|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
151. | #1 Key logger 2.0 (allthesoft.com) | ||
titles, BOTH sides of a CHAT conversation for most popular chat software, AOL content and visited websites. It logs keystrokes, user names, passwords, path names, access times, windows titles, BOTH sides of a CHAT conversation for most popular chat software, AOL content and visited | |||
Updated: 9, 2005 | Rating: 215 | Author: Herry Kevin | Size: 1048 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
152. | 007 Spy Software 3.01 (e-spy-software.com) | ||
Spy Software is a stealthy monitoring spyware which allows you to secretly track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just | |||
Updated: 3, 2005 | Rating: 1455 | Author: Demi He | Size: 2176 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
153. | Ace ScreenSpy 5.0 (caltroxsoft.com) | ||
ScreenSpy 5.0 is a popular Advanced Security Software to secretly monitor your PC screen, capture and save any Screen or Windows activity that occurs at any time. The Software automatically captures and saves the entire monitor screen, together with any Windows, Applications, Browser windows & images, Web-pages & Web-images etc that are opened by any user as well any | |||
Updated: 9, 2005 | Rating: 0 | Author: Caltrox Software | Size: 3550 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
154. | Active CHAOS 5.0 (safechaos.net) | ||
key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active public keys are ideal to create communication with the users who do not have the PGP or CHAOS programs installed | |||
Updated: 9, 2005 | Rating: 0 | Size: 996 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
155. | Advanced File Shredder 1.14 (ashkon.com) | ||
number key. Shredded files cannot be restored by any data recovery software. Protect yourself: Windows physically does not remove files from your hard disk and sensitive data like business or financial information can be easily recovered. Note: when you normally delete files using Windows Explorer and even emptying the Recycle Bin it is still possible to recover data or some of its | |||
Updated: 9, 2005 | Rating: 357 | Author: Ashkon Software | Size: 512 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
156. | Advanced Password Generator 2.87 (segobit.com) | ||
Advanced Password Generator is a Windows based application designed to generate passwords of any length or character content. This application is used by network administrators, internet service providers and others to create and administer passwords. It is fast, small and easy to use. Advanced Password | |||
Updated: 2, 2006 | Rating: 16 | Author: Segobit Software Segobit Software | Size: 177 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
157. | Advanced Password Manager 2.33 (rayslab.com) | ||
sites assign you a password without letting you change it. Besides, security experts say that you should use different passwords to protect yourself. Are fed up with forgetting your passwords and getting "Your login or password is incorrect" messages? Then it's time you get Advanced Password Manager | |||
Updated: 9, 2005 | Rating: 0 | Author: Rayslab Inc. | Size: 1086 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
158. | Advanced Security Level 6.1 (softfolder.com) | ||
Security Level is the best computer security application for Windows-based computers. It gives you an excellent administrative support to control the user access rights for your computer by setting up the desired access control level for each user. You can restrict access to Control Panel applets including Display, Network, Passwords, Printers, System, Add/Remove Programs | |||
Updated: 2, 2006 | Rating: 16 | Author: SoftFolder Inc | Size: 1065 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
159. | AES Home 4.0 (aes.safeworld.info) | ||
are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt answer-back messages with the proper password. No other software is required. These active AES-files are ideal for safe electronical distribution of the information | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
160. | AES Pro 5.5 (aes.safeworld.info) | ||
key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active public keys are ideal to create communication with the users who do not have the PGP or CHAOS Public Key programs | |||
Updated: 9, 2005 | Rating: 16 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
161. | AllCleaner 6.5 (allcleaner.com) | ||
and most advanced privacy and PC cleaning tool. We invented this software category more than two years ago and since then more than one million customers worldwide have installed Windows AllCleaner on their PCs! If you are like most people on the Net, you've most likely downloaded music on the Net. Did you know that when you use these file sharing services, they track your | |||
Updated: 9, 2005 | Rating: 25 | Author: Leo van Opstal | Size: 4929 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
162. | Anti-Trojan Shield 2.1.0.14 (atshield.com) | ||
while maintaining an exceptional level of personal privacy and security. Without this tool, you definitely should worry about new Trojan horses and viruses, but with Anti-Trojan Shield you have no need for concern. Its integrated update utility always keeps the software on the cutting edge, fully armed for battle. Anti-Trojan Shield is an advanced, highly effective blocker of | |||
