|
||||||
|
||
|
Home > Log in software |
|
|
231. | ASP - IIS real-time monitor and log 2.60 (pstruh.cz) | ||
you show online current state and progress of each running request in IIS. Lets you log IIS state. Real-time monitoring of running ISAPI scripts (.asp, .cgi, .idc, .idq ...) Real-time monitoring of big downloads Current number of running requests (scripts/downloads) Current state of the request Script start time and running time with precision up to milisecond. Request and | |||
Updated: 9, 2005 | Rating: 16 | Author: Antonin Foller | Size: 1091 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
232. | U-Wipe 2.0 (u-wipe.com) | ||
certificates through three modes of safety, and delete the tracks in Microsoft Windows and Microsoft Office, temporary files, and more. U-Wipe supports such applications as Microsoft Internet Explorer 4.1 and higher, Microsoft Office 97 and 2000, Netscape 6, Mozilla, and so on. You can plan the deleting process by running the utility manually or automatically (on schedule). An | |||
Updated: 9, 2005 | Rating: 16 | Author: Artemiy Babamuratov | Size: 1971 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
233. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
234. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
235. | SecurDesk! 5.32 (cursorarts.com) | ||
you are responsible for multiple computers in a corporate office, or just need a way to keep novice users from tampering with the system settings, SecurDesk! offers many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide confusing and irrelevant items from selected users, to simplify training | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
236. | Trash it! 1.80 (optimussw.com) | ||
Windows platform. If you try out various applications from CD's or the net, and if you are tired of having them mess up your hard drive with files you don't really need, then Trash it! is for you. Use Trash it! to free up your hard drive of files that you have no need for, thus leaving more space for the files that you really need. Just run Trash it! once before you install a | |||
Updated: 9, 2005 | Rating: 0 | Author: Mustafa Lokhandwala | Size: 1708 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
237. | Windows Spy 1.003 (bysoft.se) | ||
know exactly what is happening on the remote computer as you see it in real-time. Some applications are: - Monitor your computer from a remote location. - Parents can monitor what their children are doing. - Demonstrate programs remotely. Windows Spy has two parts. A server that invisibly captures | |||
Updated: 9, 2005 | Rating: 42 | Author: Jon Kagstrom | Size: 2000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
238. | Anti-BO 1.5b (swiftprogramming.com) | ||
is a listening device which sits in your system tray awaiting hack attempts from Trojan programs like Back Orifice and Netbus. The program works my making your system look vulnerable to those who scan the internet for infected machines, and logs attempts of entry with your attackers IP address & date/time info, and the type of program they used. Anti-BO is a listening device | |||
Updated: 9, 2005 | Rating: 69 | Author: Ben Hynes | Size: 1100 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
239. | ASP huge file upload 2.1 (pstruh.cz) | ||
ASP file upload component with progress bar indicator. Let's you upload multiple files with size up to 2GB to a disk or database along with another form fields. Works with large posts, any character set, including unicode utf-8. Hi-performance text file logging for ASP/VBS/VBA applications. Lets you create daily/weekly/monthly log files with variable number of logged | |||
Updated: 9, 2005 | Rating: 82 | Author: Antonin Foller | Size: 541 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
240. | ASP - IIS real-time monitor and log 2.60 (iis-asp-script-real-time-monitor.pstruh.cz) | ||
you show online current state and progress of each running request in IIS. Lets you log IIS state. Real-time monitoring of running ISAPI scripts (.asp, .cgi, .idc, .idq ...) Real-time monitoring of big downloads Current number of running requests (scripts/downloads) Current state of the request Script start time and running time with precision up to milisecond. Request and | |||
Updated: 9, 2005 | Rating: 16 | Author: Antonin Foller | Size: 1091 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Log in software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|