Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: E :: employee
Display: short descriptions | full descriptions
  • Kernel Computer Activity monitor is the software to trust when it is important to track all computer activities of employees. It captures snapshot of the target computer screen at specific intervals. One can specify maximum size of snapshots and also if snapshot should be of the active window. Every key that is pressed by user gets recorded. Administrator can check what all keys were typed after analyzing the keystrokes. Kernel Computer Activity Monitor records every internet activity ranging from browsers used, pages visited, visit time or user name. The tool enabled admin to look at the history of accessed application. Details such as name, launched time, executable path and launched by information are recorded about the application. The admin can save clipboard activities as well that can let you know everything that was copy-pasted including text and images. Kernel Computer Activity Monitor reports every email activity that is accessed without using SSL connection. The reports include date and time ...
  • Any Keylogger Free, as one of hot monitor software in the world, is widely applied to parental control, employee monitoring and private detective service. The keylogger not only record entire activities, including online chat details, clipboard contents and other activities performed on your PC but also block websites and applications, limit PC time for your kids, so that you can easily know what is happening on computers in your absence.
  • NCheck Bio Attendance, the automatic ready-to-use time tracking system with biometric fingerprint and face identification. The system may be used in a wide range of business applications, from employee time tracking to check-in at events, clubs, clinics, public and commercial facilities. + Attendance control automation system using fingerprint or face biometrics. + Fingerprint and face biometrics protect against errors or user fraud. + Ready-to-use end-user software with simple friendly user interface. + Client-server architecture for larger systems. + Printable reports generation for users attendance. + Data export to Excel or CSV. + Email notifications in case of issues. + Webcams and 100+ fingerprint reader models from 40 manufacturers supported.
  • Employee ID Badge Designer application is fully password protected that restricts an unauthorized user from making any modification in designed student identity card. Affordable Identity card generating application is easily available on website www.employeeidbadgedesigner.com that is an ideal choice to design eye catching employee identity cards for small to large business enterprises.
  • SharePoint administrators can now assign to Users and User Groups all relative permissions at Columns-and Views-level. Permissions can even be defined using conditions, so that the values of certain fields determine permissions dynamically. Permissions settings can be imported or exported as XML file for easy management and batch permissions assignment. SharePoint Column/View Permission provides further protection on list columns and views than the SharePoint permission system does. Using it, you can safeguard the confidential column contents from access and edition by unauthorized users. SharePoint Column/View Permission allows administrators to hide or read-only columns to specified users. So unauthorized users will not see or edit the columns at all. Use SharePointBoost Column/View Permission to set "Employee ID" and "Manager" Columns as ready only. Assign view permission to specified users, full access, hidden or read-only (disable edit view). Column/View Permi ...
  • Send changes notifications via SharePoint item event or customized time triggered email and SMS Optimize your company's workflow by sending detailed, fully-customizable alert e-mails and SMS messages to users whenever an item is created, modified, or deleted. Moreover, e-mail and SMS reminders are automatically sent at customizable intervals to remind employees before deadlines. Both alert emails and reminders can be sent if the specified conditions are fulfilled. Event-Triggered Alerts Users can be notified whenever an item is added, modified, and/or deleted. Time-Triggered Reminders Send time-triggered reminders to specified users. Users can be reminded within minutes, hours, days, weeks, months or years. Alert Conditions with Powerful Functions Determine at what time and under what circumstances e-mails should be sent, ensuring that users will only receive notifications that matter to them and only when they are required. Functions, operators and columns of the list are available as ...
  • Simplify SharePoint and Outlook environment by integrating Outlook into SharePoint that enables users to view emails or attachments right on SharePoint. Share important Outlook e-mails, attachments, calendar events, contacts, tasks, notes with select permitted personnel right on SharePoint for easy collaboration. Save emails as .msg, .doc, .html, .mht, .txt attachment to SharePoint List. Users who do not even have Outlook could check these emails on SharePoint. SharePoint Outlook Integration conveniently integrates Microsoft Outlooks with SharePoint's libraries and lists, providing a foundation for transfer of important e-mail to specified libraries from Outlook to SharePoint. In a Management position, Outlook Integration allows backup of e-mails on SharePoint for archival purposes in an event of a malicious virus or a system failure. Keeping a record library of vital e-mails is quite crucial and this archived data can also be managed from other entrusted employees as well as used for collabo ...
  • Trace My Notebook is a combination of software and website allowing to locate stolen notebooks and to establish countermeasures against such foul play like dishonest employees or industrial espionage. It silently surveils selected computers and collects evidence of illegal activities. All the evidence as well as notebook's location based on GPS, WiFi and IP, are reported to the legitimate computer's owner via the www.tracemynotebook.com website.
  • Never lose track of your assets again - with Asset Manager 2012, you can print barcode labels for your assets and check them in/out to employees. Attach Owner's Manuals, service logs, track depreciation, and more to maintain a complete history for each of your assets.
  • Any Keylogger Free, as one of hot monitor software in the world, is widely applied to parental control, employee monitoring and private detective service. The keylogger allows you to record entire activities, including online chat details, clipboard contents and other activities performed on your PC. It can also captures screenshots at regular time of interval so that you can easily know what is happening on computers in your absence.
  • Spy Keystroke Logger is a secret keystroke recorder program to spy PC activity at home or workplace. This keyboard recorder help you know everyting happened on the PC at anytime as a surveillance tool. It logs all keystrokes and captures sthe screen activities stealthy; this keylogger software supports remote spy through logs report delivery with email. It's a best solution to spy your kids, spouse and employees as a power surveillance tool.
