Hoo WinTail is a real-time log monitor for Windows like the UNIX tail -f utility. It can be used to view the end of a growing file. It is ideal for viewing application traces or server logs in real time. You can view the last part of a large file without the need to load the entire file quickly. It can capture and display OutputDebugString (Windows Debug API) and TRACE (MS Visual C++ Debug Macro) output as well. Hoo WinTail is the most popular log viewer download.
See also: Hoo WinTail, WinTail, Windows tail, tail -f, file viewer, debug tool, log monitor, monitor log, log utility, log tool, log viewer, OutputDebugString
TextMeister is a generic text log reader with powerful monitoring and notification facilities. A single installation can harvest Text log data throughout your network without the need for multiple licences. Use filters to retrieve only the information in which you're interested and merge data from multiple logs for easier timeline analysis. TextMeister resides in your system tray monitoring your logs 24/7 and alerting you to items of interest. TextMeister is the second most popular log viewer download.
See also: Text Log, Log File, Log Reder, Log Viewer, Log Parsing, Log Parser
EventMeister is a powerful solution to centrally monitor and analyze Windows Event Logs. It will alert you to security issues and other critical events throughout your network, facilitate central archiving of log data and assist with analysis and meeting audit requirements. As EventMeister is a centralized monitoring solution there is no need to install agents on monitored PC's and servers. EventMeister is the third most popular log viewer download.
See also: Log Viewer, Event Log Monitoring, Monitoring, Event Log, Windows Event Log, Log Reder, Event Notification
LogQuest VF is a comprehensive security application system that searches information in any log. By analyzing security data from mixed devices, LogQuest VF helps customers worldwide to arrive at a solution. Any firm for example security organization use LogQuest VF to find risks, and analyze relevant vital security information. It provides a security organization with real time, complete and valid analyzed security informations.
See also: Log Management, Log Analytics, Log Forensic, Log, Network Management, Syslog, Log Viewer, Security Information Management, Security Event Management
Windows event log analysis is a very important task for any system administrator. Event Log Explorer is an effective tool for viewing, monitoring and analyzing events recorded in the Security, System, Application and other logs of Microsoft Windows. It extends the standard Event Viewer functionality and offers new features. Download it now - this program is FREE for personal use!
See also: event log, view, viewer, viewing, analyze, analysis, alalyzer, monitor, monitoring, log, event, events, application, security, system
ViewonLog is a real-time logging software for C++ and .NET developers. It can be used to trace logs while developing, debugging, testing and monitoring the software. It also supports various filtering, searching conditions and fast searching speed about stored log messages. ViewonLog also allow to change Logging Policy without the need to modify the source code or restart the application.
See also: log viewer, logging software, net log, net logging, c++ log, c++ logging, vb log, vb logging, logging tool, logging library
Manage local and remote Windows events more effectively with EventLog Inspector. The new cost-effective solution lets system administrators to extend Windows event log with more features. EventLog Inspector provides the ability to broadcast event log events to a syslog server or forward the events to an e-mail address. EventLog Inspector can either run silent or interact with the user by displaying pop-up notifications about selected events.
See also: windows system log, syslog, event log, windows event log, eventlog, event viewer, event log to syslog, event log to e-mail
XpoLog Center is a Log server and Analysis Platform, providing end to end log management solution. XpoLog Center primary featurs include Log Viewer, Log Monitor, Log Analysis Reports, Web Server log analysis and search. XpoLog provide web server monitoring, access log analysis and report generation. XpoLog Center provide Transaction tracking and transaction monitoring. Monitor Applications and servers for problems before end users notice them.
See also: Log Viewer, Log Monitor, Log Server, Log Analysis, Logs, Logging, Log management, syslog, IIS logs, Apache, log4j, java, Reports, Monitoring, Server, System, Application, Transactions, Correleations, Complex Events, problem isolation, troubleshooting
Event log manager software is developed to help users manage the system generated logs and W3C logs. Such software helps in event log reporting by indicating towards the source and cause of events. Windows event logs created in a system helps in tracking network errors and system problems to take adequate measures. Using Windows log management utility users are able to acquire full knowledge about the event types and their causes.
See also: event log viewer, windows event logs, windows event log viewer, windows event log monitor, event log software, windows event logs, log management, windows log management, event log manager, event log reporting
EventMeister is a powerful solution to centrally monitor and analyze Windows Event Logs. It will alert you to security issues and other critical events throughout your network, facilitate central archiving of log data and assist with analysis and meeting audit requirements. As EventMeister is a centralized monitoring solution there is no need to install agents on monitored PC's and servers.
