|
||||||
|
||
|
Home > Monitoring software |
|
|
851. | FolderClone 1.5.7 (folderclone.com) | ||
and how often you want this done. Once configured, FolderClone monitors the "source" folders for changes or updates and copies new or changed files to the "target". This process runs automatically in the background without any further user-interaction required. Feature List: ========= - Easy to use Interface for simple creation and maintenance of tasks. - Lists of | |||
Updated: 2, 2006 | Rating: 16 | Author: Salty Brine Software | Size: 291 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
852. | FolderWatch 3.12 (diginaut.com) | ||
Watch guards your files all the time. Folder Watch does this by monitoring a given number of folders on your hard drive like your Windows folder or your My Documents' folder, etc. It keeps polling these as long as the computer is on. Any time a change is detected, no matter how minute, Folder Watch | |||
Updated: 2, 2006 | Rating: 0 | Author: Amir Zolic | Size: 844 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
853. | FoldMonkey 1.46 (monkeyjob.com) | ||
archive and backup your files and folders. Main features include: Monitor a folder for new or incoming files. Rename those files to match specific criteria using tags such as old file name, old file extension and custom text. Move files to a new directory. Create directories based on file names, file extensions, file creation, last accessed and modified date stamps. Make folders by | |||
Updated: 3, 2006 | Rating: 39 | Author: monkey job | Size: 1464 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
854. | Ghost Keylogger 3.80 (keylogger.net) | ||
secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs completly invisbly on all operating systems, even in the NT/2000/XP process list. Some applications of the | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
855. | GiPo@FileUtilities 2.7 (gibinsoft.net) | ||
files and folders on the next system boot. GiPo@DirMonitor - monitoring changes in the file system. GiPo@Mount - local folders substitution and local/remote drives mounting. GiPo@ReadTest - checking files and folders for read errors. Utilities can be integrated into shell. GiPo@MoveOnBoot. Copies, moves or deletes files on the next system boot. The utility is very useful | |||
Updated: 9, 2005 | Rating: 16 | Author: Igor Artemov | Size: 867 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
856. | Golden Eye 4.11 (monitoring-spy-software.com) | ||
are doing during work hours? Golden Eye is designed to monitor and record all the activity on your computer. with its bulit-in spy components, It can record keystroke, visited websites, window title,Instant Messengersm, and even screenshot. Golden Eye works like a surveillance camera pointed directly at your computer monitor, monitoring and recording | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin | Size: 1490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
857. | GoodBye Spy 4.01 (tekeffect.com) | ||
spyware removal and real time monitoring utility. GoodBye Spy is a multi-adware removal program, which supports the removal of spyware, adware, Brotherware, and more. It scans your registry, memory, and drives, then allows you to remove these unwanted files from your system. To offer greater protection a Real Time Monitor runs silently in the background protecting you | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 608 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
858. | GroundControl 3.00 (acrasoft.com) | ||
Hundreds of commands are available for controlling your computer, monitoring your network, and accessing the Internet. An intuitive user interface leads you quickly through writing batch files, and a rich command set lets you get as complex as you need. Our language includes support for variables, conditions, Internet operations, e-mail, sending keystrokes and mouse clicks to windows | |||
Updated: 9, 2005 | Rating: 39 | Author: Acrasoft | Size: 1200 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
859. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
Edition 2 is a new update to our popular HWPE software. HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth mode option, hot key | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
860. | Handy Backup 2.1 (backup.novosoft-us.com) | ||
or a remote FTP server. You only need to setup it once and it will monitor changes and execute scheduled backups and synchronizations at the time you specify. Strong file encryption, password protection and zip compression on the fly and many other features will protect your valuable data. Detailed online help is available. Intuitive Explorer style user interface You'll find | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Vaschenko | Size: 1449 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
861. | Hasty Paste 1.0 (donovandunning.com) | ||
