|
||||||
|
||
|
Home > Log software |
|
|
521. | Brooks RPM Select LPD Print Manager 4.5.1.9 (brooksnet.com) | ||
logging in RPM provides each message in an easy to read format. Each log message shows a unique RPM event number, the time, the source of the message, the application that generated the message, and the message text. Easily translate and convert text from different formats. Translate EBCDIC data, ASA | |||
Updated: 9, 2005 | Rating: 59 | Author: Frank Tomasetti | Size: 4487 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
522. | Catalog Hot Files Pro 1.51 (drive-software.com) | ||
audio mixer controllers, dial-up connections, hibernate, stand by, log off, shut down the system, paste text, toggle any window's "always on top" status etc. Utility that allows you to set hotkeys to do common tasks like running applications/folders/documents/web pages, ejecting your cdrom drives, restarting your computer, controlling windows, Winamp and changing volume | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitri DriveSoft | Size: 810 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
523. | CheckSpace 3.3.0 (competent-software.com) | ||
CheckSpace sends a warn e-mail to an user defined address. The event log monitor sends you the new entries by mail if they are written in the log. The Dr. Watson monitor cachts Watson errors and send you a detailed error report if an error occured. That helps you to locate the problem and | |||
Updated: 9, 2005 | Rating: 0 | Author: Timo Kosiol | Size: 2733 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
524. | CleanDisk 2.8 (fmjsoft.com) | ||
examples of this. Other programs keep producing lots of unwanted log files. Yet others automatically create backup files of edited documents. Internet browsers create a lot of cache files, 'cookie' files, history files, et c, et c. The problem is that if you don't clean up such files periodically, your free disk space will slowly but steadily shrink and it will be more difficult to | |||
Updated: 9, 2005 | Rating: 0 | Author: Markus Dimdal | Size: 481 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
525. | ClockWise 3.30a (rjsoftware.com) | ||
from the Internet and Active Desktop refresh. On-line timer log includes daily, weekly and monthly stats. The 24-city time zone window now has over 720 cities to choose from, and ClockWise even includes a useful time/date screen-saver! The ultimate time-piece for Windows 95/98/ME/NT/2000/XP - Automate everything! 200-event scheduler, calendar, timer, alarm, stopwatch, time | |||
Updated: 9, 2005 | Rating: 42 | Author: Richard Joseph | Size: 761 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
526. | Clone Hunter 1.2 (yavsoft.com) | ||
To avoid the mistake in deletion, the program can keep a detailed log file. Features: - You can scan several folders and drives at once; - Scan files by name, extension, date, content and other criteria; - Detailed statistics; - It is possible to scan certain types of files only; - Lists discovered duplicate files in a comfortable tree-like view. - After the scan completed | |||
Updated: 9, 2005 | Rating: 0 | Author: Yavsoft Corporation | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
527. | Codename Alvin - PC Spy Software for Windows 2.2.1 (codingworkshop.com) | ||
PC monitoring software - Its about taking control. Monitors and logs keyboard, application, screen and internet events. Easy to use, cheap to register. Great to keep an eye on what your kids are up to when your not | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Henshaw | Size: 133 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
528. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
records unauthorized access violations in a protected event-log file with a time and date stamped description of the threat. The system records key stroke activity that may provide clues as to the intruder’s intentions or their identity. Notification Services – Theft Recovery ComputerSafe sends various types of remote notifications when violations occur - pages | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
529. | Comm-Logger 1.0 (wcscnet.com) | ||
is a very easy to use serial communication data logger. It can log data directly from the serial port to a standard file. Up to 32 ports may be logged concurrently. Comm-Logger supports logging serial communication data from one or more serial ports to one or more files. Comm-Logger is ideal for logging serial data from applications like PBXes, security systems, or any | |||
Updated: 9, 2005 | Rating: 132 | Author: Egberto Willies | Size: 5303 kb | Shareware Go to category: Communications > Other Comms Tools Similar programs | |||
530. | 1st Atomic Time 2.12 (greenparrots.com) | ||
the time at Windows startup without wasting your computer's resources. You can keep a log of all operations to check the activity. You can configure 1st Atomic Time to operate as a time server. Then you can ensure you have the exact time on any computer in your network. 1st Atomic Time can adjust the system time correctly even if you have irregular Windows time | |||
Updated: 9, 2005 | Rating: 0 | Author: Green Parrots Software | Size: 707 kb | Shareware Go to category: Network & Internet > Timers & Time Synch Similar programs | |||
|
Home > Log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|