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
157. | Registry Healer 4.4.1 (fixregistry.com) | ||
paths, obsolete Start Menu items, invalid shared DLLs, unused keys. Registry Healer automatically suggests the best correction for each of invalid registry entries. You just need to press a key! Registry cleanup tool. Speed-up your Windows® by cleaning and correction the registry! Registry Healer scans registry for invalid path references, fonts, help files, application | |||
Updated: 2, 2006 | Rating: 42 | Author: Konstantin Golovatsky | Size: 911 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
158. | Remote Administrator 2.2 (radmin.com) | ||
a window or full screen on your computer monitor. All your mouse and keyboard functions are transferred to the remote computer. You work with the remote computer as if you are sitting in front of it. The remote computer can be located anywhere on the Internet or LAN. It is a complete remote control and remote access solution with all key features such as View and Control Modes | |||
Updated: 9, 2005 | Rating: 257 | Author: Dmitri Znosko | Size: 1855 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
159. | Secura Archiver 1.6 (cmfperception.com) | ||
that demand 128 bit data encryption to meet and exceed today's security standards. Using Blowfish encryption with a 128 bit key Secura Archiver achieves the same level of security that banks use for their online services and is even suitable for military operations. The integrated Key Manager stores security keys with your descriptions which allows you | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 1509 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
160. | Secura Backup Professional 2.13 (cmfperception.com) | ||
even E-Mail addresses. Using Blowfish encryption with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure backups are a requirement in any profession that involves sensitive or classified data. Secura Backup offers scheduling features which are completely customizable and | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Keyboard keys software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|