GridinSoft Backup is a powerful tool that protects your data from irreparable loss or damage. Flexible file selection and file masks handling; Activity log in for each backup script; You may backup your files at any convenient time.
DetailsDownload trialBuy now ($24.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Language: English, German, Spanish, Italian, French, Russian
Vendor: GridinSoft
The system supports files of any operating system-supported sizes and provides immediate seeking in months-long logfiles. The logfiles can be compressed on the fly (using built-in NTFS compression). The logfiles are optimized for fast writing and seeking, still providing the data lose protection in case of system failures.
Setting and modifying your password for MessengerLog to protect your log. Up to ten color themes in MessengerLog! Log on invisibly to the MSN Messenger.*. (* Requires Pro version of MessengerLog4.). Editing or deleting the messages history directly in MessengerLog.
Is recorded to encypted logfile. Can: * Log every action performed by anyone trying to access your computer * Protect every unauthorized access to 2Lock! Disable Windows hot keys (such as Alt-Ctrl-Del, Alt-Tab, Ctrl-Esc, etc.) * Allow you to define as much users that can have access to your computer as you like * Be activated by user defined hot key combination or directly from the system tray Whether you're worried about coworkers or your kids messing up your work files, 2Lock!
84. ProxyInspector for WinProxy - Unlimited users license
It will provide you with visual easy-to-understand reports on users activity, visited sites etc. Key features of the program include: support for WinProxy versions 3.x and 4.x; ability to store the data retrieved from log-files in own database, which enables administrator to create reports for long periods of time; optional interface with Interbase server database to provide outstanding reliability; log and audit files management (automatically archives or deletes outdated files); works on any computer in your LAN; embedded HTML viewer; ability to create individual reports on each workstation, client IP address, host etc; traffic analysis; ability to create reports for any custom period of time and reuse the once created reports; various interface languages (currently English and Russian). DetailsDownload trialBuy now ($299.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows 98, Windows ME
Language: German, Russian
Vendor: ADVSoft
Import your Sensus or Sensus Pro Manager logbook files easy and fast into new or existing SharkPoint for Windows logbook files. This DLL-file should be copied in the SharkPoint for Windows directory where the file SharkPoint.exe is located.
FileList: Add any file in any path in your computer to the FileList, use filter to select the exact files you want, and you can also pick up the files by hand. Log: After you apply the rule, you will see the result in the result list, by clicking the Save log button, a logfile will be automatically generated, it record the detail datetime and the result list.
87. BetterVIEW Operator Security System Toolkit for LV (Win)
An integrated Operator Logging function tracks and time-stamps operator events such as log-in/log-out, and can include any arbitrarily defined text messages generated by the host application. Log generation can be enabled and disabled at run-time, and a useful automatic filename generator function is included. DetailsDownload trial (Demo: 1.1 MB Full version: 1.1 MB) Buy now ($89.00) Find similar
Platform: Windows 3.1x, Windows 95, Unix / Linux, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, LabVIEW 5.0 or higher required
Vendor: BetterVIEW Consulting
VImpX is an ActiveX component that provides functionality for data loading from various data sources like flat files or ODBC into virtually any database. Rejected records file. Text files. Comprehensive Error log.
They allow any user to select the most convenient and informative mode of logfile analyzing. All data collected by the monitoring are saved to the encrypted logfile located on the user's machine. Information from the logfile after it has been correspondingly decoded and operated is entered in the database (DB).