Statistics |
---|
Total online: 4 Guests: 4 Users: 0 |
|
File Catalog
Entries in category: 1366 Shown entries: 771-780 |
Pages: « 1 2 ... 76 77 78 79 80 ... 136 137 » |
Sort by:
Date ·
Name ·
Rating ·
Comments ·
Downloads ·
Views
With the popularity of the Internet, parents pay more attention on family network monitor. Employers also need powerful software to monitor their employees?? work. With MajMonitroing, you can stop worrying about the trouble. |
The most powerful system and data recovery solution ever! Enables users to recover their computers from any crash quickly and fully in sec. Prevents disruptive downtime, eliminates troubleshooting, endless service calls and hours of manual restoring |
Magic Mirror Backup works by copying the files and folders on a computer to other computers within a LAN. In exchange, these other computers also copy their own files onto the original computer. This sharing of backups has quite a few advanta |
Makes any folders (directories) you choose and all the filesin those folders completely invisible to others yet instantly accessible to yourself! |
Automate tasks by pushing keys into keyboard buffer, recording keystrokes and mouse events. Create Macros that do the job for you. |
Login to your PC without touching a thing! Luxand Blink! is a free tool to let you log in to your Windows account by simply looking into a webcam - no passwords to type and no fingers to scan. |
Main functions:
- LogonWatcher can show any type of user logged on workstation - local or remote. And it will not only show them in single-lined list as Netwatch do - you can also group your network to as much as 20 groups of computers |
LogonExpert is a Windows automatic logon tool for your home/office computer or corporate server. LogonExpert quickly and securely logs in a user by direct interaction with the WinLogon system without using the registry. |
A tool designed to prevent unauthorized usage of a Mac computer. ProteMac LoginTrap monitors all login events and detects whether a login attempt was successful or failed. After a login attempt was made, the program captures an image from the iSight |
As the world moves into new digital era, producing software, especially Internet software, becomes more and more profitable. |
|
|