Disk Change Monitor is an application that can monitor your computer activities and give you reports on a variety of changes.
Here are some key features of "Disk Change Monitor":
File backups: When you request a list of changes that have occurred and Disk Change Monitor finds that some files have been added to your hard drive or that some of the existing files on your hard drive have been changed, a "Backup" button is enabled on the report page. Clicking on this button shows you a list of all the files that were added or changed. You can then select which ones you want to back up to another disk. When files are backed up, the complete directory structure of the files is copied to the new disk to allow you to easily find the files again.
Monitoring the use of your computer to make sure that children and/or employees are not abusing the computer: The report on Temporary Internet files stored on the computer allows you to see what Internet sites were visited can allow you to see if the computer was used to visit sexually explicit or otherwise undesirable sites. The report on when the computer was turned on and off is useful for parents who want to restrict how much time their children can use the computer. It is also useful for employers who want to track how much time employees work on their computers or whether the computer has been used at unauthorized times.
System diagnostics: Because Disk Change Monitor reports any files or directories that were deleted or altered, you can more easily determine what changes are responsible if your computer seems to be having trouble caused by corrupted or accidentally deleted files.
Uninstalling programs or reversing changes: Because Disk Change Monitor reports on all sorts of changes in your computer, it can make it easier for you to remove programs you have installed or reverse configuration changes. Not only will you have a list of files that were added, you can see if the installation of the files changed the configuration files such as WIN.INI.
Checking for viruses: If you suspect that a virus has infected your computer, you can use Disk Change Monitor to check for changes in the size of your files, since some viruses may increase the size of files. Note that this is not the most powerful way of checking for viruses, since there are so many powerful anti-virus programs. Also, Disk Change Monitor cannot detect viruses that do not infect files. However, most other programs work by searching for known viruses, while Disk Change Monitor works by looking for changes in known programs. It therefore provides a complimentary method of virus detection.
Like it? Share with your friends!
Other Windows Software of Developer «Leithauser Research»:
Clock Guard Clock Guard prevents tampering with the computer clock. It insures integrity of file time or date stamps, employee sign-in or sign-out times, and computer use registration. You have several levels of protection, including simply blocking access to the Wind
Pride and Prejudice ebook ebook Pride and Prejudice Read part of it (about 20%) free, pay to read the rest. Leithauser Research ebook reader included. Search, copy, print, multiple bookmarks. Same reader can be used for multiple ebooks. Read 20% of the book free, pay to read the re
Alice in Wonderland eBook Ebook - Alice in Wonderland - Read about 20% of it free, pay to read the rest. Leithauser Research ebook reader included. Search, copy, print, and multiple bookmarks. Same reader can be used for multiple ebooks.Requirements:Windows 95/98/Me/NT/2000/XPLimit
The Groover's Last Stand The Groover's Last Stand ebook is a psychological thriller/mystery of sorts with a splash of horror and the supernatural. A twisted and bizarre tale of love and desire, good friends becoming bitter enemies, conflicting personalities, revenge, and justice.R
Shepherds Warning ebook ebook - The Bogdoddy Sagas, Shepherd's Warning. Read part of it free, pay to read the rest. Bogdoddies are peaceful people, living within the boglands. They have Webbed feet and the ability to whistle through their noses. Their lives have been disrupted by
The Adventures of Peter Pan ebook ebook The Adventures of Peter Pan Read part of it (about 20%) free, pay to read the rest. Leithauser Research ebook reader included. Search, copy, print, multiple bookmarks. Same reader can be used for multiple ebooks. Read 20% of the book free, pay to rea
Trojan Slayer Protect your computer from Trojans. Let Trojan Slayer learn what programs you use on your computer, then switch to one of several enforcement modes, where it blocks or eliminates any program that it has not learned is a good program. Enforcement modes are
No-Keys No-Keys is computer software program that displays a picture of a computer keyboard on the screen. Users can "type" on this virtual keyboard using a mouse, trackball, or similar pointing device. Whatever keys are typed on the virtual keyboard are sent to a
Software Time Lock Software Time Lock controls when and how long various computer functions can be used each day of the week. Set blocks of time during which you cannot access the Web, set blocks of time during which specific programs cannot be used, set blocks of time durin
SGS VideoSource SGS VideoSource is a video component that allows capturing of single frames of the video from any video capture device, snappy frame grabber or video file on Windows platform. The purpose of this library is to provide the powerful and efficient set of func
iShield iShield is an unique web browser plug-in that analyzes, detects and blocks offensive images from being displayed on your computer. iShield is easy to install, records and blocks any potentially pornographic images displayed and keeps track of know safe and
KidMail KidMail E-mail for Kids is a fun, interactive e-mail program designed for kids from preschool through 4th grade. It is intended for use with the 'KidMail.net' Safe Spam Free E-Mail Service (a free trial account on KidMail.net is created after download). Th
SA Spy 5 Star Computer Monitoring Keylogger Spy Software. Completely invisible and easy to use. All information captured is stored in an encrypted log file. The log file can be sent secretly at scheduled intervals to any specified email address. Ensure your compu
USB Shutter (32-bit) USB Shutter is designed to save your computer from Data scavengers. USB Shutter can disable USB drives on your computer.
BlazingTools Secure Office Secure Office is an affordable and compact monitoring solution, designed for local networks. It captures keystrokes typed Websites visited, chats from all popular instant messengers and makes screenshots. All user logs are stored on the admin's PC. You can
ID Folder Protector ID Folder Protector is a very easy to use program, designed to help you maintain the privacy of your personal data. It locks, hides, encrypts and protects from viruses, Trojans and spyware, files and folders you wish to keep for your viewing only.Limitatio
Elite Keylogger Elite Keylogger is the surveillance software for monitoring and recording every detail of PC and Internet activity everywhere: in your home or in your office. Features: Keystroke Recorder: Elite Keystroke Recorder will record all keystrokes typed, staying
SX for Skype The first security product dedicated for Skype. Use Skype as usual, SX for Skype will keep you safe from spammers, scammers, and malicious content. Keep track of all your Skype calls and messages. Save all your calls as MP3 files.What is new in this releas
serverMon LE serverMon LE is a utility to monitor the health of your connection to a remote computer, such as your website server, as well as the health of the server itself by using ping and file download requests. serverMon LE pings the host and, optionally, download
Supported Operating Systems:
Windows 2000 |
Windows 98 |
Windows XP |
Comments on Disk Change Monitor:
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10