See also: Event Log Monitoring, Monitoring, Event Log, Windows Event Log, Log Reder, Log Viewer, Event Notification
LogQuest VF is a Log analysis utility for all types of logs that searches information in any log. By analyzing security data from mixed devices, LogQuest VF helps customers worldwide to arrive at a solution. Any firm for example security organization use LogQuest VF to find risks, and analyze relevant vital security information. It provides a security organization with actual time, complete and valid analyzed security informations.
See also: Log Management, Log Analytics, Log Forensic, Log, Network Management, Syslog, Log Viewer, Security Information Management, Security Event Management
Event log analysis of Windows event logs is a highly significant task for any system administrator. Event Log Explorer is an effective utility to view, explore, backup and monitor events in Security, System, Application and other Windows logs. The software extends the standard Windows Event Log Viewer functionality and brings a lot of new features. Download it now - this software is FREE for personal use!
See also: windows event log, viewer, viewing, backup, print, export, analyzer, view, monitor, monitoring, log, event, events, application, security, system
Comfortable image viewer supporting panoramic pictures and large pictures. Instant 360-degree viewing, flat + spherical. Navigation bar, thumbnails, full screen mode, slide shows, printing, picture disk creation, image finder. 14 file formats + QTVR. EXIF, IPTC and GPS support. Windows application; no HTML, Java, or Quicktime required.
See also: Download, Google Earth, GPS, IPTC, EXIF, Camera, QTVR, Quicktime, JPEG, JPG, Panning, Zoom, Album, Organize, Find, Disk, DVD, Burn, Print, Thumbnail, Image, Picture, Photo, 3-D, Degrees, 360, Panorama, Windows, Browser, Viewer, Shareware
Quickly search through large numbers of files on your PC or network, including text and binary files, compressed archives, MS Word, Excel and PDF, etc. Find the information you want with powerful text patterns (regular expressions) specifying the form of what you want, instead of literal text. Search and replace with one or many regular expressions to maintain web sites, source code, reports, etc. Extract statistics and knowledge from logs files.
See also: sequence, collect, excel, word, pdf, log files, logs, network, desktop, replace, search, search and replace, regexes, regular expression, regex, perl, regular expressions, egrep, grep, windows, unix, wingrep, windows grep
Lets you manage servers and workstations from your local computer. AWRC does not require that you install any software on the remote machine. This turns the software particularly useful for accessing remote machines without any previous preparation. With AWRC you have the knowledge and capabilities to do virtually anything on the remote computer.
See also: remote, control, audit, pcanywhere, execution, shutdown, reboot, power-off, helpdesk, kill, password, hash, zip, unzip, download, upload, memory viewer, ports finder, hardware device
Enrich, speedup and secure your web travels: add TravelLog, Tracks, Popups, Status Message panes and WhoIs to Internet Explorer. Automatically capture web pages. Organize them into multiple thumbnails Tracks by topic, website, date, etc. Pause mouse cursor over thumb for larger image, click to navigate directly to web page. Kill popups, view them at your convenience. Print and save images, TravelLogs, Tracks, Status Messages and WhoIs reports.
See also: web page thumbnails, web navigation, whois, popups, travel log, print web page, internet research
Whether you are participating in fitness or bodybuilding; and your goal is losing or gaining weight, Workout Diary is the software you need to manage workouts, nutrition, supplementation and track your progress. Includes an extremely accurate body fat analyzer and calorie calculator. Also a comprehensive food database that lists various nutrients info; such as protein, carbohydrate, fat, vitamins and minerals values.
See also: workout log, fitness software, exercise log, bodybuilding software, exercise diary
All the rich features of DigiMode Ream Sigma Can be found in DigiMode Ream but few size increasing ones. Digimode Ream download size is set to stay under 1.44 mb no matter what. If you do not care about download size then download DigiMode Ream Sigma.
See also: midia player, media player, midia player, multimedia player, audio player, video player, mp3 player, photo viewer, web, auto, browser
Polygon Cruncher reduces the number of polygons of your 3D objects without changing their appearance. You keep all details even at high optimization ratio. You also keep texture information, vertex colors. Polygon Cruncher is really simple to use and has an OpenGL view, which allows controlling optimization results whenever you want. Polygon Cruncher is used by a lot of prestigious companies. P. Cruncher & 3D Photo Browser are provided together.
See also: object, mesh, scene, decimation, polygon, reduction, simplification, viewer
It is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.
