|
||||||
|
||
|
Home > Log url software |
|
|
21. | ASP - IIS real-time monitor and log 2.60 (motobit.com) | ||
current state and progress of each running request in IIS. Lets you log IIS state. Real-time monitoring of running ISAPI scripts (.asp, .cgi, .idc, .idq ...) Real-time monitoring of big downloads Current number of running requests (scripts/downloads) Current state of the request Script start time and running time with precision up to milisecond. Request and response content-length | |||
Updated: 9, 2005 | Rating: 110 | Author: Antonin Foller | Size: 1091 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
22. | Browsy 2.0 (daRiteSite.com) | ||
or those with young children, Browsy can block webpages based on the URL patterns you specify, or based on the content in those web pages. Protect your kids from objectionable online content! You can even ask Browsy to remember details about you and fill forms on web pages for you, automatically. And | |||
Updated: 9, 2005 | Rating: 0 | Author: daRite Software Technologies | Size: 593 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
23. | Darn! Passwords! 3.1.03.41 (darnpasswords.com) | ||
web sites. Just pick the password, and drag it and it's log-in (if there is one) into the program or web site that uses it. No retyping is necessary (even in programs that do not accept the drag, you can just paste the password in). Go to the URL of a password protected site with the click of a button. Its simple interface makes using your passwords convenient | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Thornton | Size: 2454 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
24. | Flystrike Spam Interrogator 2.4.0.63 (flystrike.net) | ||
origin of messages; and ban them according to both MD5 Signature and URL pointers. The banning of these elements allows Flystrike to perform auto deletion of e-mail messages if required by the user. A log of deleted messages allows the user to discover any false positives. A threat list is available that allows the user to enter e-mails associated with particular worms or | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4920 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
25. | FTP Voyager Browser 4.6.2 (CrystalPort.com) | ||
operations. It can connect to almost any FTP site, whether it's a Unix site or a Windows NT site, and it looks and feels like Windows Explorer. In fact, you can even drag and drop files from the FTP site to your hard drive, and vice versa. Also included are local drive and folder panes, a log pane, the ability to resume broken file transfers, and 270 pre-configured public | |||
Updated: 3, 2005 | Rating: 54 | Author: Chris Addington | Size: 4739 kb | Demo Go to category: Network & Internet > Browsers Similar programs | |||
26. | GL-AD Popup Terminator 1.81 (gleanersoft.com) | ||
interface for you to customize it. You can build up your own url list of sites that their popup windows should not be killed, disable/enable ad popup killer, disable/enable tray icon, or even return Internet Explorer context-menu to its original settings. Get this smart popup killer and surf without pesky popup ad now! Some Features: - Automatically runs and kills popup when | |||
Updated: 9, 2005 | Rating: 0 | Author: James Dong | Size: 788 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
27. | IPalt 2.0 LITE/PRO 2.0.0.5 (ffh-lab.com) | ||
member area or extranet, it makes sense to hide the client's IP in different log files at server side, client side or on the route (ISP, Gateway, etc), whatever be the protocol in use (HTTP, FTP, NNTP, Telnet, etc.). For this, use of a dotless IP makes things less directly readable than using a dotted one or an explicit domain name. E.G. : fictive FFh Lab's | |||
Updated: 6, 2005 | Rating: 0 | Author: Eric LEQUIEN | Size: 193 kb | Commercial Go to category: Network & Internet > Other Similar programs | |||
28. | LinxExplorer 1.4 (linxexplorer.com) | ||
internal and optionally external links relative to the starting URL and presents the results in real-time. The results can be filtered and exported to HTML or text format. Report can be displayed in the integrated text viewer or external program associated with text or HTML files. You can open and edit multiple local HTML and text files. LinxExplorer logs and displays all | |||
Updated: 9, 2005 | Rating: 0 | Author: Ruslan Scherbakov | Size: 1166 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
29. | Max-FTP 5.2 (neotextsoftware.com) | ||
of two halves which can retrieve the directory listing of any URL types supported by Max-FTP. This enables you to transfer from client to client, server to client, client to server, and server to server. FTP Shortcut: You can save your sites into FTP shortcut files which can be loaded into Max-FTP anywhere on your system by double clicking the file. By default all your shortcut | |||
Updated: 9, 2005 | Rating: 0 | Author: Neotext | Size: 5944 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
30. | PopX 1.5 (mysite.verizon.net) | ||
PopX provides visible and audible pop-up alarms and detailed pop-up logs. When a pop-up is detected, an icon is shown on the PopX toolbar. The pop-up log records url of the pop-up and the web page generating the pop-up. PopX is cost-effective. You pay only US$9.9 for the best pop-up | |||
Updated: 9, 2005 | Rating: 0 | Author: Software PopX | Size: 1445 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
|
Home > Log url software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|