Statistics |
---|
Total online: 2 Guests: 2 Users: 0 |
|
File Catalog
Entries in category: 1366 Shown entries: 301-310 |
Pages: « 1 2 ... 29 30 31 32 33 ... 136 137 » |
Sort by:
Date ·
Name ·
Rating ·
Comments ·
Downloads ·
Views
An easy to use security utility for Windows 95 that allows the supervisor of a computer to restrict parts of the operating system. Stopem is the perfect software package for parents, who wish to prevent their children from altering system settings. It is also useful for businesses, who are concerned that employees are changing important system settings.Requires the VB 5.0 Runtimes. |
The Stop Software Installation Tool allows you to prevent users of your computer from installing unwanted software with password protection. You can specify rules according files masks to block software installers execution. |
? Provides Recovery from FAT 16 / FAT 32 / NTFS / NTFS 5 File System.
? Recovers deleted files / folders even after recycle been has been emptied or use of shift + del key
? Provides Linux partition recovery from a deleted logic |
NTFS Data Recovery software provides recovery of deleted files and folders even after recycle bin has been emptied or use of Shift+Del key.
? Provides partition recovery from deleted partition or formatted logical drives.
? Prov |
? Provides recovery from FAT16, FAT32, NTFS, and NTFS5 file systems.
? Recovers deleted files/folders even after recycle bin has been emptied or use of Shift+Del key.
? File recovery from deleted partition or formatted logical d |
This Award winning FAT recovery utility, which need not be installed
prior to a data loss, provides easy recovery after partition table, boot
sector and root directory are corrupt and result in data loss. Disk
Recovery So |
Steel Usb Sentry controls usage of portable storage media such as iPods, USB Sticks, Usb hard drives. Network USB sentry effectively prevents users from introducing malicious programs, pirated softwares and other un-authorized data in the network. |
Monitor your employees or students on LAN in real time.StealthWatcher can monitor all computers in LAN. When user types any text or enters passwords, this text appears on your screen in real time. You can take scaled or full-sized screenshots from th... |
Keyboard activity watcher software is useful to keep watch on your employees or kids computer activities in your absence. Free keystrokes logger utility records all keystrokes, passwords, online chat and internet usage in a secret log file. |
Need to monitor someones activity on a computer? Stealth Keyboard Interceptor is a 32-bit utility that runs in the background, intercepting keystrokes and saving them in a text-based .log file. You wont see it on the task list, task bar, or system-tray area. (However, it does show up in the Close Program box.) Stealth Keyboard Interceptor operates silently, without any messages. Along with capturing keystrokes, the program keeps the names of running tasks, maintains the names of opened windows, and records the time and datewhen the computer is turned on and shut down. Several options are provided. In the registered version, you can encrypt its output file. Stealth Keyboard Interceptor could be useful for system administrators, for parents who want to monitor the computer activity of their children, or for anyone who wants to protect their hard work on a computer. |
|
|