|
||||||
|
||
|
Home > Log file software |
Related keywords: file, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE, file compare |
|
|
191. | KikBak File Protection Utility 2.1 (kikbakup.com) | ||
is software that protects your important files by maintaining the latest copies of those files on additional hard disks, network disks, Zip drives, or other media. Small and unobtrusive, it works behind the scenes to keep files safe from unexpected disk failure. Selectable subfolder processing with individual subfolder exclusion. Integrated activity log and | |||
Updated: 9, 2005 | Rating: 0 | Author: J Pando | Size: 842 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
192. | Handy Service for Palm 1.5 (handysolution.com) | ||
and Shopping on Palm, Job management, Work log tracking, Waiter assistance. Also useful for tracking other items and activities, i.e. home inventory, physical trainings, etc. Intended for service staff, contractors, salesmen, home users and business owners. Convenient assistant at the restaurants, bars, cafes, shops, car service centers, hair salons and other service places. Home | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Briliuk | Size: 484 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
193. | Modem Spy 3.4 (modemspy.com) | ||
1) record phone conversations. 2) microphone recorder. 3) WAVe files playback via telephone line. 4) Sound card playback of recorded mesages. 5) Record ALL incomming phone calls. 6) Has built-in software automatic gain control (AGC). 7) Detect and log Caller ID information. 8) Pop up caller ID info. 9) Super Spy mode will hide Modem Spy behaviour. Nobody will know that you | |||
Updated: 9, 2005 | Rating: 0 | Author: SoftCab Inc | Size: 253 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
194. | ASP - IIS real-time monitor and log 2.60 (pstruh.cz) | ||
monitoring tool for Microsoft IIS scripts (.asp, .cgi,..), static files (.htm,.gif,..) and downloads (.mp3,.zip,..). Lets you show online current state and progress of each running request in IIS. Lets you log IIS state. Real-time monitoring of running ISAPI scripts (.asp, .cgi, .idc, .idq ...) Real-time monitoring of big downloads Current number of running requests | |||
Updated: 9, 2005 | Rating: 16 | Author: Antonin Foller | Size: 1091 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
195. | U-Wipe 2.0 (u-wipe.com) | ||
the tracks in Microsoft Windows and Microsoft Office, temporary files, and more. U-Wipe supports such applications as Microsoft Internet Explorer 4.1 and higher, Microsoft Office 97 and 2000, Netscape 6, Mozilla, and so on. You can plan the deleting process by running the utility manually or automatically (on schedule). An additional "Boss key" feature has been added to hide IE | |||
Updated: 9, 2005 | Rating: 16 | Author: Artemiy Babamuratov | Size: 1971 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
196. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
197. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
198. | SecurDesk! 5.32 (cursorarts.com) | ||
a complete replacement for the Windows default Explorer.exe desktop/file manager shell. SecurDesk! Features Include: a desktop interface which can be custom designed; Logging of system usage; Enhanced file management with optional restrictions; Virtual desktops; Data protection with | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
199. | SMB File Sniffer 1.0.0.1 (microolap.com) | ||
File Sniffer is a powerful network security utility for logging SMB protocol (sometimes called NetBIOS over TCP) files operations and capturing file bodies, transmitted within a LAN. SMB File Sniffer allows you to: - log SMB file operations with two levels of | |||
Updated: 9, 2005 | Rating: 0 | Author: microOLAP Technologies | Size: 1378 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
200. | Trash it! 1.80 (optimussw.com) | ||
Windows platform. If you try out various applications from CD's or the net, and if you are tired of having them mess up your hard drive with files you don't really need, then Trash it! is for you. Use Trash it! to free up your hard drive of files that you have no need for, thus leaving more space for the files that you really need. Just run Trash it! once | |||
Updated: 9, 2005 | Rating: 0 | Author: Mustafa Lokhandwala | Size: 1708 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Log file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|