|
||||||
|
||
|
Home > Log software |
|
|
301. | GetAnonymous 1.2 (getanonymous.com) | ||
Internet Explorer Toolbar, Compatibility, Real-time Activity Log). GetAnonymous List of Features is considered the most wide-ranging of online privacy software. First time to introduce the proxy chain technology, GetAnonymous allows you to stand behind multiple proxies. This provides you with more protection and privacy than ever. GetAnonymous not only allows you to use a proxy | |||
Updated: 9, 2005 | Rating: 42 | Author: David Adreson | Size: 5996 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
302. | GetAnonymous V2.0 - Personal Edition 2 (coftware.com) | ||
Internet Explorer Toolbar, Compatibility, and Real-time Activity Log). GetAnonymous List of Features is considered the most wide-ranging of online privacy software. First time to introduce the proxy chain technology, GetAnonymous allows you to stand behind multiple proxies. This provides you with more protection and privacy than ever. GetAnonymous not only allows you to use a proxy | |||
Updated: 9, 2005 | Rating: 90 | Author: Tom Brett | Size: 10240 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
303. | GL-AD Popup Terminator 1.81 (gleanersoft.com) | ||
for anyone to use this ad popup killer. - Life-long statistics to log the number of visited web pages and killed popup windows. - Easy to configure, disable , enable, and uninstall. - You can press Shift or ALT key at any time when browsing web pages to disable ad popup killer temporarily and show all popup window. GL-AD Popup Terminator is an intelligent popup killer that can | |||
Updated: 9, 2005 | Rating: 0 | Author: James Dong | Size: 788 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
304. | Gotta Know Now - Web Page Watcher 2.6m (members.bellatlantic.net) | ||
as well as the web page containing the information just found in it's browser window. It will run in the background while you are away or at your computer doing other work. Thus you can use Gotta Know Now to monitor a business news wire web site for a press release on your stock. Or you can use it to | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick DiRienzo | Size: 787 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
305. | Happy Log 1.61 (axolot.com) | ||
Log is a log file analyzer that examines log files from your web site. Reports are generated as lists or graphs, and can be exported as HTML, Word or Excel files. You will get statistics on: Hits and visitors, which browser and OP-system are used, how the visitors are moving around, search engines, errors, targets (is the visitors doing what you want them to do?), and | |||
Updated: 3, 2005 | Rating: 0 | Author: Lars Arvidsson | Size: 1622 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
306. | HiClock Pro 3.19 (hiclock.com) | ||
HiClock Pro gives you an easy and thorough way to synchronize your system clock to the exact time using the Internet. It queries one of the National Institute of Standards and Technology timeservers, which then returns the correct standard time. Standard time is converted to local time and compared with the | |||
Updated: 9, 2005 | Rating: 42 | Author: Alexander Kardailsky | Size: 1052 kb | Shareware Go to category: Network & Internet > Timers & Time Synch Similar programs | |||
307. | HiDialer 2000 PRO 3.2.19 build 1110 (kgsoft.com) | ||
connect, disconnect and re-connect to ISP on failures and log all sessions’ times. Throw in automatic applications launching on connecting to Internet, convenient scheduling and highly informative stats and you get the right application for all your dialing needs! HiDialer 2000 is available in standard and professional variations providing cost-effective licensing for | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Kardailsky | Size: 812 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
308. | Imaginary Telnet Server 1.0 (whizkidtech.redprince.net) | ||
One of the possible attacks is by using the Telnet protocol to log into your system. If successful, the attacker can gain complete control of your system. With the Imaginary Telnet Server running, he will be served a fake response which will prevent him from accessing any resources available on your system. The server will give him the impression that he has found a top secret | |||
Updated: 3, 2005 | Rating: 97 | Author: G. Adam Stanislav | Size: 38 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
309. | IMArchive 1.2 (surfblvd.com) | ||
allows you to automatically log, view and manage all your instant messages and chats using AIM, Yahoo and MSN messengers. It avoids recording all unwanted chat invitations. You can start and stop recording at any time. The viewer has a familiar web interface and allows you to delete, search and display messages by date/time, program and topic. IMArchive offers enhanced | |||
Updated: 3, 2005 | Rating: 209 | Author: Emmanuel TANYI | Size: 600 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
310. | iNet Shaper 2.191 (winfiles32.com) | ||
of each user, has remote administration, activity monitor, activity logs. Router identifies user by IP address and by MAC address of incoming packet. Also, user can gain access to internet using logon utility included in distribution. Traffic shaper gives the posiibility of bandwidth redistribution among LAN users in case of limited internet connection speed which saves bandwidth for | |||
Updated: 3, 2005 | Rating: 90 | Author: UIP RU | Size: 4100 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|