|
||||||
|
||
|
Home > Log files software |
Related keywords: files, hide files, Files, PDF files, compare files, protect files, duplicate files, delete files, recover files, multiple files |
|
|
21. | Visual Build Professional 6.1 (kinook.com) | ||
Windows and web developers and increase your productivity today! It's easy to put Visual Build Pro to work doing all that manual labor for you so you can focus on more important things. Visual Build Pro is a powerful but affordable build management solution that will automate the build process without a huge commitment of time, and it works with the tools you're using today. By using | |||
Updated: 3, 2006 | Rating: 0 | Author: Kyle Alons | Size: 6978 kb | Shareware Go to category: Development > Other Similar programs | |||
22. | Apex SQL Log 2005.01 (apexsql.com) | ||
SQL Log is a powerful SQL database auditing tool that analyzes SQL Server's own Transaction Log to display information on data and structural changes. Since Apex SQL Log reads the Transaction Log, no database overhead is required and audits can be done on changes made | |||
Updated: 3, 2006 | Rating: 207 | Author: Apex SQL tools | Size: 5511 kb | Shareware Go to category: Development > Other Similar programs | |||
23. | GRBackPro - Professional Backup 6.0.22 (grsoftware.net) | ||
many Jobs. Any Job can backup a whole disk, a single folder or few files. Backup modes are: Full, Incremental and Differential. You can compress your files using the standard zip format and also password protect them. Fully customizable: include, exclude files, skip directories. An integrated restore facility allows you to quickly maintain two or more PC aligned. An | |||
Updated: 2, 2006 | Rating: 0 | Author: Roberto Grassi | Size: 1500 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
24. | Starfish Family Mail 1.51 (lincolnbeach.com) | ||
that they are only communicating with their friends! Each person logs in as themselves and using passwords they can keep others out. Each friend can have a specific authentication field that must match in order for an email to be viewable. This keeps out all the mail that was spoofed from your friends addresses! Assign your friends different icons to personalize them too. Parents can | |||
Updated: 2, 2006 | Rating: 0 | Author: Lincoln Beach Software | Size: 2409 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
25. | IP2Location ActiveX/COM DLL 2006.03 (ip2location.com) | ||
and abuse of service; 5. Reduce credit card fraud; 6. Web log stats and analysis; 7. Auto-selection of country on forms; 8. Filter access from countries you do not do business with; 9. Geo-targeting for increased sales and click-throughs. Demo version is fully functional except with a 5-second delay. IP2Location(tm) is an active server component that translates IP | |||
Updated: 2, 2006 | Rating: 82 | Author: MK Wong | Size: 250 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
26. | Power Clock 6.03 (powerclock.com) | ||
and out using specially coded cards. Automatic synchronization of files among different physical locations. Power Clock can connect to remote sites via the internet or any TCP/IP network. If you have a central office and several stores or job sites, your stores can connect to the home office via | |||
Updated: 2, 2006 | Rating: 0 | Author: Robbie Fletcher | Size: 3716 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
27. | System Monitor 1.4.1 (rundegren.com) | ||
a certain resource exceeds a certain value. You can set it up to log events and create usage reports to databases located anywhere on your network. You can also search remote computers for files, folders or running processes and delete or terminate these with ease. By adding rules that will be | |||
Updated: 2, 2006 | Rating: 0 | Author: -- -- | Size: 860 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
28. | NetVizor 4.19 (spytechonline.com) | ||
to track workstations and individual users that may use multiple PC's on a network. NetVizor tracks keystrokes, websites, programs ran, and much more! Combined with real-time remote surveillance and individual user monitoring, NetVizor is the most comprehensive network monitoring solution available | |||
Updated: 2, 2006 | Rating: 16 | Author: Nathan Polencheck | Size: 3048 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
29. | Instant Backup 1.3.2 (rundegren.com) | ||
you full control through customization and reports. The backed up files are stored separately, with the same hierarchy as in the source. You can specify filters for folders and file extensions to include/exclude. The built-in customizable scheduler can automate the backup and notify you by email when it has completed. In the backup summary you will get a full report over what | |||
Updated: 2, 2006 | Rating: 42 | Author: -- -- | Size: 846 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
30. | SQLExecMS 2.6 (laplas-soft.com) | ||
utilization of proc cache;Watch locks; Review space used by DB files, tables and indexes; Manage DB file and filegroups;Turn on and off trace flags;Manage scheduled jobs; Change SQL server and database options;Backup and restore databases; Analyze fragmentation of tables; Analyze wait statistics; Manage indexes and analyze the selectivity of an index; Attach/Detach databases; | |||
Updated: 2, 2006 | Rating: 433 | Author: Oleg Dantchenko | Size: 4928 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
|
Home > Log files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|