See also: log files analysis, log analyzer, ms exchange server, postfix, qmail, sendmail, kerio mailserver, merak mail server, mdaemon, eserv, squid, proxy+, ms proxy, ms isa server, winroute, wingate, proxy server, ProxyInspector, MailDetective, Proxy Inspector, Mail Detective
Effective web marketing starts with thorough analysis of your potential customers browsing habits, web site effectiveness monitoring and geo-targeting. This unique tool offers all the power of traditional web server log analyzers combined with geographical traffic distribution visualization! Download FREE trial version now and see visually how exactly your traffic is being distributed! Optimize web site costs and bring more paying customers!
See also: web site analytics, web site stats, log analyzer, log analysis, web statistics, site, apache, tracking, server, activity, visitors, server logs
Internet Access Monitor for WinProxy is a software for monitoring the efficiency of the Internet bandwidth usage by your company employees. With Internet Access Monitor you can easily find out which employees load up the bandwidth most heavily, when and what exactly they download, how much time they spend online, and what data transfer volume they generate by their online activity.
See also: wingate, winroute, ms isa server, ms proxy, proxy+, squid, eserv, mdaemon, merak mail server, kerio mailserver, sendmail, qmail, postfix, ms exchange server, log analyzer, log files analysis, proxy server, ProxyInspector, MailDetective, Proxy Inspector, Mail Detective
PC TIME LIMIT PRO lets you specify when exactly and how long the computer can be used and define users which will be allowed to use the computer without any limits. You can schedule time intervals and the number of hours each child can use the computer per day a week. It automatically logs your child out of their computer when it's time for lights out. Also you can prevent the PC usage until the specified date and after the specified date.
See also: time, control, limit, restrict, restrictions, specify, allow, shedule, log, password, guard, security, time table
Syslog Manager is a syslog server. It can receive, log, display and forward Syslog messages from all syslog enabled device such as router, firewall or switch. It can receive TCP and UDP syslog messages and send out alert message by Email, SMS, SMS-HTTP, Syslog, SNMP and Pager. SysLog Manager Lite / Pro is based on internet standard protocol, which is specified by RFC 3164.
See also: syslog, syslog server, collect, receive, log, display, forward, server, monitor, alert, email
Easy inventory and shopping list manager, can run on cash register. Inventory Log encourages you to organize you inventory into smaller departments. This makes shopping a breeze. Easy Data Entry, if an employee notices that they are running out of an item, they can simply add it to the shopping list. They can easily print or email you the shopping list.
See also: Inventory, POS, Inventory Manager, Inventory Control, Inventory Tracker, Inventory Log, Inventory Management, POS, Retail, Small Business, Store, Coffee
Phonespy records incoming and outgoing telephone calls through sound card,an adapter is used to connect each line to sound card.it detects Caller ID and DTMF keys using the same sound card.it can do Max. of 32 lines recording with multiple sound card and multiple channel supporting.the software also supports perfect hidding mode.
See also: telephone recording, telephone recorder, telephone record, phone record, phone recording, phone recorder, telephone, record, recorder, DTMF, FSK, Caller ID, call log
To stay clear from security issues and execute regulatory compliance monitoring event logs is all significant for organizations. But, in case you are not sure about how to monitor event logs, then all that you require is Lepide Event Log Manager and perform actual time monitoring of event logs. The utility is easy to operate and can be very handy when you requires to collect and report on events logs, or W3C logs generated by Web Application Servers.
See also: monitoring event logs, monitoring event log, event log monitoring, event log manager, event log management, log management, windows event log management
Ezidoits Log keeps track of everything that happens on your computer. This includes : reports about hardware and software ; who's used your computer; and programs which have been installed. Logging these details gives you better control of your PC, provides info for your technician (if needed) and maintains a record of internet use. Logged information can be searched and displayed in simple and easy to understand terms.
See also: log, monitor, hardware, software, search, report, URL, browser, startup, shutdown, logon, logoff, application, update
Windows and nearly all other software that is installed on it produce temporary data. Unfortunately there are not many programs that really take care about consequences of saving temporary files to different places, with different extensions or without always deleting when possible or necessary. 1-abc.net Hard Drive Washer does what all these programs forget. It searches for these unnecessary files and offers you to delete them.
See also: trail, temporary, files, privacy, security, cleaner, cleaning, washer, washing, deleting, user, data, history, installed, slow, speed, log, logfiles, bak, syd, $$$, tmp.folder, exception, exceptions, delete, unnecessary, hard, drive, disk, space, empty, path, paths, temp, nav, old, gid
Internet Log Cleaner completely and permanently remove all traces of internet activity. With Home Internet Explorer Cleaner you get absolute privacy and just a few clicks is enough.
See also: clear history, internet eraser, internet cleaner, clear browser, clear cache, web eraser, privacy eraser, history eraser, clean pc, clear internet history, cleaner, eraser, sweeper, log eraser, internet log, internet history