Download

Section categories

Access Control Utilities [1366]
Anti-Virus Utilities [584]
Automation Utilities [694]
Backup and Copy Utilities [243]
Clipboard Management Tools [188]
Command Shells [60]
Compression and Zip File Utilities [292]
Disk Analysis Utilities [273]
Disk Maintenance and Repair Utilities [53]
Explorer Add-ons [101]
Explorer Replacements [97]
File Cataloging Utilities [1531]
File Cleanup Utilities [412]
File Encryption Utilities [501]
File Maintenance and Repair Utilities [534]
File Search Utilities [207]
File Splitting Utilities [183]
File Synchronizing Utilities [154]
Misc Encryption Utilities [155]
Misc Text Editing Tools [123]
Misc Utilities [2767]
Mouse and Keyboard Utilities [217]
Music Utilities [15]
Password Management Utilities [728]
Patches and Updates [42]
PGP Encryption Utilities [68]
Required Components [4]
Required Files [8]
System Analysis Utilities [77]
System Maintenance and Repair Utilities [947]
Text Editors A-G [82]
Text Editors H-P [25]
Text Editors Q-Z [24]
Text Form Editors [15]
Text Search and Replace Tools [74]
Text Viewers [35]

Our poll

What's your favorite antivirus software ?
Total of answers: 2

Statistics


Total online: 1
Guests: 1
Users: 0

Login form

File Catalog

Main » Files » Utilities » Access Control Utilities

Activity Logger 3.1
31.01.2011, 14:18
Spy software that runs invisible and records how your child, spouse or employee uses computer.
Activity Logger records to a log file visited Internet sites with web page titles, received and sent email (POP3/SMTP), IM chats, keystrokes in and all applications, programs that user runs and work duration in every application. It can take screenshots in specified time interval, working like video surveillance camera. Captured snapshots can be viewed later as a slide show.
Log file from the monitored computer can be emailed to you silently when computer goes online. Examine recorded information conveniently in a tabbed viewer. Have Internet, email and every application usage statistics.
Logging Engine runs invisibly and cannot be terminated in Task Manager without Administrator permissions. Logger can be configured to pop up a warning message on start-up and show icon in system tray. Logger configuration utility is secured with password.
Protect your child from online threats. Know exactly what they do online.

Category: Access Control Utilities | Added by: File-Post
Views: 114 | Downloads: 0 | Rating: 0.0/0
Total comments: 0
Only registered users can add comments.
[ Registration | Login ]

Search

Site friends

add site