|
||||||
|
||
|
Home > Server logs software |
Related keywords: server, Server, logs, web server, mail server, SQL Server, proxy server, sql server, server monitor, time server |
|
|
331. | CleanDisk 2.8 (fmjsoft.com) | ||
examples of this. Other programs keep producing lots of unwanted log files. Yet others automatically create backup files of edited documents. Internet browsers create a lot of cache files, 'cookie' files, history files, et c, et c. The problem is that if you don't clean up such files periodically, your free disk space will slowly but steadily shrink and it will be more difficult to | |||
Updated: 9, 2005 | Rating: 0 | Author: Markus Dimdal | Size: 481 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
332. | ClockWise 3.30a (rjsoftware.com) | ||
the system time to the atomic clock at NIST or any Internet NTP server, connection or disconnection from the Internet and Active Desktop refresh. On-line timer log includes daily, weekly and monthly stats. The 24-city time zone window now has over 720 cities to choose from, and ClockWise even includes a useful time/date screen-saver! The ultimate time-piece for Windows | |||
Updated: 9, 2005 | Rating: 42 | Author: Richard Joseph | Size: 761 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
333. | Codename Alvin - PC Spy Software for Windows 2.2.1 (codingworkshop.com) | ||
PC monitoring software - Its about taking control. Monitors and logs keyboard, application, screen and internet events. Easy to use, cheap to register. Great to keep an eye on what your kids are up to when your not | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Henshaw | Size: 133 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
334. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
records unauthorized access violations in a protected event-log file with a time and date stamped description of the threat. The system records key stroke activity that may provide clues as to the intruder’s intentions or their identity. Notification Services – Theft Recovery ComputerSafe sends various types of remote notifications when violations occur - pages | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
335. | Comm-Logger 1.0 (wcscnet.com) | ||
is a very easy to use serial communication data logger. It can log data directly from the serial port to a standard file. Up to 32 ports may be logged concurrently. Comm-Logger supports logging serial communication data from one or more serial ports to one or more files. Comm-Logger is ideal for logging serial data from applications like PBXes, security systems, or any | |||
Updated: 9, 2005 | Rating: 132 | Author: Egberto Willies | Size: 5303 kb | Shareware Go to category: Communications > Other Comms Tools Similar programs | |||
336. | Control Freak 1.3 (windsweptsoftware.com) | ||
an Address Bar, The Command Line, which starts were Explorer's Address Bar leaves off. Mail Call Mail Call is a full-featured email client supporting the SMTP Internet email protocol. It has support for HTML, plain text, and full web pages. Supports multiple mail accounts and has a Remote | |||
Updated: 9, 2005 | Rating: 0 | Author: Greg DeBacker | Size: 2808 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
337. | ConversionTool 4.2.2 (keper.com) | ||
and converts comprehensively a MS Access database into a SQL Server database, unlike the Microsoft’s UpSize Wizard preserving all table structure details, and supports the conversion of the views and procedures. Moreover, the tool supports solution of structural problems between Access and SQL Server like making the implicit behavior of boolean fields in MS Access | |||
Updated: 9, 2005 | Rating: 6616 | Author: Burkhard Lau | Size: 3151 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
338. | D_back 1.60.3 (backupforall.com) | ||
to any type of storage media including CD / DVD and remote FTP servers. The program can help you to protect your data from computer crashes, accidental deletion, virus damages, and ensure you will never lose your important data files and documents. Your backups will be saved in major compression formats on any type of storage media: hard disks, network drives, CD or DVD. The program | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
339. | Delenda 2.415 (peccatte.karefil.com) | ||
if there exists a file of the folder which is not obsolete). A log file can be activated to report the list log of deleted or transfered file names. You can optionally use it as a Windows NT or 2000 or Windows XP service or in command line mode for cleaning via batch processing. Of course Delenda can also process Macintosh files stored on Windows NT/2000/XP file | |||
Updated: 2, 2006 | Rating: 203 | Author: Patrick Peccatte | Size: 2232 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
340. | Desktop Scout 4.0 (globalpatrol.net) | ||
which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop, transfer files, start and stop | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Server logs software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|