Paste 1.0 is a productivity tool that monitors the Windows clipboard for cut and copied files. Once Hasty Paste detects files that have been cut or copied, it presents options for pasting them to a folder, to a folder as a shortcut, as a file list in a text file, or to copy the file list to the clipboard as text. You can configure Hasty Paste to automatically popup when files are cut | |||
Updated: 8, 2004 | Rating: 0 | Author: Donovan Dunning | Size: 1284 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
862. | HDD Temperature 1.3 (hddtemperature.com) | ||
your HDDs and losing data increases drastically. So how do you monitor your HDD temperature to make sure you data is always save? Simply download HDD Temperature from PalickSoft. This utility comes in two versions - regular and pro. The regular version is intended for home users who have only single hard-drive and is totally free. Using S.M.A.R.T. technology included in | |||
Updated: 3, 2005 | Rating: 48 | Author: Yuri Alexandrov | Size: 1016 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
863. | HDD Temperature Pro 1.4.206 (hddtemp.com) | ||
your HDDs and losing data increases drastically. So how do you monitor your HDD temperature to make sure you data is always save? Simply download HDD Temperature from PalickSoft. This utility comes in two versions - regular and pro. The regular version is intended for home users who have only single hard-drive and is totally free. Using S.M.A.R.T. technology included in | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuri Alexandrov | Size: 2409 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
864. | HDD Thermometer 1.3 (rsdsoft.com) | ||
Thermometer is a hard disk temperature monitoring tool. It has all the features needed to prevent overheating and possible data loss. HDD Thermometer use S.M.A.R.T. technology to get access to the hard disk temperature. Most of modern hard disks provide self temperature value through S.M.A.R.T. So if at least one of your hard disks supports this feature than this | |||
Updated: 9, 2005 | Rating: 82 | Author: Georgy Koychev | Size: 253 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
865. | Horas 4.1 (basta.com) | ||
to the rest of the world. Just select the locations you want to monitor and Horas does the rest. There are many options available such as the automatic adjustment of daylight saving changes, Swatch Internet Time support, analog and digital displays, auto-hiding of the clocks, custom date and time formats, custom fonts, custom backgrounds, and time zone information downloading. Plus | |||
Updated: 3, 2005 | Rating: 0 | Size: 1023 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
866. | Hot CPU Tester Pro 4.2.2 (opusware.net) | ||
to diagnose systems regarding its stability and in general, computer's health. Hot CPU Tester is currently being used in many labs and governmental organizations around the world, as a reliable stability testing utility. New features: -Revolutionary DefectTrack 2.0 engine, accurately tests the whole | |||
Updated: 9, 2005 | Rating: 1599 | Author: Damon Chitsaz | Size: 1639 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
867. | HSLAB Print Logger SE 4.3 (hs-lab.com) | ||
intended for control and auditing of printing activity. The program monitors the print tasks on the computer to which it is installed. HSLAB Print Logger SE's main task is to collect the information about the sizes of printed documents/images and to record this information to a database for subsequent analysis. Print Logger can also compare the size of printing with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Golub | Size: 6105 kb | Shareware Go to category: Business > Other Similar programs | |||
868. | HSLAB Sys Monitor Lite 1.0 (hs-lab.com) | ||
real-time monitoring and statistics utility for Windows. HSLAB Sys Monitor uses some advanced technologies for logging and mesuring system components. The sensors permanently monitor behind parameters of the system and gather the information with an interval per one second. The information, collected by sensors is transmited to the processing unit. The processing | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Golub | Size: 2202 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
869. | IdentaFone Multi-Line Caller ID Software 3.99 (identafone.com) | ||
hardware from Rochelle, TCI, Zeus Phonstuff Inc, or YES Telecom for monitoring up to 100+ lines. By using your local network, only one Caller ID box is required, allowing several workstations to have the same detailed status of callers and line usage. Full integration with MS Outlook Contacts adds the convenience of working with your favorite PIM. Screen pops, line status, memos | |||
Updated: 2, 2006 | Rating: 0 | Author: IdentaFone Software | Size: 2752 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
870. | IdentaFone Pro 2.50 (identafone.com) | ||
