|
||||||
|
||
|
Home > Detailed log software |
Related keywords: detailed statistics, detailed |
|
|
21. | Network Clipboard and Viewer 1.0.0.20 (interdesigner.com) | ||
information before transfer it to your computer, quick and easy! - Log for process. - Automatic Clear Clipboard tool, to clear your local clipboard content at specified interval. - History of retrieved clipboard information, allows you to review/recall any previous remote clipboard information | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Serrano | Size: 2015 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
22. | Handy Backup 5.1 (handybackup.net) | ||
your valuable data. All backup activities are notified into a log file. Detailed online help is available. Backup to DVD, CD-R/RW, FTP, USB, Flash or LAN with Zip64 on-the-fly compression, strong 128-bit encryption and a flexible backup scheduler under Windows 9x/ME/NT 4.x/2000/XP with an easy to use yet powerful backup | |||
Updated: 2, 2006 | Rating: 0 | Author: Vladimir Vaschenko | Size: 2805 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
23. | Golden Eye 4.11 (monitoring-spy-software.com) | ||
storing this in a secure area for your later review. With the full detail and searchable Interactive and Html report provide by Golden Eye, you can easily know how your computer is being used or what is being done on your computer. Golden Eye is designed to monitor and record all the activity on | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin | Size: 1490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
24. | eXtended Task Manager 1.95 (warecase.com) | ||
give fast solutions for sudden problems which may arise in a product's functioning. - Debugging and improving application development. - A rich workstation investigation tool. - White box testing sessions for the QA department. - Investigation tool for integration possibilities. - And much | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Ritter | Size: 2464 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
25. | Evidence Destructor 2.14 (emailarms.com) | ||
you see, are being recorded by the system. It is done so when you log in to the web site later, you don't have to type a whole name and you don't have to complete forms and enter passwords again. In many cases it is done for your ease of use, but the problem with that is you compromise on your security | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
26. | DirSync Directory Synchronizer 3.0.4 (archersoft.com) | ||
pre/post-sync process, error handling, path variables and detailed log, etc. The synchronization is based on the policy specified by user to copy those files which are different between source and target folders. Using DirSync you may define multiple jobs and execute them at scheduled time automatically and silently. There are many situations of using DirSync. For | |||
Updated: 2, 2006 | Rating: 0 | Author: Frank Archer | Size: 2851 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
27. | Web Log Suite 3.0 (exacttrend.com) | ||
Web Log Suite is a powerful web server log analyzer. It produces highly detailed, easily configurable usage reports in HTML format, for viewing with a standard web browser. It will give you information about your site's visitors, activity statistics, file access statistics | |||
Updated: 2, 2006 | Rating: 0 | Author: Serge Karmanov | Size: 1217 kb | Shareware Go to category: Web Development > Log Analysers Similar programs | |||
28. | Web Log Storming 1.7 (datalandsoftware.com) | ||
Log Storming is an interactive, desktop-based Web Log Analyzer for Windows. The whole new concept of log analysis makes it clearly different from any other web log analyzer. Browse through statistics to get into details - down to individual visitor's session. Check individual visitor behavior pattern and how it fits into your desired scenario | |||
Updated: 2, 2006 | Rating: 0 | Author: Dataland Software | Size: 2438 kb | Shareware Go to category: Web Development > Log Analysers Similar programs | |||
29. | SpamMonitor 1.6.2.0 (digiarch.org) | ||
option for testing purposes. - Runs as a NT service. - Keeps a detailed log of all messages and actions. SpamMonitor works in conjunction with file based mail servers, like Mdaemon, MailCoach, Winroute, etc. It will monitor for new files with a certain extension and passes all new messages to the spam filter | |||
Updated: 2, 2006 | Rating: 0 | Author: Tijn Hoekstra | Size: 4311 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
30. | Proxifier 2.00 (proxifier.com) | ||
on bandwidth usage as a colored diagram in real-time. + Maintain log files. + Log incoming and outgoing traffic. + Get detailed reports on network errors. Proxifier is a program that allows network applications that do not support working through proxy servers to operate through a HTTP or SOCKS proxy server or a chain of proxy | |||
Updated: 2, 2006 | Rating: 3044 | Size: 685 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Detailed log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|