  • LAN Monitor PRO, Professional employee monitoring and management software, tracking and controlling all internet activity and network performance of employee computer at their workplace; This employee monitoring program captures the screens of employee's computers real time by matrix screen in LAN from a single administrator's PC; and this monitor logs the employee's keystrokes, web sites, transfer rate real time, filter the websites, remote control and manage employee's files, send message, forbid USB storage device usage and etc. LAN Monitor PRO is your best choice to monitoring and controls your employee all internet usage and online activity in the local network, such as IM chat monitoring, email monitoring and other PC usages or online behaviors monitoring. This LAN monitoring software keeps your employees from being idle. With this employee surveillance, employees will not continue their endless chats, playing games or surfing the web at their work time. This LAN ...
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Have you found a method to list AD users in SharePoint? Or would you like an easier and more convenient way to update your AD information and simultaneously update lists in SharePoint? SharePoint AD Information Sync provides permitted users bidirectional synchronization therefore, keeping your AD information and SharePoint updated (which includes photos, employee type, and user login name attributes). There is also a log that records all activities for locating erroneous entries whether it is done manually or automatically. SharePoint AD Information Sync simplifies listing AD users in SharePoint and it keeps your information up-to-date. SharePoint AD Information Sync provides a short-cut to synchronize information in AD with SharePoint lists based on profile synchronization Information can be synced from AD to a SharePoint list either manually or automatically at desired intervals. Meanwhile modifications made to SharePoint lists can be synced back to AD. SharePoint AD Information Sync has the capacity ...
  • FlexiServer is software for automatic employee time attendance logging. For staff who work at computers it does all hours logging automatically. It records log on and shut down times as worked hours. It automatically detects lunch and other long breaks by monitoring computer idle state. Hours can also be entered manually if the employee is not working at a computer. Flexi-Server works perfectly with home or remote working staff.
  • Are you worried about how to record chat conversation details performed by any guest user on your computer system? Get Stealth Keylogger utility from www.stealthkeylogger.org website and monitors all internet activities performed by your employees during office hours in your absence within short duration of time at lowest money. Keylogger program is easy to use for recording all visited website.
  • Have you ever wondered how you can decrease the overall workload of the systems administrator? Or manage OUs or AD without increasing the workload of the systems administrator? SharePoint AD Administration provides the systems administrator authorization to delegate other managers with limited abilities to create, edit, rename, and/or delete OUs and AD properties. These delegated individuals can also have the capabilities to reset passwords, create and manage users and groups, and edit AD profiles from within a predefined OU. By delegating specified managers with limited abilities, SharePoint AD Admin will decrease the total workload of System Administrators. The SharePoint AD Administration web part allows administrators to safely delegate limited Active Directory administration permissions and user management capabilities to front-line employees, thereby reducing IT workload and eliminating the bottleneck that occurs when all routine change or maintenance requests are funneled to IT. As organiza ...
  • Wondering how to monitor your employee?s PC usage at workplace? How about a keylogger that can give you insights of each and every detail of what all your employees do and how do they spend their work time? Its unique white listing feature allows you to perform targeted monitoring of specific user activities. You can not only track all the websites visited but also monitor various applications opened. Moreover, the keylogger captures screenshots at specific intervals or on every mouse click apart from recording all the clipboard contents. The surveillance software is a remarkable method to ensure data secrecy and track activities of your employees. It is counted amongst the most effective monitoring programs available today. A remarkable tool to secure your LAN network, activity logger is an ideal computer surveillance utility for modern organizations. It allows them to keep a track of their employees? working and idle time at workplace. This makes an amazing tool to monitor employee efficiency and produc ...
  • MessagePoint is a screen saver for Microsoft PowerPoint. You select a PowerPoint presentation and this presentation is shown when your system becomes idle and the screen saver functionality kicks in. This functionality can be used on the computers of your colleagues to inform them about a project or production status, sales figures, new employees, anniversaries etc.
  • With StatWin you can easily accomplish employee monitoring in the workplace by using the reporting and monitoring tools that the software provides. StatWin monitors PC activity in Windows and then organizes the data in a structure that allows you to easily select what you want to view. All of the data is gathered and then organized into data groups to allow you to filter the information by specific user, database, or viewing period.
  • Productivity of an organization is hampered due to misuse of office computers by the employees. With Employee Desktop Live Viewer, organizations can continuously watch various activities of their employees in the working hours. It is available in two setup files; one is installed on the administrator?s computer and another on the computers used by employees. All employee desktops of an organization can be added in the main setup of the Employee Desktop Live Viewer for monitoring. Employee Desktop Live Viewer can monitor network PC activities of selected or all employees of an organization. It monitor both offline and online activities of an employee through a remote location of a network. Employee Desktop Live Viewer allow administrator to monitor network PC in stealth as well as invisible modes so that employees are completely unaware of their system monitoring, It also schedule offline recording of employee activities when network manager is away from the seat. Moreover, Employee Desktop Live Viewer also al ...
  • Beyond Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the 'girlfriend' your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP.
  • Newsletter Plus Software gives you a newsletter script that can create multiple mailing lists. Whether you prepare a commercial newsletter, or you need to deliver some info to your company employees, or you are just planning to send a few jokes to your friends, a wrongly chosen e-mail program may cause the wrong content to go to the wrong recipients at the wrong time.
  • Anykeylogger, as one of hot monitor software in the world, is widely applied to parental control, employee monitoring and private detective service. The keylogger allows you to record entire activities, including online chat details, typed keystrokes, clipboard contents and other activities performed on your PC. It can also captures screenshots at regular time of interval so that you can easily know what is happening on computers in your absence.
  • All In One Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? Who the 'girlfriend' your wife is chatting with all the time really is? What your employees are doing when you are not at home? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP.

Page 6 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware