Hoo WinTail is a real-time log monitor for Windows like the UNIX tail -f utility. It can be used to view the end of a growing file. It is ideal for viewing application traces or server logs in real time. You can view the last part of a large file without the need to load the entire file quickly. It can capture and display OutputDebugString (Windows Debug API) and TRACE (MS Visual C++ Debug Macro) output as well. Hoo WinTail is the most popular log viewer download.
See also: Hoo WinTail, WinTail, Windows tail, tail -f, file viewer, debug tool, log monitor, monitor log, log utility, log tool, log viewer, OutputDebugString
TextMeister is a generic text log reader with powerful monitoring and notification facilities. A single installation can harvest Text log data throughout your network without the need for multiple licences. Use filters to retrieve only the information in which you're interested and merge data from multiple logs for easier timeline analysis. TextMeister resides in your system tray monitoring your logs 24/7 and alerting you to items of interest. TextMeister is the second most popular log viewer download.
See also: Text Log, Log File, Log Reder, Log Viewer, Log Parsing, Log Parser
EventMeister is a powerful solution to centrally monitor and analyze Windows Event Logs. It will alert you to security issues and other critical events throughout your network, facilitate central archiving of log data and assist with analysis and meeting audit requirements. As EventMeister is a centralized monitoring solution there is no need to install agents on monitored PC's and servers. EventMeister is the third most popular log viewer download.
See also: Log Viewer, Event Log Monitoring, Monitoring, Event Log, Windows Event Log, Log Reder, Event Notification
LogQuest VF is a comprehensive security application system that searches information in any log. By analyzing security data from mixed devices, LogQuest VF helps customers worldwide to arrive at a solution. Any firm for example security organization use LogQuest VF to find risks, and analyze relevant vital security information. It provides a security organization with real time, complete and valid analyzed security informations.
See also: Log Management, Log Analytics, Log Forensic, Log, Network Management, Syslog, Log Viewer, Security Information Management, Security Event Management
Windows event log analysis is a very important task for any system administrator. Event Log Explorer is an effective tool for viewing, monitoring and analyzing events recorded in the Security, System, Application and other logs of Microsoft Windows. It extends the standard Event Viewer functionality and offers new features. Download it now - this program is FREE for personal use!
See also: event log, view, viewer, viewing, analyze, analysis, alalyzer, monitor, monitoring, log, event, events, application, security, system
ViewonLog is a real-time logging software for C++ and .NET developers. It can be used to trace logs while developing, debugging, testing and monitoring the software. It also supports various filtering, searching conditions and fast searching speed about stored log messages. ViewonLog also allow to change Logging Policy without the need to modify the source code or restart the application.
See also: log viewer, logging software, net log, net logging, c++ log, c++ logging, vb log, vb logging, logging tool, logging library
Manage local and remote Windows events more effectively with EventLog Inspector. The new cost-effective solution lets system administrators to extend Windows event log with more features. EventLog Inspector provides the ability to broadcast event log events to a syslog server or forward the events to an e-mail address. EventLog Inspector can either run silent or interact with the user by displaying pop-up notifications about selected events.
See also: windows system log, syslog, event log, windows event log, eventlog, event viewer, event log to syslog, event log to e-mail
XpoLog Center is a Log server and Analysis Platform, providing end to end log management solution. XpoLog Center primary featurs include Log Viewer, Log Monitor, Log Analysis Reports, Web Server log analysis and search. XpoLog provide web server monitoring, access log analysis and report generation. XpoLog Center provide Transaction tracking and transaction monitoring. Monitor Applications and servers for problems before end users notice them.
See also: Log Viewer, Log Monitor, Log Server, Log Analysis, Logs, Logging, Log management, syslog, IIS logs, Apache, log4j, java, Reports, Monitoring, Server, System, Application, Transactions, Correleations, Complex Events, problem isolation, troubleshooting
Event log manager software is developed to help users manage the system generated logs and W3C logs. Such software helps in event log reporting by indicating towards the source and cause of events. Windows event logs created in a system helps in tracking network errors and system problems to take adequate measures. Using Windows log management utility users are able to acquire full knowledge about the event types and their causes.
See also: event log viewer, windows event logs, windows event log viewer, windows event log monitor, event log software, windows event logs, log management, windows log management, event log manager, event log reporting
EventMeister is a powerful solution to centrally monitor and analyze Windows Event Logs. It will alert you to security issues and other critical events throughout your network, facilitate central archiving of log data and assist with analysis and meeting audit requirements. As EventMeister is a centralized monitoring solution there is no need to install agents on monitored PC's and servers.
See also: Event Log Monitoring, Monitoring, Event Log, Windows Event Log, Log Reder, Log Viewer, Event Notification
LogQuest VF is a Log analysis utility for all types of logs that searches information in any log. By analyzing security data from mixed devices, LogQuest VF helps customers worldwide to arrive at a solution. Any firm for example security organization use LogQuest VF to find risks, and analyze relevant vital security information. It provides a security organization with actual time, complete and valid analyzed security informations.
See also: Log Management, Log Analytics, Log Forensic, Log, Network Management, Syslog, Log Viewer, Security Information Management, Security Event Management
Event log analysis of Windows event logs is a highly significant task for any system administrator. Event Log Explorer is an effective utility to view, explore, backup and monitor events in Security, System, Application and other Windows logs. The software extends the standard Windows Event Log Viewer functionality and brings a lot of new features. Download it now - this software is FREE for personal use!
See also: windows event log, viewer, viewing, backup, print, export, analyzer, view, monitor, monitoring, log, event, events, application, security, system
Hex Editor Software - Binary and Hex file editing tool for Windows with Multi-Window, Multi-Document Interface, Text Viewer, Advanced Search and Replace features. Edit your Exe Code, Hex Dump, Avi, Mpeg, Jpeg and other files with HHD HexEditor.
See also: HexEditor, HexEdit, Hex, Editor, Software, Download, Exe, Bin, File, Editing, Code, Edit, Windows, Text, Viewer, Reader, Hex Dump, Dumps
LogRover is an advanced web log file analyzer that analiyzes log files generated by IIS, Apache and other web servers. LogRover generates reports of page hits, sessions, visits, visitors, search engine referals, and session times. LogRover is database driven so it can generate interactive, on-demand reports as well as scheduled reports. LogRover supports clustered servers and features advanced reporting of search click-thru statistics.
See also: web log, web statistics, log analyzer, web log analyzer, iis statistics, log file analysis, webtrends, apache
TupInsight uses one computer on a local area network (LAN) not only to monitor and record other hosts' web behaviors, but also to restrict online activities according to customized filtering Internet policies. TupInsight is based on the client/server architecture to support distributed management of data. Its hierarchical design and straightforward interface make the task of employee Internet management (EIM) very nearly painless.
See also: Email capture, online restriction/blocking, webpage snapshot, FTP record, chat/game log, empolyee Inernet management, Internet activity monitoring, web access control
EZ-Pix is fast, highly functional viewer with support for all common image formats. It has an streamlined interface and is simple to use. Despite its simplicity it offers many advanced functions, such as complete thumbnail control, exporting to HTML and thumbsheets, file and image editing functions. Other features include: Ability to assign text descriptions to images, Twain Scanner and digital camera support, Password access and security
See also: bmp, camera software, file viewer, gif, gif file, gif viewer, graphic, graphic program, graphic software, graphic viewer, image, image software, image viewer, image viewers, jpeg, jpeg viewer, jpg, jpg viewer, picture software, picture viewer, png, thumbnail, viewer
Car expense tracking and fleet management.
Extensive possibilities for scheduling events and maintenance actions, Complete overview on all your expenses, Graphical reports as pie/line or bar charts, Free built in Trip Log, Record keeping of all repairs and fuel ups, Automatic fuel consumption calculation, Integrated calendar for quick overview on all appointments and due maintenance objects, Automatic maintenance reminder and more...
See also: automotive, auto, fuel, consumption, vehicle, maintenance, fleet, management, car, expense, tracking, trip log
User Time Administrator lets you specify when exactly and how long the computer can be used and define users which will be allowed to use the computer without any limits. You can schedule time intervals and the number of hours each child can use the computer per day a week. It automatically logs your child out of their computer when it's time for lights out. Also you can prevent the PC usage until the specified date and after the specified date.
See also: security, guard, password, log, shedule, allow, specify, restrictions, restrict, limit, control, time, time table
Internet Access Monitor for Eserv is a software for monitoring the efficiency of the Internet bandwidth usage by your company employees. With Internet Access Monitor you can easily find out which employees load up the bandwidth most heavily, when and what exactly they download, how much time they spend online, and what data transfer volume they generate by their online activity.
See also: wingate, winroute, ms isa server, ms proxy, proxy+, squid, eserv, mdaemon, merak mail server, kerio mailserver, sendmail, qmail, postfix, ms exchange server, log analyzer, log files analysis, proxy server, ProxyInspector, MailDetective, Proxy Inspector, Mail Detective
xStarter is an advanced automation tool that allows system administrators to automate their repetitive tasks. The program uses its built-in scheduler to automate backups, file archiving, FTP synchronizing, starting specific applications, controlling their output and more. The Web pilot edition includes a built-in web browser interface that allows you to deploy tasks to remote computers and control their execution.
See also: automation, scheduler, system utility, launcher, automate, dial up, dir event, macro, copy, coping, file, dir, service, start, stop, download, ftp, http, ping, message, cd-rom, eject, close, connect, cron, zip, time, date, idle, window, event log
Track how much time you spend on different activities on your computer. Once a minute, TimeSprite records the title of the active window on your computer. You can then view a report of how much time you spent on different activities. Similar titles are automatically grouped together to provide a summary of your time. You can also define your own groups to refine the report.
See also: time, monitor, track, log, logging, timesheet, activity, application
WMS Log Analyzer visitor activity analysis application for your Microsoft Windows Media Services. Unlike other analyzers, WMS Log Analyzer has been designed especially for analyzing Windows Media Services log files and supports the entire set of Windows Media Services log file data and provides the best and most complete analysis of these files.
See also: Log Analyzer, Windows Media Services Analyzer, Windows Media Services, Windows Media Services log
ShareAlarmPro is a network tool that allows network administrators and users easily perform a network shares monitoring. Using ShareAlarmPro you can monitor users attempting to access secured shares and confidential files, detect and log network access to shared folders, monitor security events, monitor accessed files, disconnect users from open files or deny network users access, monitor sharing permission changes.
See also: shared folders, network monitoring, access detect, monitor, folder monitoring, network security, intrusion detection, event log, access monitoring, security events, network protection, network access, alert, network shares, network share, network sharing, file share
orchidmedia provides a richly featured Email Client with an integrated browser, instant messaging client, media player, and image viewer, in one package. Standard email features provide multiple email accounts, mail forwarding, spam filtering, rich text and HTML formatting, with extra controls to view web content securely. Capture and store your music, video, and documents, with contacts, events, places, and messages.
See also: browser, client, email, player, viewer, music, video, image
Asset Management ,software hardware configuration,Block web sites,Blocking Applications,File Operations Log, accessed, copied, created, deleted, moved, printed, renamed and restored files,Snapshots Tracing,Remote control,Real-time alerts change of computer,IM Chat Recording,starting and closing system and application, control operation, browsing web site, adding/removing hardware
See also: Asset Management, software hardware configuration, Block web sites, Blocking Applications, File Operations Log, napshots Tracing, Remote control, Real-time alerts
The event log manager performs accurate log monitoring and consolidation for optimum analysis which can be used to generate event log results. It is an eminent tool that performs first-class log management for Windows and web server events.
See also: event log analyzer, event log analyzer tool, windows event log analyzer, event log manager, event log management, log management, log manager, manage event log
All possible information about your website visitors
See also: web, site, visitors, log, analyzer, statistic, counter, unique visitors
ProxyInspector is a perfect solution for Internet usage analysis and reporting. It ensures effective Internet usage monitoring, so your corporate network will never be a distraction for your employees. ProxyInspector retrieves information from log files and gives a comprehensive and comprehensible diagram report on most active workstations, accessed websites, general traffic distribution among sites, protocols, days of week and times of the day.
See also: ISA Server, Internet, security, Microsoft, monitoring, traffic, log, report, proxy, firewall, site, WinGate, WinRoute, reporting
Internet Log Cleaner completely and permanently remove all traces of internet activity. With Easy Internet Log Cleaner you get absolute privacy and just a few clicks is enough.
See also: clear history, internet eraser, internet cleaner, clear browser, clear cache, web eraser, privacy eraser, history eraser, clean pc, clear internet history, cleaner, eraser, sweeper, log eraser, internet log, internet history
Data theft protection utility for USB drive preclude you from unofficial data transfer through USB mass storage media. Monitoring software alerts by playing sound when any pen / thumb drive is connected at any machine in local area network. Surveillance utility facilitate administrator to block or change different access permission of USB port and log connected USB disk information with machine domain name, IP, storage capacity, manufacture details etc.
See also: Software, steal, LAN, network, leakage, windows, analyze, theft, protect, USB, record, permission, security, device, block, log, folders, move, data, tool, traffic, display, view, protection, file, monitor, port, transfer, store, information, storage