Updated: 9, 2005 | Rating: 280 | Author: ATShield Team | Size: 6366 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
163. | avast! 4 Professional Edition 4.6.652 (avast.com) | ||
Professional Edition is a complete ICSA certified antivirus software for your company. avast! scans for viruses, worms and Trojans. avast! obtained multiple VB100% awards in 2002/5 Virus Bulletin comparative reviews. avast! Professional Edition includes the following components: On Demand Scanner - with two user interfaces: Skinnable Simple Interface - just select what do you | |||
Updated: 9, 2005 | Rating: 280 | Author: ALWIL Software | Size: 9250 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
164. | Axessh Windows SSH Client 3.2 (labf.com) | ||
(apart from places where people aren't allowed to own cryptographic software). SSH is the industry standard for remote logins. It addresses most of the critical issues which concerns most users while on the internet ; cyber hackers stealing passwords and other important information. Axessh brings you | |||
Updated: 2, 2006 | Rating: 16 | Author: LabF LabF | Size: 3059 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
165. | BestCrypt 7.20.2 (jetico.com) | ||
is easy-to-use, powerful data encryption software. You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work with like with any other drive. All data written there are encrypted "on-the-fly". Strong encryption algorithms Rijndael (AES), Blowfish,Twofish | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
166. | Boss Key 1.6 (boss-key.com) | ||
using a hot key! Everybody should have such program for personal security. Imagine, you work with confidential information - maybe, just writing email to your girlfriend, or entering your credit card information, or typing password to login somewhere, or,maybe, working with CIA files. WARNING! Someone comes to you. What will you do? Close program? - are you sure you can do it | |||
Updated: 9, 2005 | Rating: 16 | Author: VicMan Software | Size: 298 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
167. | Captain Mnemo Pro 1.4 (captainmnemo.com) | ||
how many potential threats are out there. That is why computer security becomes the major issue these days. As a solution for ever increasing data security fears many programs and services offer password protection. And to be honest, password protected environments are becoming actually secure being supported by latest technology advancements such as rock-solid encryption | |||
Updated: 8, 2004 | Rating: 116 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
168. | CDSHiELD SE 1.04 (mindestworx.free.fr) | ||
is a home-made cd-protector application which provide a awesome security against hackers. What's the benefits to using CDSHiELD ?: * Protect against unauthorised copying of the CD with a CD-Recorder using CD copying softwares. * Prevent users coying the contents of your CD-Rom to their hard | |||
Updated: 9, 2005 | Rating: 1704 | Author: Loki mindestworx | Size: 4390 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
169. | CHAOS Messenger 4.0 (safechaos.net) | ||
are executable programs (EXEs) that contain a Chaos file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable Chaos files that anyone can use to encrypt messages with the proper password. No other software is required. These active | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
170. | CHAOS Self Decryptor 3.9 (safechaos.net) | ||
are executable programs (EXEs) that contain a chaos file and the software necessary to decrypt the contents. Users can create self-decrypting executable files that anyone can decrypt with the proper password. No other software is needed. These self-decrypting chaos files are ideal to electronically distribute the information safely because they contain multiple compressed and | |||
Updated: 9, 2005 | Rating: 16 | Size: 535 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
171. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
is no easy way to keep track of your chat partners. Most online chat software includes just the 'politically correct' information about chart partners/buddies. This software provides all the standard information about your chat partner plus a whole lot more. How many times have you | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
172. | ChatBlocker 2.6 (exploreanywhere.net) | ||
they do NOT take place. When coupled with ChatBlocker's powerful security features, it's powerful stealth mode feature, and remote log viewing capabilities (via e-mail) - it makes ChatBlocker must have for any parent, employer, or anyone else looking to moderate Internet chat's! ChatBlocker is a desktop parental control application for moderating and restricting chat conversations | |||
Updated: 2, 2006 | Rating: 0 | Author: Bryan Hammond | Size: 1555 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
173. | Complete Cleanup 4.83 (softdd.com) | ||
cleanups which you would like to add to the cleanup list. This software will also improve the performance and disk reading speed of your pc. Simply run the self-extracting file to install. (Runs on all Windows systems). Protect your internet privacy, clean up all the garbage data on your pc, and improve your pc | |||
Updated: 2, 2006 | Rating: 42 | Author: SoftDD Software | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
174. | Crime Catcher 2.1 (crime-catcher.com) | ||
