|
||||||
|
||
|
Home > Access log software |
Related keywords: access, Access, access control, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access, last access |
|
|
111. | iNet Shaper 2.191 (winfiles32.com) | ||
management for each user), has filtering capabilities, powerful user access accounting and restriction, VPN, provides detailed traffic statistics of each user, has remote administration, activity monitor, activity logs. Router identifies user by IP address and by MAC address of incoming packet. Also, user can gain access to internet using logon utility included in | |||
Updated: 3, 2005 | Rating: 90 | Author: UIP RU | Size: 4100 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
112. | Inox 4.2 (vmoon.com.pl) | ||
activity and mail statistics and browse events logged to system log. Inox is provided with Windows Installer database, which makes installation quick, and system safe. The software is licensed on per-server basis with no user mailbox limitation. Registration price includes 180-days free technical support. Mail connector designed for transfering messages from any POP3 compatible | |||
Updated: 3, 2005 | Rating: 0 | Size: 2379 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
113. | Instant Message Grabber 2.0 (bitsplash.com) | ||
word or phrase. IM Grabber also includes optional passworded access and monitoring functions to supervise children's activity online. IM Grabber is a utility to automatically record AOL Instant Messenger or AOL IM conversations. Additonal features include: Searching, Ignoring and Closing IMs from specific users. Optional security and monitoring functions are also | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Bent | Size: 1705 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
114. | Internet Usage Monitor 7.7 (members.tripod.com) | ||
as specified by the user.It automatically becomes active when you log on to the internet.It calculates the total time as well as the time spent each month specifically.It generates the outputs in the form of attractive graphs and charts.Yearly Reports are also generated. Both session by session usage and yearly reports can be printed.The graph shows the time and cost spent on monthly | |||
Updated: 9, 2005 | Rating: 0 | Author: Gaurav Dhup | Size: 845 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
115. | ActMon STARR Computer and Internet Monitoring *PRO Edition* 3.27a (iOpus.com) | ||
individuals to track the use / abuse of PCs easily and invisibly. It logs screenshots, keystrokes, user names, passwords, path names, access times, windows titles, BOTH sides of a CHAT conversation, AOL and visited websites into a password protected encrypted file. In the stealth mode STARR does NOT show up in the system tray, task bar or task list. For remote surveillance of | |||
Updated: 2, 2006 | Rating: 222 | Author: ActMon GmbH | Size: 998 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
116. | IP2Location ActiveX/COM DLL 2006.03 (ip2location.com) | ||
and abuse of service; 5. Reduce credit card fraud; 6. Web log stats and analysis; 7. Auto-selection of country on forms; 8. Filter access from countries you do not do business with; 9. Geo-targeting for increased sales and click-throughs. Demo version is fully functional except with a 5-second delay. IP2Location(tm) is an active server component that translates | |||
Updated: 2, 2006 | Rating: 82 | Author: MK Wong | Size: 250 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
117. | IPalt 2.0 LITE/PRO 2.0.0.5 (ffh-lab.com) | ||
member area or extranet, it makes sense to hide the client's IP in different log files at server side, client side or on the route (ISP, Gateway, etc), whatever be the protocol in use (HTTP, FTP, NNTP, Telnet, etc.). For this, use of a dotless IP makes things less directly readable than using a dotted one or an explicit domain name. E.G. : fictive FFh Lab's | |||
Updated: 6, 2005 | Rating: 0 | Author: Eric LEQUIEN | Size: 193 kb | Commercial Go to category: Network & Internet > Other Similar programs | |||
118. | IsItUp Network Monitor 4.9.5 (tarosoft.com) | ||
response time, minimum response time, standard deviation & error log. IsItUp tracks the last successful and last failed Traceroute. Taro Software's IsItUp - When you need to know the status of your network. IsItUp continuously monitors multiple "pingable" devices using TCP/IP's Ping utility; it tests email servers by bouncing messages off auto-reply accounts and | |||
Updated: 2, 2006 | Rating: 54 | Author: Taro Software | Size: 3392 kb | Freeware Go to category: Network & Internet > Network Monitoring Similar programs | |||
119. | Izlenim Site Monitor 1.00 (izlenim.com) | ||
Izlenim Site Monitor is a tool that keeps an eye on your sites to see if they are accessible on the net. When a service goes down, you can choose to be alerted with an audible alarm, E-Mail or ICQ Pager. Izlenim Site Monitor will always show the current state of all sites you are monitoring. Izlenim Site | |||
Updated: 9, 2005 | Rating: 0 | Author: Kivanc Altinkeski | Size: 1212 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
120. | Keyboard Collector 2.07b (softdd.com) | ||
log and view all keys typed, including emails, instant messages, passwords, and more. You simply choose to have it run all the time, or to start at a specific time of the day, and it runs undetected while capturing all keyboard and data entry. Even if the computer is restarted, Keyboard Collector will automatically start running again. It runs invisible, does not show when | |||
Updated: 2, 2006 | Rating: 113 | Author: SoftDD Software | Size: 715 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Access log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|