|
||||||
|
||
|
Home > Security log software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
201. | Cornolius Database Application 1.4.300 (mental9Production.com) | ||
all owners, databases, and users and registers their activities in a log file. 100% stand-alone application (equipped with its own database engine). Includes Database Wizard to simplify database creation. Databases secured by passwords and by privileges. Tables with primary/foreign key structure. Export database for use on the intranet. Handles multiple databases and users | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 12093 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
202. | Snare Micro Server 1.2 (intersectalliance.com) | ||
program that provides a central collection facility for a variety of log sources, including Snare Agents for Windows, Solaris, AIX, Irix, ISA Server, IIS Server, Lotus Notes (and others), plus any device capable of sending data to a syslog server. Snare is currently used by hundreds of thousands of | |||
Updated: 9, 2005 | Rating: 0 | Author: InterSect Alliance | Size: 439 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
203. | Snare Agent for Windows 2.5.1 (intersectalliance.com) | ||
Eventlog subsystem to facilitate remote, real-time transfer of event log information. Event logs from the Security, Application and System logs, as well as the new DNS, File Replication Service, and Active Directory logs are supported. Log data is converted to text format, and delivered to a remote Snare Server, or to a remote Syslog server with | |||
Updated: 3, 2006 | Rating: 259 | Author: InterSect Alliance | Size: 600 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
204. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 207 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Similar programs | |||
|
Home > Security log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|