|
||||||
|
||
|
Home > Event log software |
Related keywords: event, event tickets, event scheduler, event processor, mouse event, NT event logs, event planner, event management, event planning, special event |
|
|
141. | Ascella Log Monitor 1.0 (filemonitor.net) | ||
users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about events via LAN, which can be received by the Windows NT4/2000 Messenger service, and using e-mail, SMS and ICQ (via e-mail gates) Allows users to monitor events recorded in the Application, Security, System logs, dispatches the notifications | |||
Updated: 9, 2005 | Rating: 0 | Author: AAR Software Ltd. | Size: 700 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
142. | Backup-2006 Studio 5.0.1.200 (backup2001.com) | ||
FTP, FTPS, HTTP servers. It offers a graphical backup map, catalog, log files and can email you when a job is done. It supports File Access Manager technology to backup or copy any file in use, including SQL databases like Oracle, SQL Server, Microsoft Exchange... Backup-2006 Studio is able to manage | |||
Updated: 2, 2006 | Rating: 42 | Author: RD Technologies Inc | Size: 15065 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
143. | CheckSpace 3.3.0 (kosiol.com) | ||
CheckSpace sends a warn e-mail to an user defined address. The event log monitor sends you the new entries by mail if they are written in the log. The Dr. Watson monitor cachts Watson errors and send you a detailed error report if an error occured. That helps you to locate the problem and prevent it for the future. With the application monitor you can check if a | |||
Updated: 9, 2005 | Rating: 0 | Author: Timo Kosiol | Size: 2733 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
144. | Codename Alvin - PC Spy Software for Windows 2.2.1 (codename-alvin.com) | ||
PC monitoring software - Its about taking control. Monitors and logs keyboard, application, screen and internet events. Easy to use, cheap to register. Great to keep an eye on what your kids are up to when your not | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Henshaw | Size: 133 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
145. | D_back 1.60.3 (svap.pp.ru) | ||
of all startups, errors and warning messages are registered in text log files. In addition exists possibility to notify user by e-mail about starting/ending, errors or warnings of each backup job. Reliable data-backup tool for any computer running Windows. Implements various types of backups in major | |||
Updated: 2, 2006 | Rating: 0 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
146. | GiPo@FileUtilities 2.9 (gibinsoft.net) | ||
to customize the monitoring settings for the specified folder (the event list to process and some other options). The program can also monitor changes in subfolders if necessary. This program can work in background and generates the HTML log of file system changes. GiPo@Mount. Provides | |||
Updated: 9, 2005 | Rating: 0 | Author: Igor Artemov | Size: 908 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
147. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
148. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
149. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
150. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Event log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|