Catcher is software for your webcam that allows your computer to act as a security system. The software will monitor for motion and if detected actions can take place. For a full list of features see below: Advanced motion detection; Every single pixel being monitored for change. Hide Crime Catcher completely from view! Can appear in the system tray, taskbar | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
175. | CryptEnCrypt 1.10 (inetprom.com) | ||
is a powerful software application designed for electronic data protection. The files on your hard disk have no protection from unauthorized access. That means anyone who has access to your computer will be able to open these files and read the contents. CryptEnCrypt allows you converting your existing files to encrypted files. Encrypted files contain just the same data as | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
176. | CryptoMite 2.00 (baxbex.com) | ||
encapsulated inside the archive. CryptoMite is the first encryption software (and properly the only) which supports personal skins for encrypted exe-files (see http://www.baxbex.com/krprof.html http://www.baxbex.com/krprof.html for examples). You even could build encrypted exe-files in several languages (German, Spain, Italien, Portugues, French, Swedish). To send | |||
Updated: 9, 2005 | Rating: 16 | Author: Carsten Paasch | Size: 1576 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
177. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
which can be either a phrase or a sequence of 64 random bytes (the software provides a way for you to generate such random keys). Without the key the encrypted data is unintelligible and the information cannot be read. If your files are encrypted using ME6 then you can sleep easily at night knowing | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
178. | DA Password Recovery Pro 2.03 (deskarsenal.com) | ||
security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at | |||
Updated: 9, 2005 | Rating: 740 | Author: DeskArsenal.com | Size: 656 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
179. | Delete 2.10 (eBible.org) | ||
DELETE.EXE is a Win32 console application that deletes files. Win32 Console application means that it runs in a Windows 98, ME, 2000, or XP command prompt. It is an improvment over the DEL or ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
180. | Desktop Lock 6.1 (toplang.com) | ||
Lock is a powerful computer security software, it locks your pc to prevent others from accessing your private documents or resources, after your computer was locked by Desktop Lock, people will not be able to access your documents, browse your computer, or use programs on your computer. Desktop Lock fully supports all Windows system, includes Windows 2000/XP/NT and | |||
Updated: 9, 2005 | Rating: 0 | Author: Cui Jiugang | Size: 604 kb | Shareware Go to category: Desktop > Other Similar programs | |||
181. | DiskSpaceFree 7.4 (cdxray.com) | ||
a powerful disk cleanup utility,cleanup trash and recycle bin , wipe security protect ! DiskSpaceFree also can help you analyses the files full of your harddisk, Let you know what the file is that wasted most of your harddisk space , what the mainly usage the disk driver/directory it is , It | |||
Updated: 3, 2005 | Rating: 0 | Author: Aceterm leo | Size: 1076 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
182. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! and it empowers you to save screen snapshots at any time | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
183. | EldoS KeyLord 4.0 (eldos.org) | ||
you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
184. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
encrypted by Encryption Workshop will not be decrypted by other software or vice versa. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
185. | EXEsafe 2 (members.aol.com) | ||
a lock on almost any program file, such as a game, or your office software. It uses the highly secure blowfish encryption algorithm for extra security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When the protected | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
186. | File Shredder 2.0 (mazepath.com) | ||
with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction leaves NOTHING to recover. Windows does not physically remove deleted files from your hard drive. You think they are gone, but they can be easily | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
187. | FileVault 3.0 (networktoolz.com) | ||
directories and leave no trace. Files will be undetectable even by software forensics applications after being deleted. Use the Wizard to help you easily create Vault files that conceal your most sensitive documents. Send Vault files safely over the Internet safe in the knowledge that only the recipient can open them and that they will be completely meaningless to anyone who may | |||
Updated: 9, 2005 | Rating: 0 | Author: NetworkToolz | Size: 2610 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
188. | Lock Ness 3.1 (folder-lock-ness.com) | ||
Ness is security software to password protect and lock folders against unwanted access. Lock Ness will both secure your folders against accidental deletion and prevent other users from copying them. The folder can be locked or unlocked simply by right-clicking on it within Windows Explorer. The folder remains protected should your PC be rebooted into Windows Safe Mode, DOS or | |||
