|
||||||
|
||
|
Home > Log on software |
|
|
21. | COM Port Toolkit 3.6 (compt.ru) | ||
an integrated serial communications testing toolkit. It sends user's data to and receives one from a device and records all transfers to a log. You can test equipments serial communications protocol by hand: feed it input, check the output. You can write or use a script written by other developers to automate some specific tasks: CRC calculations, special transfer rules | |||
Updated: 3, 2006 | Rating: 16 | Author: Michael Golikov | Size: 1199 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
22. | Apex SQL Log 2005.01 (apexsql.com) | ||
SQL Log is a powerful SQL database auditing tool that analyzes SQL Server's own Transaction Log to display information on data and structural changes. Since Apex SQL Log reads the Transaction Log, no database overhead is required and audits can be done on changes made even before the SQL log tool was installed. Features - live | |||
Updated: 3, 2006 | Rating: 207 | Author: Apex SQL tools | Size: 5511 kb | Shareware Go to category: Development > Other Similar programs | |||
23. | Starfish Family Mail 1.51 (lincolnbeach.com) | ||
lists for each person so that you can rest assured that they are only communicating with their friends! Each person logs in as themselves and using passwords they can keep others out. Each friend can have a specific authentication field that must match in order for an email to be viewable. This keeps out all the mail that was spoofed from your friends addresses! Assign your | |||
Updated: 2, 2006 | Rating: 0 | Author: Lincoln Beach Software | Size: 2409 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
24. | IP2Location ActiveX/COM DLL 2006.03 (ip2location.com) | ||
to: 1. Display native language and currency; 2. Redirect based on country; 3. Digital rights management; 4. Prevent password sharing and abuse of service; 5. Reduce credit card fraud; 6. Web log stats and analysis; 7. Auto-selection of country on forms; 8. Filter access | |||
Updated: 2, 2006 | Rating: 82 | Author: MK Wong | Size: 250 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
25. | Power Clock 6.03 (powerclock.com) | ||
and export to Intuit Quickbooks Pro, dBase, Text. Advanced change log. The administrator or manager can see at a glance what fields and files were changed, who changed them, and what time they were changed. Small and fast, runs on any Windows computer. Use your old computer that is | |||
Updated: 2, 2006 | Rating: 0 | Author: Robbie Fletcher | Size: 3716 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
26. | System Monitor 1.4.1 (rundegren.com) | ||
Monitor is designed to monitor Microsoft Windows computers on a network. It can monitor the usage of CPU, Memory, Disk Drives and Network Adapters and notify you when a certain resource exceeds a certain value. You can set it up to log events and create usage reports to databases located anywhere on your network. You can also search remote computers for files, folders | |||
Updated: 2, 2006 | Rating: 0 | Author: -- -- | Size: 860 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
27. | NetVizor 4.19 (spytechonline.com) | ||
to track workstations and individual users that may use multiple PC's on a network. NetVizor tracks keystrokes, websites, programs ran, and much more! Combined with real-time remote surveillance and individual user monitoring, NetVizor is the most comprehensive network monitoring solution | |||
Updated: 2, 2006 | Rating: 16 | Author: Nathan Polencheck | Size: 3048 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
28. | SQLExecMS 2.6 (laplas-soft.com) | ||
similar tools. Finally, this application has been created based on long experience of development and of support DB systems. Llist of features divided by categories: -for DBA - Monitor active connections, oldest transactions and vital SQL server performance counters;Check utilization of proc cache;Watch locks; Review space used by DB files, tables and indexes; Manage DB file and | |||
Updated: 2, 2006 | Rating: 433 | Author: Oleg Dantchenko | Size: 4928 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
29. | AxCrypt 1.6.2.3 (axcrypt.sourceforge.net) | ||
or Swedish will be used for messages and dialogues depending on the language of the system. Documentation and installation scripts are in English. UNIQUE FEATURES The following are features that really set it apart from other file encryption tools, commercial as well as free: - Double-click to edit/view with any application, with automatic re-encryption when done | |||
Updated: 2, 2006 | Rating: 337 | Author: Svante Seleborg | Size: 1034 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
30. | Capturix VideoSpy 3.02.1817 (capturix.com) | ||
All application states, user actions can be saved as a Activity Log file all actions and events can used to search for a image on media archive. You even record the screen of the computer, this can be useful if your computer is shared with more people. Ready for multiple processor systems Capturix VideoSpy is a complete software that combines video surveillance and | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexandre Simoes | Size: 9442 kb | Commercial Go to category: Audio & Multimedia > Video Tools Similar programs | |||
|
Home > Log on software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|