|
||||||
|
||
|
Home > Service log software |
Related keywords: service, customer service, Service, service centers, service center software, web service, customer service software, service management, service calls, appels de service |
|
|
331. | CleanDisk 2.8 (fmjsoft.com) | ||
examples of this. Other programs keep producing lots of unwanted log files. Yet others automatically create backup files of edited documents. Internet browsers create a lot of cache files, 'cookie' files, history files, et c, et c. The problem is that if you don't clean up such files periodically, your free disk space will slowly but steadily shrink and it will be more difficult to | |||
Updated: 9, 2005 | Rating: 0 | Author: Markus Dimdal | Size: 481 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
332. | ClockWise 3.30a (rjsoftware.com) | ||
from the Internet and Active Desktop refresh. On-line timer log includes daily, weekly and monthly stats. The 24-city time zone window now has over 720 cities to choose from, and ClockWise even includes a useful time/date screen-saver! The ultimate time-piece for Windows 95/98/ME/NT/2000/XP - Automate everything! 200-event scheduler, calendar, timer, alarm, stopwatch, time | |||
Updated: 9, 2005 | Rating: 42 | Author: Richard Joseph | Size: 761 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
333. | Codename Alvin - PC Spy Software for Windows 2.2.1 (codingworkshop.com) | ||
PC monitoring software - Its about taking control. Monitors and logs keyboard, application, screen and internet events. Easy to use, cheap to register. Great to keep an eye on what your kids are up to when your not | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Henshaw | Size: 133 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
334. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
records unauthorized access violations in a protected event-log file with a time and date stamped description of the threat. The system records key stroke activity that may provide clues as to the intruder’s intentions or their identity. Notification Services – Theft Recovery ComputerSafe sends various types of remote notifications when violations occur | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
335. | Comm-Logger 1.0 (wcscnet.com) | ||
is a very easy to use serial communication data logger. It can log data directly from the serial port to a standard file. Up to 32 ports may be logged concurrently. Comm-Logger supports logging serial communication data from one or more serial ports to one or more files. Comm-Logger is ideal for logging serial data from applications like PBXes, security systems, or any | |||
Updated: 9, 2005 | Rating: 132 | Author: Egberto Willies | Size: 5303 kb | Shareware Go to category: Communications > Other Comms Tools Similar programs | |||
336. | Control Freak 1.3 (windsweptsoftware.com) | ||
an Address Bar, The Command Line, which starts were Explorer's Address Bar leaves off. Mail Call Mail Call is a full-featured email client supporting the SMTP Internet email protocol. It has support for HTML, plain text, and full web pages. Supports multiple mail accounts and has a Remote | |||
Updated: 9, 2005 | Rating: 0 | Author: Greg DeBacker | Size: 2808 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
337. | ConversionTool 4.2.2 (keper.com) | ||
Access database into a SQL Server database, unlike the Microsoft’s UpSize Wizard preserving all table structure details, and supports the conversion of the views and procedures. Moreover, the tool supports solution of structural problems between Access and SQL Server like making the implicit behavior | |||
Updated: 9, 2005 | Rating: 6616 | Author: Burkhard Lau | Size: 3151 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
338. | D_back 1.60.3 (backupforall.com) | ||
of all startups, errors and warning messages are registered in text log files. In addition exists possibility to notify user by e-mail about starting/ending, errors or warnings of each backup job. Reliable data-backup tool for any computer running Windows. Implements various types of backups in major | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
339. | Delenda 2.415 (peccatte.karefil.com) | ||
if there exists a file of the folder which is not obsolete). A log file can be activated to report the list log of deleted or transfered file names. You can optionally use it as a Windows NT or 2000 or Windows XP service or in command line mode for cleaning via batch processing | |||
Updated: 2, 2006 | Rating: 203 | Author: Patrick Peccatte | Size: 2232 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
340. | Desktop Scout 4.0 (globalpatrol.net) | ||
which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop, transfer files, start and stop | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Service log software |
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|