Updated: 9, 2005 | Rating: 82 | Author: Arthur Wagner | Size: 770 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
189. | FolderSafe 2.1 (occultsoft.com) | ||
is FolderSafe FolderSafe is a software tool that lets you hide or restrict access to non-virtual files and folders of your choice, manage your net shares. If you want to improve security of some sensitive folders/files, FolderSafe can help. FolderSafe Features - Office XP style UI | |||
Updated: 8, 2004 | Rating: 120 | Author: Ken Li | Size: 3066 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
190. | Folder Shield 2003 1.3 (baxbex.com) | ||
the selected data disappear. Folder Shield vastly increases the security of your PC, while at the same time being so simple and very convenient to use. Folder Shield is multilingual and supports: English, Spanish, German, French, Italian, Portuguese (Brazil), Swedish, and Danish Folder Shield enables you to make folders completely invisible. Just specify all confidential folders | |||
Updated: 9, 2005 | Rating: 0 | Author: Carsten Paasch | Size: 1269 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
191. | GreatCrypt 2.0 (miraxus.com) | ||
on the market today. GreatCrypt provides the highest level of security, and yet it is very easy to learn and use. It incorporates three components, which provide the absolute data protect and make the work to be pleasant: powerful and easy-to-use interface, high performance and strong encryption algorithm. The software allows you keep your private data in unbreakable | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
192. | Heidi R. Stealthy (TM) 2.0 (owendigital.com) | ||
With a single mouse-click, Heidi R. Stealthy (TM) allows you to instantly conceal your current PC or laptop activities from your friends, family, coworkers, roommates, casual onlookers and passersby. When it's safe once again, another single mouse-click returns your PC or laptop to its prior state. You can | |||
Updated: 8, 2004 | Rating: 0 | Size: 1172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
193. | IDEM File Synchronization 2.2i (peccatte.karefil.com) | ||
software to replicate directories and synchronize files, backup documents or distribute data automatically, mirroring important folders from a Windows NT/W2K/XP server toward another, checking a list of source folders at regular time intervals and updating target folders with new or modified files including sub-directories. Idem will check and copy files or folders | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2203 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
194. | Identity Knight 1.3 (fspro.net) | ||
of identity theft in the last five years! Holes in Internet Explorer software allowing 3rd party programs access to your private data surely help this number grow. So, is there a way to prevent identity theft? Yes! There is! Introducing Identity Knight: the unique credentials protection software that makes sure that no data from the IE AutoComplete list is left unprotected | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
195. | IIPwr Package 2.00 (iipwr.com) | ||
what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records (logs) activities (such as keystrokes, active applications, passwords, visited websites, emails, chats etc.) and periodically sends the data to your email. KeySpy's seamless installation makes it | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
196. | KGB Spy 3.93 (refog.com) | ||
Spy Software is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
197. | Lock Files and Folders 1.4 (winguardpro.com) | ||
Lock Files & Folders can lock your files and folders without encrypting them. It simply disables users from reading or writing to files, which includes operations such as moving, renaming, deleting and opening. Lock Files & Folders can lock your files and folders without encrypting them. It stops users from moving, renaming, deleting and opening files. | |||
Updated: 3, 2005 | Rating: 0 | Author: WG Soft | Size: 446 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
198. | PC LockUp 2.185 (getfreefile.com) | ||
LockUp is a computer security software, which enables you to apply password protection to Windows and restrict others from being able to use your PC while you are away. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and shows a picture, which you can change in the options. An allowed time schedule and | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
199. | Lockout Desktop Security 1.1.652 (dynamicdesigns.co.uk) | ||
Desktop Security software brings you many ways to secure and lock your desktop. You can define different sets of permissions and restrictions for specific users and groups, control access to certain applications, restrict when your PC can be used, restrict CD usage, log Internet usage, and log attempts at restricted activities. Note: This is a 30-day trial | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Wilkinson | Size: 2857 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
200. | Logbook 1.7 (home.t-online.de) | ||
===================================== Logbook fьr Windows 9x/ME Version 1.7 ===================================== Functions: ---------- Registration of working hours on PC including time of boot up, shut down, standby and user change. Resistant to manipulations. Detailed reports and totals of | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 34 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|