|
||||||
|
||
|
Home > Detailed statistics software |
Related keywords: statistics, Statistics, site statistics, web statistics, website statistics, web site statistics, detailed log, internet statistics, visual statistics, bandwidth usage statistics |
|
|
201. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
software allows you to keep track of just about every "important" detail about your chat friends. So, the next time someone asks you, "Remember me?" you can simply call up your password protected information on this person in seconds. No more "tap-dancing" required when you cannot remember a chat | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
202. | CheckSpace 3.3.0 (competent-software.com) | ||
the log. The Dr. Watson monitor cachts Watson errors and send you a detailed error report if an error occured. That helps you to locate the problem and prevent it for the future. With the application monitor you can check if a specified program is running. If not, you can execute it. If it runs, you | |||
Updated: 9, 2005 | Rating: 0 | Author: Timo Kosiol | Size: 2733 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
203. | Clone Hunter 1.2 (yavsoft.com) | ||
system. To avoid the mistake in deletion, the program can keep a detailed log file. Features: - You can scan several folders and drives at once; - Scan files by name, extension, date, content and other criteria; - Detailed statistics; - It is possible to scan certain types of files only; - Lists discovered duplicate files in a comfortable tree-like view | |||
Updated: 9, 2005 | Rating: 0 | Author: Yavsoft Corporation | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
204. | ConversionTool 4.2.2 (keper.com) | ||
Access database into a SQL Server database, unlike the Microsoft’s UpSize Wizard preserving all table structure details, and supports the conversion of the views and procedures. Moreover, the tool supports solution of structural problems between Access and SQL Server like making the implicit | |||
Updated: 9, 2005 | Rating: 6616 | Author: Burkhard Lau | Size: 3151 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
205. | Cresotech Easystart 2.0 (cresotech.com) | ||
of the general time of its use, frequency of its access and other details. Its powerful context search engine allows you to locate any program, form the list of programs and service files on your computer, sort them by name, time of work, last access time or launch number - just type in some letters from program name to the wildcard list and give some seconds to EasyStart to collect | |||
Updated: 9, 2005 | Rating: 0 | Author: Cresotech, Inc. | Size: 1508 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
206. | dbfUtils 2.1.2.1 (aidsoft.com) | ||
delete, recall, sort, zap, pack records, view and edit tables, get detailed database information. It includes a hex viewer to view records, memos or the whole table.dbfUtils includes: Complete Statistics for numeric fields, Data Dictionary and the ability to connect to the Apollo Database Server and a hex viewer.Some of dbfUtils features are:User defined Report Generator | |||
Updated: 9, 2005 | Rating: 215 | Author: Del Geist | Size: 3068 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
207. | DiamondCS ProcessGuard 3.150 (diamondcs.com.au) | ||
your personal firewall before attempting to transmit your personal details over the Internet, effectively rendering the firewall useless and leaving the user with a false sense of security. Likewise, it could modify your antivirus program by patching it in memory so that it no longer detected any | |||
Updated: 9, 2005 | Rating: 0 | Author: DiamondCS Support | Size: 1922 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
208. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
209. | EventTracker for Windows 3.0 (prismmicrosys.com) | ||
- filters for improved efficiency - configurable reports for detailed and management reporting - performance monitoring - critical service monitoring - interaction with other network manager - automatic backup and clear of event logs - remote java viewer for monitoring from non-Windows desktops - monitors UNIX syslog events, - multi window user friendly GUI Console to | |||
Updated: 9, 2005 | Rating: 0 | Author: Prism Microsystems | Size: 11829 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
210. | Evidence Destructor 2.14 (emailarms.com) | ||
purchases on the Internet (remember, your credit card an all the details are stored there and you will be left to bare the consequences of all their actions. To solve this problem, you need to clean up all the unwanted garbage that is cluttering your computer to get rid of the unwanted evidence that may be used against you one day. You need Evidence Destructor to do the job for you | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Detailed statistics software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|