System Change Log 3 1

Greyware Automation Products, Inc. in Security & Privacy

System Change Log is a security software tool that installs a system service whose purpose is to record all the activity that takes place on your disks' file system and report it in a much easier way than the standard Windows auditing system does. System Change Log is totally independent from the standard Windows service, though they can complement each other when both are active. This program does not install any shortcuts on your...


   
 
Related Software

mysys 3.6 IntegriTech Inc.  File & Disk Management

A Window into your System! Do you have alot of files? Do you spend too much time navigating hundreds of folders? Do you sometimes forget where a file is? mysys will be your new home away from all the pesky folders! News Flash: Version 2 now reads the file tables directly dramatically...

KLS Cloud Explorer 1.0.0.0 KirySoft  File & Disk Management

KLS Cloud Explorer is a easy-to-use and fast cloud storage client and file manager, with broad cloud service provider support (Microsoft Azure, Amazon S3, Google Cloud, OpenStack, OneDrive, Box, hubiC, FTP, WebDAV). It can connect to multiple servers and as a file manager, provides an intuitive...

ShredIt X 6.2.2 Mireth Technology Corp.  Disk Cleaners

Deleted data can be recovered from your computer. Protect your privacy with this easy to use file shredder | hard drive cleaner for Mac OS X that will erase data so it can't be recovered. Whether you want to clean a disk or wipe disk free space, ShredIt for Mac OS X is the right security...

Network Password Manager 5.2 UsefulSoft  Password Managers

Network Password Manager is a multi-functional program for storage, management and protection of valuable information containing passwords. Unlike similar desktop programs, it supports the multi-user mode. It also provides a common information environment and can create centralized data backup....

Bandwidth Manager and Firewall 3.6.1 Soft in Engines  Firewalls

BMF is tool for network administrators who needs central control over traffic shaping, amount of transferred data and security in company physical or virtual network. It is suitable tool for internet service providers or companies who needs network management tool on Windows platform. It contains...

Comodo Internet Security 12.1.0.6914 Comodo Security solutions, Inc.  Anti-Virus Tools

Comodo Internet Security is the awarding winning and free security solution for Windows that uses a powerful combination of antivirus, firewall, auto-sandbox, host intrusion prevention and website filtering to immediately protect your computer from all known and unknown malware. Our real-time...

ShredIt for Windows 6 Mireth Technology Corp.  Disk Cleaners

Files can be recovered from your computer's recycle bin. Protect your privacy with this easy to use file shredder that shreds data so it can't be recovered. Whether you want to erase a hard drive or wipe a file, ShredIt for Windows is the computer privacy software for the job. It shreds files,...

UFS Explorer Standard Recovery 7.13 SysDev Laboratories LLC  File & Disk Management

UFS Explorer Standard Recovery was developed to make even complex data recovery a simple procedure for both home users and professionals. The software embraces sophisticated mechanisms allowing to easily recover accidentally deleted files and data lost due to logical system damage after disk...

Automate 11.1.30.3 HelpSystems LLC.  Misc. Utils.

Automate sets an entirely new standard for server and desktop automation. Built on the experience earned from delivering automation to more than 9000 sites across 40 countries, Automate now adds the power of virtual and cloud-based computing environments, plus improved web-app interaction, to its...

GlassWire Firewall 2.1.167 GlassWire  Firewalls

GlassWire's free firewall software helps protect your privacy & security by monitoring your network activity for suspicious activity. You'll be shocked by how many applications on your computer are sending your private data over the Internet without you knowing. Once suspicious activity is...