|
||||||
|
||
|
Home > Log file analysis software |
Related keywords: file, Analysis, analysis, File, file transfer, file management, file encryption, file manager, file sharing, file backup |
|
|
1. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
2. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
3. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
4. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
5. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
6. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
7. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
8. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
9. | IP2Location ActiveX/COM DLL 2006.03 (ip2location.com) | ||
and abuse of service; 5. Reduce credit card fraud; 6. Web log stats and analysis; 7. Auto-selection of country on forms; 8. Filter access from countries you do not do business with; 9. Geo-targeting for increased sales and click-throughs. Demo version is fully functional except with a 5-second delay. IP2Location(tm) is an active server component that translates | |||
Updated: 2, 2006 | Rating: 82 | Author: MK Wong | Size: 250 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
10. | Detective 2.1e (omniquad.com) | ||
is Omniquad's solution for organizations and individuals who are concerned about how and for what their computer systems were used. It examines computer activity BACKWARDS, detects illicit content and then displays a detailed log for inspection describing what illicit material was stored, when and where. In addition to the existing extensive vocabulary set, user input is | |||
Updated: 2, 2006 | Rating: 16 | Author: Daniel Sobstel | Size: 1239 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
11. | Winalysis 3.1 (winalysis.com) | ||
for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP traps, email, scripts, the event log... Create user-defined | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Fullerton | Size: 3122 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
12. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
ICQ, MSN and Yahoo chat conversations, all windows, applications, file changes etc. User-activity logs are periodically transferred, uploaded or emailed to you for analysis + more! Other features include password-protection, peer-to-peer network support, remote monitoring updates and a comprehensive user-activity log viewer. Monitor the activities of local and | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
13. | Asmw PC-Optimizer pro 7.6 (asmwsoft.com) | ||
and optimization utility to tune up windows performance. Remove junk files and zero size files to save valuable disk space; Registry Cleaner, to prevent application crashes;backup and restore backup; popup killer; Startup Manager, to prevent spy applications from running behind your back; erase | |||
Updated: 2, 2006 | Rating: 264 | Author: Asmw Soft Systems | Size: 6400 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
14. | WebWatchBot Website Monitoring Software 4.0 (exclamationsoft.com) | ||
and Analysis Software for Web Sites and IP Devices. Maximize availability through accurate, in-depth monitoring and alerting functionality. Analyze historical data for trends and visualize current state with real-time charting and graphs. 8 different monitoring types: Ping, HTTP, HTTPS, SMTP, POP3, FTP, Port, and DNS. View updated statistics on your watch items in | |||
Updated: 2, 2006 | Rating: 42 | Author: ExclamationSoft Corporation | Size: 10679 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
15. | WebWatchBot Website Monitoring Software 4.0 (exclamationsoft.com) | ||
and Analysis Software for Web Sites and IP Devices. Maximize availability through accurate, in-depth monitoring and alerting functionality. Analyze historical data for trends and visualize current state with real-time charting and graphs. 8 different monitoring types: Ping, HTTP, HTTPS, SMTP, POP3, FTP, Port, and DNS. View updated statistics on your watch items in | |||
Updated: 2, 2006 | Rating: 0 | Author: ExclamationSoft Corporation | Size: 10679 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
16. | WebLog Expert 3.6 (weblogexpert.com) | ||
Expert is a feature rich web server log analyzer. It will give you information about your site's visitors: activity statistics, file access statistics, paths through the site, information about referring pages, search engines, browsers, operating systems, errors, and more. Flexible filters will help you perform comprehensive research. The program generates HTML-based | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Serpik | Size: 2376 kb | Shareware Go to category: Web Development > Log Analysers Similar programs | |||
17. | WebLog Expert Lite 3.6 (weblogexpert.com) | ||
Expert Lite is a powerful web server log analyzer. It will give you information about your site's visitors: activity statistics, file access statistics, information about referring pages, search engines, browsers, operating systems, errors, and more. The program generates HTML-based reports with tables and charts. WebLog Expert Lite supports log files of | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Serpik | Size: 1116 kb | Freeware Go to category: Web Development > Log Analysers Similar programs | |||
18. | Web Log Suite 3.0 (exacttrend.com) | ||
Web Log Suite is a powerful web server log analyzer. It produces highly detailed, easily configurable usage reports in HTML format, for viewing with a standard web browser. It will give you information about your site's visitors, activity statistics, file access statistics | |||
Updated: 2, 2006 | Rating: 0 | Author: Serge Karmanov | Size: 1217 kb | Shareware Go to category: Web Development > Log Analysers Similar programs | |||
19. | Web Log Explorer 3.0 (exacttrend.com) | ||
log analyzers do almost the same. They take your log file, parse it and build reports by grouping or filtering the extracted data. Then you explore resulting tables or charts trying to figure out what is going on your web site, proxy server, firewall etc. Good log analyzers create "multilevel" and cross-linked reports. For example, when you see a page views | |||
Updated: 2, 2006 | Rating: 0 | Author: Serge Karmanov | Size: 1289 kb | Shareware Go to category: Web Development > Log Analysers Similar programs | |||
20. | Nihuo Web Log Analyzer 2.0 (nihuo.com) | ||
Web Log Analyzer is an ideal tool of marketing, web site administration or e-commerce with comprehensive analysis of the "who, what, when, where and how" of customers visited your web site. With many detailed and accurate HTML report, it can be used to increase efficency of your each page and advertisment. It will be a great Internet marketing tool for you. Please visit | |||
Updated: 2, 2006 | Rating: 97 | Author: Cui Ying Jie | Size: 7063 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Log file analysis software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|