|
||||||
|
||
|
Home > Log in software |
|
|
441. | COM Port Toolkit 3.6 (compt.ru) | ||
an integrated serial communications testing toolkit. It sends user's data to and receives one from a device and records all transfers to a log. You can test equipments serial communications protocol by hand: feed it input, check the output. You can write or use a script written by other developers to automate some specific tasks: CRC calculations, special transfer rules | |||
Updated: 3, 2006 | Rating: 16 | Author: Michael Golikov | Size: 1199 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
442. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
and Stored ComputerSafe records unauthorized access violations in a protected event-log file with a time and date stamped description of the threat. The system records key stroke activity that may provide clues as to the intruder’s intentions or their identity. Notification Services – Theft Recovery ComputerSafe sends various types of remote notifications when | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
443. | Comm-Logger 1.0 (wcscnet.com) | ||
is a very easy to use serial communication data logger. It can log data directly from the serial port to a standard file. Up to 32 ports may be logged concurrently. Comm-Logger supports logging serial communication data from one or more serial ports to one or more files. Comm-Logger is ideal for logging serial data from applications like PBXes, security systems, or any | |||
Updated: 9, 2005 | Rating: 132 | Author: Egberto Willies | Size: 5303 kb | Shareware Go to category: Communications > Other Comms Tools Similar programs | |||
444. | ConversionTool 4.2.2 (keper.com) | ||
Access database into a SQL Server database, unlike the Microsoft’s UpSize Wizard preserving all table structure details, and supports the conversion of the views and procedures. Moreover, the tool supports solution of structural problems between Access and SQL Server like making the implicit behavior of boolean fields in MS Access explicit in SQL Server by setting the | |||
Updated: 9, 2005 | Rating: 6616 | Author: Burkhard Lau | Size: 3151 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
445. | CSS Quick Backup 2.21 (css-software.com) | ||
wizards and flexible backup scheduling. Archive files are stores in ZIP format allowing the use of most common ZIP utilities. The Main Console graphically displays the status of each execution of the backup jobs and provides access to comprehensive log files that show all backup activity. The integrated Job Wizard is used to create backup jobs, define the execution schedule | |||
Updated: 3, 2005 | Rating: 0 | Author: Kevin Whynot | Size: 4809 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
446. | D_back 1.60.3 (backupforall.com) | ||
your important data files and documents. Your backups will be saved in major compression formats on any type of storage media: hard disks, network drives, CD or DVD. The program allows to back up data from remote FTP, and can transfer archives via e-Mail or upload it to remote FTP automatically. D_back | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
447. | Data Destroyer 1.5 (braintwist-studios.com) | ||
Each application you use generates its own history data, access logs, temporary data files, and each file contains time and date stamps. To ensure corporate and personal data security, this information, along with any Recycle Bin activity, all of which constitutes an electronic data trail, should be securely deleted so to avoid corporate or personal information leakage. But deleting | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
448. | Delenda 2.415 (peccatte.karefil.com) | ||
replicate folder structure when moving files and leave a shortcut in source folder after files transfer to archiving location. 3 methods for deletion or move tasks: - delete old files immediatly - delete files and send files to Recycle Bin - transfer aged data toward an archive folder. Can be used to dispatch files, monitors number of files in each structure. It | |||
Updated: 2, 2006 | Rating: 203 | Author: Patrick Peccatte | Size: 2232 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
449. | Desktop Scout 4.0 (globalpatrol.net) | ||
Scout is a powerful computer surveillance program which can be used in the home, school or office to monitor and record every detail of PC and Internet activity. The program contains several integrated tools which work together at the same time to record all programs used, keystrokes typed, web sites | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
450. | DFIncBackup 1.15 (webcenter.ru) | ||
root folders and sub folders. * Easily view selected files list in project editor using folders tree with explorer-like style. * Log file viewer for easy navigate and search. * Intelligent backup folders management: limitation by archive size or free space on hard disk volume | |||
Updated: 3, 2005 | Rating: 0 | Author: Andrei Gueranitchev | Size: 1432 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Log in software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|