|
||||||
|
||
|
Home > Log url software |
|
|
11. | ASP - IIS real-time monitor and log 2.60 (iis-asp-script-real-time-monitor-tracer.pstruh.cz) | ||
current state and progress of each running request in IIS. Lets you log IIS state. Real-time monitoring of running ISAPI scripts (.asp, .cgi, .idc, .idq ...) Real-time monitoring of big downloads Current number of running requests (scripts/downloads) Current state of the request Script start time and running time with precision up to milisecond. Request and response content-length | |||
Updated: 9, 2005 | Rating: 0 | Author: Antonin Foller | Size: 1091 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
12. | Darn! Passwords! 3.1.03.41 (odarn.com) | ||
web sites. Just pick the password, and drag it and it's log-in (if there is one) into the program or web site that uses it. No retyping is necessary (even in programs that do not accept the drag, you can just paste the password in). Go to the URL of a password protected site with the click of a button. Its simple interface makes using your passwords convenient | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Thornton | Size: 2454 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
13. | Flystrike Spam Interrogator 1.6 (softwarepromoting.com) | ||
origin of messages; and ban them according to both MD5 Signature and URL pointers. The banning of these elements allows Flystrike to perform auto deletion of e-mail messages if required by the user. A log of deleted messages allows the user to discover any false positives. A threat list is available that allows the user to enter e-mails associated with particular worms or | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4950 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
14. | Flystrike Spam Interrogator 2.4.0.63 (downloads.flystrike.com) | ||
origin of messages; and ban them according to both MD5 Signature and URL pointers. The banning of these elements allows Flystrike to perform auto deletion of e-mail messages if required by the user. A log of deleted messages allows the user to discover any false positives. A threat list is available that allows the user to enter e-mails associated with particular worms or | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4920 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
15. | Chilkat Zip ActiveX - Affordable Zip ActiveX 9.3.0 (zip-compression.com) | ||
on the Web. Open and read or unzip the contents of a Zip file from a URL. Standard WinZip Password-Protection is Supported. Create or open/decrypt password-protected Zips. OpenFromMemory Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
16. | WinZip Compatible Compression ActiveX 9.3.0 (zip-compression.com) | ||
on the Web. Open and read or unzip the contents of a Zip file from a URL. Standard WinZip Password-Protection is Supported. Create or open/decrypt password-protected Zips. OpenFromMemory Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
17. | Winvestigator 2.4 (tropsoft.com) | ||
on boot, and runs undetectable in Windows capturing keystrokes, URL's, mouse-clicks, and screen shots to an encrypted log file. Winvestigator can be set to email the log for remote viewing. Winvestigator's settings are fully customizable. Each Settings section has mouse-over help that displays a quick explanation at the top of the screen. A web | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 795 kb | Demo Go to category: System Utilities > Other Similar programs | |||
18. | SNetGuard 1.52 (yaleisoft.com) | ||
any specific URL, domain name or type of file easily! SNetGuard record your browsing habits. SNetGuard can eliminate all of unwanted URL,type of file,intrusive clutter by Intelligently blocking any file type (graphics, music,flash,Java scripts, referrers, rogue cookies, and applets ...)! Andwhen all you need is high-speed information, Block graphics for graphic-free browsing | |||
Updated: 9, 2005 | Rating: 0 | Author: Yalei Zhou | Size: 640 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
19. | Surf Spy 2.10 (bysoft.se) | ||
the Internet activity on your computer. It captures the link (URL) of every visited web site and stores it to a password protected encrypted file. For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal for parents who want to monitor their children while they are away. In the stealth mode, Surf Spy does not show | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
20. | ServerSweep Professional 1.5 (shareware-promotion.com) | ||
comprehensive monitoring and alerting functions required by today's business critical systems. ServerSweep monitors almost every aspect of a Microsoft Windows NT, Windows 2000 or .Net Server, without the need to install any client software on the monitored server itself. ServerSweep offers a rich set of monitoring options including: System Overview, TCP/IP, Services, Processes, SNMP | |||
Updated: 9, 2005 | Rating: 0 | Author: Blue Square Software | Size: 16601 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Log url software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|