Disk Change Monitor is an application that can monitor your computer activities and give you reports on a variety of changes.
Here are some key features of "Disk Change Monitor":
File backups: When you request a list of changes that have occurred and Disk Change Monitor finds that some files have been added to your hard drive or that some of the existing files on your hard drive have been changed, a "Backup" button is enabled on the report page. Clicking on this button shows you a list of all the files that were added or changed. You can then select which ones you want to back up to another disk. When files are backed up, the complete directory structure of the files is copied to the new disk to allow you to easily find the files again.
Monitoring the use of your computer to make sure that children and/or employees are not abusing the computer: The report on Temporary Internet files stored on the computer allows you to see what Internet sites were visited can allow you to see if the computer was used to visit sexually explicit or otherwise undesirable sites. The report on when the computer was turned on and off is useful for parents who want to restrict how much time their children can use the computer. It is also useful for employers who want to track how much time employees work on their computers or whether the computer has been used at unauthorized times.
System diagnostics: Because Disk Change Monitor reports any files or directories that were deleted or altered, you can more easily determine what changes are responsible if your computer seems to be having trouble caused by corrupted or accidentally deleted files.
Uninstalling programs or reversing changes: Because Disk Change Monitor reports on all sorts of changes in your computer, it can make it easier for you to remove programs you have installed or reverse configuration changes. Not only will you have a list of files that were added, you can see if the installation of the files changed the configuration files such as WIN.INI.
Checking for viruses: If you suspect that a virus has infected your computer, you can use Disk Change Monitor to check for changes in the size of your files, since some viruses may increase the size of files. Note that this is not the most powerful way of checking for viruses, since there are so many powerful anti-virus programs. Also, Disk Change Monitor cannot detect viruses that do not infect files. However, most other programs work by searching for known viruses, while Disk Change Monitor works by looking for changes in known programs. It therefore provides a complimentary method of virus detection.
Like it? Share with your friends!
Other Windows Software of Developer «Leithauser Research»:
Paradise Lost ebook ebook Paradise Lost Read part of it (about 20%) free, pay to read the rest. Leithauser Research ebook reader included. Search, copy, print, multiple bookmarks. Same reader can be used for multiple ebooks. Read 20% of the book free, pay to read the rest.Req
Option Profit Calculator Easily compare stock or option transactions for various time periods and various investments. Input transaction information such as purchase and sale (or execution) dates, prices. Gives actual profit from the transaction and the potential loss. Also gives
The Groover's Last Stand The Groover's Last Stand ebook is a psychological thriller/mystery of sorts with a splash of horror and the supernatural. A twisted and bizarre tale of love and desire, good friends becoming bitter enemies, conflicting personalities, revenge, and justice.R
The Best American Humorous Short Stories eBook - The Best American Humorous Short Stories - as the name describes, this is a collection of short humorous stories. Read part of it free, pay to read the rest. Leithauser Research eBook reader included. This version is the first release on CNET Downl
The Forbidden Gospels and Epistles The Forbidden Gospels and Epistles, Leithauser Research ebook reader included. Search, copy, print, multiple bookmarks. Same reader can be used for multiple ebooks.Requirements:Windows 95/98/Me/NT/2000/XPLimitations:Read 20% of the book
Software Time Lock Software Time Lock controls when and how long various computer functions can be used each day of the week. Set blocks of time during which you cannot access the Web, set blocks of time during which specific programs cannot be used, set blocks of time durin
Web Padlock Web Padlock blocks other Web browsers (Internet Explorer, Netscape, America Online) from running, leaving Web Padlock as the only available Web browser. In order to view any Web page on Web Padlock when Web Padlock is in the locked mode, that Web page must
Hide-A-File Hide files or entire folders on your hard drive. You can not only hide files such as documents or spreadsheets, but you can hide the executable program files to restrict use of the programs. A password set up by you is necessary to unhide files or folders
Program Sentry Program Sentry provides computer-access control and usage management. It allows you to create either a list of blocked programs or of allowed programs. In the blocked programs mode, any program on the list you create is blocked. In the allowed programs mod
The War of the Worlds ebook ebook The War of the Worlds Read part of it (about 20%) free, pay to read the rest. Leithauser Research ebook reader included. Search, copy, print, multiple bookmarks. Same reader can be used for multiple ebooks. Read 20% of the book free, pay to read the
Web Security Navigator (French) This explorer protects the surf, protect our children. Easy and free, light and extremely useful, just click on a pub an start this software, the pub is not a spyware but a simple contribution. Version 1.1 may include unspecified updates, enhancements, or
IMonitor Keylogger Pro Stealthly monitor remote computer activities from anywhere.
iMonitor Keylogger Pro allows you to monitor remote user's computer activities from the INTERNET. With iMonitor Keylogger Pro you can see everything they do with the computer by reports and rem
SmokingGun.Net Easy to use internet monitoring & parental control software effortlessly records all activity on the PC and helps protect children when they go online and surf the web - and can also be used to keep track of what employees are doing on company computers on
BrowseReporter BrowseReporter captures the URLs of every visited web site. For remote surveillance of networked PCs the information can be sent silently to the central database server. In stealth mode, BrowseReporter does not show up in the system tray, task bar, or task
Keylogware You can install KeyLogWare in the time it takes to download 250 kb. And it is as easy personalizing KeyLogWare, to make it invisible on your computer. The logs will be saved in HTML format, for easy browsing. KeyLogWare is the most userfriendly keylogger o
Libertix Keylogger Beautifully created,Lightning fast. Buy more pay less,. Best feature:
Remote log delivery by email. Invisible a) lkl runs in background without being detected. It is not visible even in task manager. b) lkl is not listed in installed programs, not visib
Assy The Worker Sometimes, it is very difficult to prove your work and efforts you put in, in the absence of solid proof.
Assy The Worker assists you record and monitor your computer activities. Takes screenshots automatically and logs everything is done by the worker.
Real PC Spy Real PC Spy software is a smart PC surveillance software that lets you know exactly what people do on a PC. It secretly records all PC and Internet activity, including typed keystrokes (keylogger), chats & IMs, emails, websites visited, Facebook use, micro
PC Screen Watcher PC Screen Watcher is a Windows application to monitor and track activities on a computer such as keyboard and mouse input, and control the usage of some applications like games. Features include can limit the application usage based on your settings (examp
Supported Operating Systems:
Windows 2000 |
Windows 98 |
Windows XP |
Comments on :
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10