LivingDetector will also save the computer name, date and time, user name, control name, control caption, name of event handler, of an user action like button press. It made possible to catch exceptions, user actions and a debug trace over network with different applications.
It can be played by a single player, with up to four players on one computer, or even more players in local area networks or by internet. The game is played in rounds in which each player controls his hardy crew of clonks in realtime in order to either mine resources and build up a base or eliminate the opponent's crew.
IRMan infrared remote control receiver. Tira-2 infrared remote control receiver. WinLirc infrared remote control receiver. With Meedio you can now use the computer you already own to control virtually unlimited libraries of digital media.
O Finally NETWORK SUPPORT ADDED. O Control items number in your storage (numbers and graph)! Control payments for stewards (fix payment or percentage payment)! O Control steward work (check purchase every day, storage items number,...)!
Outpost Firewall PRO provides Security, Control, Privacy and Ease of Use. The program detects and blocks hacker attacks, guards the privacy of data stored on your computer, monitors network activity of your system and applications, provides secure web surfing, and prevents Internet worms from activating from your inbox.
Investor may control customer; Customer may control general contractor; General contractor may control subcontractors; Subcontractor has complete information about real finishing material consumption and may control its employees.
Outpost Firewall PRO provides Security, Control, Privacy and Ease of Use. The program detects and blocks hacker attacks, guards the privacy of data stored on your computer, monitors network activity of your system and applications, provides secure web surfing, and prevents Internet worms from activating from your inbox.
The CPU usage monitor controls the CPUs and perform an action when it breaks a limit. The file monitor controls the file properties and the http monitor checks when your website is on or off error. With help of TCP/IP connection monitor, you can check if a specified computer is available in or outside your network (i.e. your webserver).
Idem can check and copy the files and folders security informations (ACL permissions - access-control lists on NTFS partitions) and the files and folders attributes (hidden, system, archive, etc.) Compatibility with: - Open File Handler (Swat Consulting Inc.) in order to mirror opened files on Windows NT.
DetailsBuy now ($119.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Language: English, Portuguese, French
Vendor: Soft Experience
Once PortsLock is installed, administrators can control which users can access what TCP/IP based protocols (HTTP, FTP, SMTP, POP3, Telnet, etc.) on a local computer, depending on the time of day and day of the week. PortsLock is an easy-to-use security solution that fully protects corporate networks against attacks from the inside.