|
||||||
|
||
|
Home > Server log files software |
Related keywords: files, server, Server, web server, mail server, SQL Server, hide files, proxy server, Files, PDF files |
|
|
191. | SQL7Print 7.14.73 (starprint2000.com) | ||
Microsoft SQL Server 7 schema object definitions, including dependencies and permissions, for Database Roles, Defaults, File Groups, FullText Catalogues, Log Files, Rules, Stored Procedures, System Datatypes, Tables, Transaction Logs, User Defined Datatypes, Users, Views, Backup Devices, Logins,Languages, Remote Servers, Server Roles and | |||
Updated: 9, 2005 | Rating: 0 | Author: Joginder Nahil | Size: 3484 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
192. | Surf Spy 2.10 (bysoft.se) | ||
visited web site and stores it to a password protected encrypted file. For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal for parents who want to monitor their children while they are away. In the stealth mode, Surf Spy does not show up in the system tray, task bar, or task list. Surf Spy is compatible | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
193. | SyncBack 3.2.7.0 (mjleaver.com) | ||
backup, synchronize, or restore your files to another drive, FTP server, ZIP file, networked drive, or removable media. Highly configurable, SyncBack includes: detailed and easy to read log files; email results; simulated backups and restore; file filters; sub-directory selection; copy verification; background backups; auto-close of programs; easy | |||
Updated: 9, 2005 | Rating: 229 | Author: Michael Leaver | Size: 1948 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
194. | System Locker 2.40 (egtsoft.com) | ||
You can use System Locker to restrict access to your PC. It's attractive, secure, and very easy to use. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop on system lock and provides an informative message to other users. You can set start/stop times for users to limit their access to your PC. Any action performed by System | |||
Updated: 9, 2005 | Rating: 0 | Author: Rick Skinner | Size: 863 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
195. | TextHarvest 3.10.00 (members.aol.com) | ||
is ... a simple text file filter; a programmable data conversion and extraction utility; a report mining converter. Copy, delete, parse, change (edit or reformat) records from ASCII or EBCDIC text or binary files. Reformat flat files from Windows, Unix or Mac, including fixed record length and character terminated (e.g. null or tab). Import data to create CSV | |||
Updated: 9, 2005 | Rating: 2737 | Author: Timothy Canada | Size: 1142 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
196. | TK8 Safe 2.5 (tk8.com) | ||
passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not only stores your information, but helps you to use it. A fast and easy-to-use interface allows you to find information quickly. You | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
197. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
a completed inventory card for each computer/client. Upon initial log-in, users are requested to provide the system with the following information: Your Name, Room or department, Computer Brand, ID-Number. Vidamic Netlog then reports any changes made on each client log-in to the inventory | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
198. | Registry Analyst 1.2 (yavsoft.com) | ||
your computer's work is slow? Does your system crashes often? The reason of those problems possibly is a system registry. Each peace of software you install writes its own info into the system registry and sometimes does not clear this information after you removed it. Your system registry grows bigger and bigger and gets filled with out-of-date information. This can cause system | |||
Updated: 9, 2005 | Rating: 0 | Author: Yavsoft Corporation | Size: 440 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
199. | RegWorks 1.3.2 (regwrks.com) | ||
names of applications and processes that access registry keys and logs all relevant data (returned function code, registry key accessed, registry values etc.). This feature is critical to quickly diagnosing and solving any access rights issues that frequently arise in the corporate network environment. Importantly, RegWorks monitor features flexible filtering options that can be | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Loskutov | Size: 896 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
200. | RunAs Professional 3 (mast-computer.de) | ||
Professional is a substitute for Microsoft's command runas. RunAs Professional solves the problem that normal runas does not support the commandline parameter password. Now you can use RunAs Professional to install software, use it in batch skripts and much more. If you use RunAs Professional you can start an application with other credentials without log off and | |||
Updated: 9, 2005 | Rating: 0 | Author: Steffen Epple | Size: 111 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
|
Home > Server log files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|