Track how much time you spend on different activities on your computer. Reports: time spent on different activities ... journal ... weekly and monthly timesheets. Similar windows are automatically grouped to provide a summary of your time.
Sep 13, 2011 19:57:36
Windows ME, Windows NT, Windows 2000, Windows XP, Windows Vista
Picnam Digital Photo Renamer 2.1.1 Rename digital photos quickly and easily. Give your digital photos meaningful names. Renaming is as simple as typing the new name and hitting enter. Add comments to photos, which are stored in a text file alongside the image file.
Description: Track how much time you spend on different activities on your computer.
* time spent on different activities
* weekly and monthly timesheets.
Similar windows are automatically grouped to provide a summary of your time. Define your own groups to refine the report.
Keeping a record of your activities on the computer raises privacy concerns. TimeSprite is intended as a personal time management tool, rather than as a way for others to monitor your activities. TimeSprite has several features to address privacy issues:
* The TimeSprite Monitor can be paused at any time. When it is paused, nothing is recorded.
* You can define your own activities in the TimeSprite Monitor. When one of these activities is selected, time is recorded against that activity, instead of recording the active window. Recording of user defined activities continues even if you are not using your computer.
* You can search and delete information that has been recorded. You can search for records by time and/or records that contain specific text. This allows you to remove data that you did not want recorded.
* TimeSprite does not record keystrokes, or any contents other than the title bar from other windows.
Spy Keylogger 22.214.171.124 Keystroke recording tool work exclusively for tracking external user activities on your personal computer. It provides you the facility to automatically record all keyboard typed
Stealth Activity Reporter 4.6 This is a monitoring tool for both networked and personal PCs. It lets companies and individuals track use and abuse easily and invisibly using password-protected encrypted log