|
||||||
|
||
|
Home > Server logs software |
Related keywords: server, Server, logs, web server, mail server, SQL Server, proxy server, sql server, server monitor, time server |
|
|
421. | Snip-Its 1.00 (pcshareware.com) | ||
to what you can do with a sticky notes and index cards. Snip-Its serves the same purpose as these small pieces of paper. Snip-its can be used as a thought organizer, or as a free-style database. Its a very flexible application that has many uses. What can you do with Snip-Its? Lots! If you are a writer, you can use Snip-Its to store notes, and create the outline to your | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Kapusta | Size: 1083 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
422. | SpyMyPC 2.0 (benutec.com) | ||
doing on your own computer while you are not at home (or office). Logs all keystrokes, applications, windows, websites, internet connections, passwords, chat conversations. Install SpyMyPC, set options "Run in Invisible Mode", so that it makes itself invisible to anyone. Shortcut keys helps you fast access to Log View and Unhide Mode. Typical uses for SpyMyPC : Monitor Your | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
423. | SpYOuTSiDe 1.2 (CurrenTChaoS.MxHosT.NeT) | ||
it's a program that record every keystroke that are pressed on the host computer, it can take screen shots also, and send the logs containing the keystrokes to a e-mail address or it can upload those logs to a ftp server. It's free , it's east to use , it's in english and romanian , and it has no add system integrated! SpYOuTSiDe | |||
Updated: 9, 2005 | Rating: 0 | Author: Remaker | Size: 428 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
424. | SpyPC 7.0 (xelerate.biz) | ||
kids or an intruder really accesses on your PC. Spy PC allows you to Log all keystrokes in chat rooms, create secret screenshots and see (and restrict) what applications are used. WATCH INTRUDERS, because you never know who has accessed your PC while you were out of the office or away from home | |||
Updated: 9, 2005 | Rating: 0 | Author: Hans Fremuth | Size: 3678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
425. | SQL2000Print 1.10.78 (starprint2000.com) | ||
your Microsoft SQL Server 2000 database by printing its objects (tables, views, Stored Procedures, etc.) in your own custom style. You can print Database Roles, Defaults, File Groups, FullText Catalogues, Log Files, Rules, Stored Procedures, System Datatypes, Tables, Transaction Logs, User Defined Datatypes, Users, Views, Backup Devices, Logins,Languages, Remote | |||
Updated: 2, 2006 | Rating: 0 | Author: Joginder Nahil | Size: 3695 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
426. | SQL7Print 7.14.73 (starprint2000.com) | ||
Microsoft SQL Server 7 schema object definitions, including dependencies and permissions, for Database Roles, Defaults, File Groups, FullText Catalogues, Log Files, Rules, Stored Procedures, System Datatypes, Tables, Transaction Logs, User Defined Datatypes, Users, Views, Backup Devices, Logins,Languages, Remote Servers, Server Roles and Linked | |||
Updated: 9, 2005 | Rating: 0 | Author: Joginder Nahil | Size: 3484 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
427. | Surf Spy 2.10 (bysoft.se) | ||
encrypted file. For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal for parents who want to monitor their children while they are away. In the stealth mode, Surf Spy does not show up in the system tray, task bar, or task list. Surf Spy is compatible with all web browsers. Internet Explorer, Netscape Navigator, Opera | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
428. | SyncBack 3.2.7.0 (mjleaver.com) | ||
backup, synchronize, or restore your files to another drive, FTP server, ZIP file, networked drive, or removable media. Highly configurable, SyncBack includes: detailed and easy to read log files; email results; simulated backups and restore; file filters; sub-directory selection; copy verification; background backups; auto-close of programs; easy and expert modes; profile | |||
Updated: 9, 2005 | Rating: 229 | Author: Michael Leaver | Size: 1948 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
429. | System Locker 2.40 (egtsoft.com) | ||
You can use System Locker to restrict access to your PC. It's attractive, secure, and very easy to use. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop on system lock and provides an informative message to other users. You can set start/stop times for users to limit their access to your PC. Any action performed by System | |||
Updated: 9, 2005 | Rating: 0 | Author: Rick Skinner | Size: 863 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
430. | System Monitor 1.4.1 (rundegren.com) | ||
a certain resource exceeds a certain value. You can set it up to log events and create usage reports to databases located anywhere on your network. You can also search remote computers for files, folders or running processes and delete or terminate these with ease. By adding rules that will be triggered when certain conditions are met for a specified resource on a computer, you can | |||
Updated: 2, 2006 | Rating: 0 | Author: -- -- | Size: 860 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
|
Home > Server logs software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|