is a caller identification system that monitors the phone line for incoming calls and offers many ways to keep you informed about your caller's identity. Once the caller information is obtained, this virtual telephone assistant can speak the caller's name through your PC speakers, screen pop the callers name, send the information to a pager or cell phone, submit an | |||
Updated: 9, 2005 | Rating: 35 | Author: IdentaFone Software | Size: 2945 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
871. | IIPwr Package 2.00 (iipwr.com) | ||
own but currently don't have direct access to? With IIPwr's KeySpy this is exactly what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records (logs) activities (such | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
872. | Internet Explorer Password 3.0.189 (lastbit.com) | ||
Advisor was initially designed as a security feature and a tool to monitor website ratings to prevent minors from accessing adult websites. Since the rating technology never became widespread, this feature is basically useless, and may effectively block the usage of Internet Explorer. If you lose or | |||
Updated: 9, 2005 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 61 kb | Demo Go to category: Security & Privacy > Password Managers Similar programs | |||
873. | IP Mailer 2004d (wappu.tv) | ||
IP Mailer supports multiple recipients of the email and also let's you send it manually if you need to send it from time to time. Requires that you have access to a SMTP (mail) server from your ISP for sending the emails. Simply configure the SMTP server address, your email address and the recipients | |||
Updated: 9, 2005 | Rating: 151 | Size: 1600 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
874. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
875. | Just Stuff 2.1 (vsisystems.com) | ||
Just Stuff 2.1 is an assortment of simply and useful utilities combined into a one application. Clipboard to Upper/Lower/Proper Case Click on the “Clipboard to Upper Case” and the text in the Clipboard is set to upper case. Click it again and it is set to Lower Case. Click it again and it is set to | |||
Updated: 9, 2005 | Rating: 0 | Author: Vic Szamody | Size: 1000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
876. | Kaspersky Anti-Virus Personal 5.0 (kaspersky.com) | ||
of Kaspersky; Anti-Virus Scanner and Kaspersky; Anti-Virus Monitor. These programs are now each divided into two sub-programs: functional and interface. This division allows the programs to continue operating even with the interface sub-program unloaded. Improved setup utility allowing you to keep user settings of KasperskyAnti-Virus; Control Center and/or Kaspersky; | |||
Updated: 6, 2005 | Rating: 184 | Author: Andrey Shepelev | Size: 13475 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
877. | Kaspersky Anti-Virus Personal Pro 5.0 (kaspersky.com) | ||
against infection Kaspersky Anti-Virus Personal Pro constantly monitors all sources of possible virus infections: email, the Internet, CDs and more. Personal Pro also protects all parts of your PC: system memory, boot sector, files, mail databases and etc. It also contains unique technology for protecting your MS Office documents. Scanning archived and compressed files Viruses often | |||
Updated: 3, 2005 | Rating: 39 | Author: Andrey Shepelev | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
878. | Keyboard Logger 1.1 (panterasoft.com) | ||
Do you want to know what your children, spouse or significant other type on your computer when you are away from it? The Keyboard Logger key logger records every keystroke made on your computer on every window, even on password protected boxes. This key logger is completely undetectable and starts up whenever | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleksey Cherkasskiy | Size: 45 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
879. | Keyboard Monitor 1.7 (tropsoft.com) | ||
are pressed until turned off. Use it to ensure that your child's (or spouse's!) chat room and email activities are on the up and up. Recorded information and access to the Keyboard Monitor are safely password protected. Keyboard Monitor can be run as an invisible background process and it can be set so that it turns on automatically when the machine | |||
Updated: 9, 2005 | Rating: 76 | Author: Silvio Kuczynski | Size: 133 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
880. | KGB Free Key Logger 1.93 (refog.com) | ||
and it keeps the record of all keyboard activity. It allows you to monitor your children's activity at home or to make sure your employees do not use company's computers inappropriately. There are three versions of keylogger - Free KGB Key Logger, KGB Keylogger and KGB Spy. Free KGB Key Logger is absolutely free, contains all basic features described above and is | |||
Updated: 2, 2006 | Rating: 2482 | Author: ReFog Software | Size: 1477 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
