activity occurs free software
Search results for tag «activity occurs»:
NetGraph 2.0.4.23
… so areas below graph are accessible
Transparency
Drag & Drop
2 mode Tray indicator
Auto-Hide capability (Shows when trafic occurs)
Automatically Hides and Shows when trafic occurs
Automatic and manual mode Graph axis scalling
Resizeable Graph…
DirMonitor 2.3.5.4137
… ch Triggers to that Watch.…
Port Magic 1.0
… ect these probes
Track the address of the perpetrator & time of probe
Confuse the prober with "fake" ports…
Windows Supervisor 2.00
… ated logs.
A simple and easy to use interface makes Windows Supervisor appropriate for all users, parents and employers regardless of experience.
Limitations
15 Day Free Trial…
Activity Indicator 1.0
… Activity Indicator will show your working activity during the day in a small XP styled window that you can place anywhere on the screen.
Also you can set it's transparency level so it will not divert you from work.…
Advanced Log Monitor 2.1.20
… string;
Automatically emails a notification to a predetermined email address;
Can email a short notification (to a mobile phone or a pager) or a detailed one;
Monitors logs in any format (syslogs, .log, .csv, etc.)
Limitations
30 day trial…
Give Me Too Network Sniffer 2.50
… ails coming from a specific address.
Give Me Too Network Sniffer can work in the command line mode and also features the ability to analyze tcpdump files produced by other sniffers.
Requirements LAN, Network card
Limitations
21 days trial.…
DeskRec 1.6
… for saving webcam broadcasts, taking motion screenshots from games or for documentation purpose.
It has an easy to use interface and in the settings dialog you can select the compression method to use from any codec installed on your machine.…
ClickWork 1.5
… ill start tracking the time spent on that activity. Simply click once more on the activity button to stop the tracking.
Or click on another activity button to end the tracking of the current activity and start tracking the clicked activity.…
Stealth Activity Reporter 4.6
… s track use and abuse easily and invisibly using password-protected encrypted log files.
You can deploy this tool using e-mail. Simply send an e-mail to the person using the computer you want to monitor. STAR will then be installed silently on th…
Related: