Onlineeye optimizes PC Internet performance. A zoomable and printable graph shows 24 hours of speed history, allowing you to see what Internetactivity took place when you were away from the computer.
DetailsDownload trialBuy now ($97.27) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Language: English, German
Vendor: pmaSoft
132. Activity Logger educational
Have internet, email and every application usage statistics. Activity Logger invisibly records to the log file visited websites, keystrokes in email, chats and all application, programs user runs and work duration in every application, takes screenshots. DetailsBuy now ($39.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: Deep Software Inc.
133. Search Engine Composer
With four steps, Site Search Expert will help you add site search to your site at ease. The search engine works with internet, intranet and CD/DVD offline search, and it also provides visitors' search reports, including top 50 keyword report, 50 recently performed searches report, and searches activity report. DetailsDownload trialBuy now ($99.00) Find similar
Platform: Windows NT, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: MTop Software Inc
134. Activity Logger Enterprise license educational
Have internet, email and every application usage statistics. Activity Logger invisibly records to the log file visited websites, keystrokes in email, chats and all application, programs user runs and work duration in every application, takes screenshots. DetailsBuy now ($799.95) Find similar
Vendor: Deep Software Inc.
135. ProxyInspector for ISA Server
ProxyInspector for ISA Server is a cost-effective solution for companies that use Microsoft ISA Server 2000 web proxy and firewall to connect their corporate LANs to Internet. This tool analyzes the Web proxy, firewall and packet filter log files and produces comprehensive reports on bandwidth consumption by each individual or workgroup, sites visited, users' activity distribution by hours and days of the week, attempts to access blocked sites etc. Use this utility to fight cyberslacking and save your money. DetailsDownload trialBuy now ($299.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Language: English, German, Russian
Vendor: ADVSoft
Outpost Firewall PRO runs under Windows 98, 98SE, ME, 2000, and XP systems on any Internet connection. The program detects and blocks hacker attacks, guards the privacy of data stored on your computer, monitors network activity of your system and applications, provides secure web surfing, and prevents Internet worms from activating from your inbox.
These applications can help you to detect and eliminate (deactivate) threats to the integrity and security of your computer network. Unlike the typical antivirus approach, it does not rely on pattern-matching, so it may work on new or unknown types of activity monitoring programs.
Outpost Firewall PRO runs under Windows 98, 98SE, ME, 2000, and XP systems on any Internet connection. The program detects and blocks hacker attacks, guards the privacy of data stored on your computer, monitors network activity of your system and applications, provides secure web surfing, and prevents Internet worms from activating from your inbox.
Anti Tracks supporte les navigateurs Internet Explorer, AOL, Netscape, Mozilla FireFox et Opera. Il suffit d'un clic de souris pour que Anti Tracks détruit vos tracesinternet, activités sur l'ordinateur ainsi que les historiques de vos programmes stockés dans nombreux fichiers cachés sur votre ordinateur.
Flagship software application Anti- keylogger(TM) for Microsoft® Windows® 95/98/ME/NT/2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against most types of unauthorized activity monitoring software, both KNOWN and UNKNOWN. These applications can help you to detect and eliminate (deactivate) threats to the integrity and security of your computer network.