881. | KGB Spy 3.93 (refog.com) | ||
and it keeps the record of all keyboard activity. It allows you to monitor your children's activity at home or to make sure your employees do not use company's computers inappropriately. There are three versions of keylogger - Free KGB Key Logger, KGB Keylogger and KGB Spy. Free KGB Key Logger is absolutely free, contains all basic features described above and is | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
882. | Keylogger Hunter 2.1 (styopkin.com) | ||
for blocking the activity of keyboard monitoring programs presumably running on your PC. Neutralizes up to 90% of keyloggers, depriving them of information about the pressed keys. Keylogger Hunter was created, which paralyzes accumulation of information by Hook-based keyloggers. This program is neither a detector, nor a disabler of keyloggers; it paralyzes the principle of | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexander Styopkin | Size: 611 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
883. | Keylogger Pro 1.7 (exploreanywhere.net) | ||
is an advanced, low level stealth keystroke monitoring application that will secretly record and backup all keystrokes typed on your PC. It offers a wide variety of features including the ability to view keystrokes remotely by having the program send keystrokes to a specified email address every X hours. KeyloggerPro can run in total stealth mode for invisible | |||
Updated: 2, 2006 | Rating: 257 | Author: Bryan Hammond | Size: 886 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
884. | KeyMan 2.5.2 (vp-soft.com) | ||
Change master volume, Control WinAmp, Run screensaver, turn on/off monitor, send keystrokes to the applications... And this is only the small part of all its possibilities! KeyMan will allow you to accomplish many repetitive tasks just in one click. Minimize/Restore apps, Set/clear "Always on top" flag | |||
Updated: 9, 2005 | Rating: 0 | Author: Konstantin Koryashev | Size: 876 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
885. | LaptopLocate.net 2.9.2 (tometasoftware.com) | ||
LaptopLocate.net is a software utility that will monitor a computer's IP address to allow server administrators and general users to locate their computer. Using cutting edge technology, each time a computer that has LaptopLocate.net is turned on, the IP address of the computer is transmitted to a pre-determined location via email and logged for reference. This information is | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 4839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
886. | LaunchIt NOW! Plus 2005 (gemiscorp.com) | ||
and productivity and achieve maximum efficiency in your work. It's very easy to use and you can have it up and running in no time. Also, it comes with the useful add-ons: Shutdown NOW!, Cleanup NOW!, and RevealPassword NOW!. Its new features include: the ability to dock the window to any screen edge (top, right, bottom, left). The user also can control the window animation speed | |||
Updated: 9, 2005 | Rating: 42 | Author: GemiScorp | Size: 3088 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
887. | Izbushka Wallpaper Organizer 1.01 (izbasoft.com) | ||
this is exactly where Izbushka has helped me yet again. I found it's not just a wallpaper changer but a feature-rich collection manager too. Izbushka allows you to organize your collection by categories. No need to convert images to match your desktop dimensions. The program fits each image | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Lvov | Size: 3593 kb | Shareware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
888. | LetUknow 2.03 (mhsoftware.co.uk) | ||
provides a "peace of mind" method of monitoring your LAN and resources. You can specify numerous jobs and tests in advance on a "set and forget" basis, which LetUknow then runs at regular intervals - you choose how often. If a test fails, the appropriate individuals are notified immediately, via email or network messaging, allowing you to respond to a problem before your | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Mace | Size: 2101 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
889. | Link Spy 1.4 (spyutilites.com) | ||
copied into clipboard or dragged onto special targets (ReGet's icon, for example). The program gathers these links and addresses and places them into a virtual folder, so that you may later access them. You can make a short description of each of the addresses, sort and setup automatic activation of your browser or e-mail client. As you work on your computer, simply right-click | |||
Updated: 3, 2005 | Rating: 0 | Author: Dmitriy Gorin | Size: 600 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
890. | LinkFerret-Remote Capture Agent 3.10.447.0 (baseband.com) | ||
easy to use, low cost, high performance Ethernet/802.11B/G monitoring tool. Network admins may use it in scripts to periodically sample network traffic. Non-technical personnel can capture files and automatically forward results. It can even be invoked by other programs. Its ability to function in environments that many popular monitoring tools do not support, such as | |||
Updated: 9, 2005 | Rating: 16 | Author: David Ebert | Size: 1220 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
891. | Lock My PC 3.4 (fspro.net) | ||
Just wait for the person to take a coffee break and look at his monitor! So, is there a solution that is both safe and easy to use? In fact, YES! Lock My PC by FSPro Labs, is a unique one-click system locking software that ensures no one but you can access your private data when you leave your computer unattended. Just press the hotkey on your keyboard or double-click the TaskTray | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
892. | PC LockUp 2.185 (getfreefile.com) | ||
access to your PC in definite hours. PC LockUp also supports monitor power save options and has some additional useful features like built-in password protected screen saver and network user validation feature for Windows logon to increase your security. You will find the program interface very easy to negotiate. Excellent online help is available. Windows LockUp password-protects | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
893. | LogfileTail 1.1 (beorstudio.com) | ||
LogfileTail you can monitor files and track changes to your log files or output files. Like the famous Unix 'tail' tool LogfileTail outputs the last lines of the file but it has extended features, useful interface and easy interaction with other software you may have. Good tool for web-programmers | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Fedorov | Size: 738 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
894. | MacPhoneHome 3.0 (pcphonehome.com) | ||
PC PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
895. | MacVolumes 1 (peccatte.karefil.com) | ||
on Windows NT 4.0 or 2000 servers for distribution and statistics monitoring. Automatic connection to the Macintosh Servers and to the Macintosh volumes; detects invalid volumes and explores contents of mac volumes. It shows distribution and statistics information. Lets you can customize the table of Signatures (Type/Creator) / Extensions. It helps monitoring | |||
Updated: 9, 2005 | Rating: 16 | Author: Patrick Peccatte | Size: 2450 kb | Freeware Go to category: Network & Internet > Network Monitoring Similar programs | |||
896. | Magic Screensaver Master 2.0 (magicproject.com) | ||
you can start your screensaver, disable screensaver, turn off monitor, log off, restart computer, or shut down the computer. User can customize the activation field (mouse sensitivity for actions) and the delay before each ection is launched. You will be able to hide your screen contents at once and you won't have to wait 15 minutes or more for your screensaver to start | |||
Updated: 9, 2005 | Rating: 0 | Author: Magic Project | Size: 240 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
897. | Make Call 1.0 (cyteg.com) | ||
make a call using voice modem and play specified sound file when monitored server goes down. Make Call is Alchemy Eye pugin that will make a call using voice modem and play specified sound file when monitored server goes | |||
Updated: 9, 2005 | Rating: 0 | Author: Edward Shaparenko | Size: 276 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
898. | Masker 7.0.6 (softpuls.com) | ||
be viewed, sounds can be played and videos can be displayed on the monitor. Only you, using your password, are allowed to obtain access to the hidden files. http://www.softpuls.com/masker/ Hide any files and have them automatically encrypted! MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
899. | Maverick Launch Centre 2.1.004 (skaro.net) | ||
bars (with large or small icons) - make use of multiple monitors, - access verbs such as Find, Properties, Explore and Print, - create a common configuration for a mixed network of computers. A powerful and flexible launcher combining ease of use with a myriad of features including an alarm clock, a hex file viewer, an advanced font viewer, a file wiper, a file/disk | |||
Updated: 2, 2006 | Rating: 0 | Author: James Turner | Size: 1569 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
900. | Maxus 3.05 (neurobridge.com) | ||
or open documents at the specified time. A built-in traffic monitor displays the real-time graph of bandwidth usage. The hotkeys manager lets you assign custom keyboard shortcuts to some of the routine Windows tasks (such as restarting the system), start various applications using the hotkeys and even open and close the CD-ROM tray by pressing keys on your keyboard. Maxus also | |||
Updated: 8, 2004 | Rating: 0 | Author: NeuroBridge | Size: 1366 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Monitoring software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|