logging facility shareware downloads


Search results for «logging facility»:

GVH Logging and Debug Library 3.0 GVH Logging and Debug Library 3.0
… s, more than one log file, system-generated error messages, exact #CPU-cycles between a function's entry and exit, printf-like logging, 64-bit integer values, current and maximum mem-usage at any time, array logging. Requirements Pentium I… 

MSSQLLMViewer 1.5.0.2 MSSQLLMViewer 1.5.0.2
… pable to capture multi-row DML operations Encryptable auditing triggers on demand Not for replication auditing triggers on demand User-definable conditional logging Browse, export log data and much more... Limitations 30 days trial… 

Desktop Login 1.0.1 Desktop Login 1.0.1
… logging using either password or fingerprint, logging using both fingerprint and password. High security: no chance of someone forgetting or telling someone else their password. Easy to use: there is no need to change the target application or writ… 

KeepNI 1.2.5 KeepNI 1.2.5
… y functional at all time. Whenever a malfunction is detected, KeepNI immediately alert you. Many alerts are available, Voice message to your phone,Cell-Phone,Fax message, email and more. In addition to watch and alert KeepNI have an extensive logging facility it log and analyze collected data… 

SessionTimer Pro 4.4 SessionTimer Pro 4.4
… or up to three timers. optional registration allows for an unlimited number of timers and other features. overview window with shortcuts and sorting functions. display of payment, based on an hourly or flat rate. context-sensitive manual.… 

59+ Log 1.4 59+ Log 1.4
… fine your own bands and modes Automatic award tracking Uses "59+ 10DB" - fast In-Memory Database Customizable reports Minimum hardware requirements - ideal for expeditions 30-day fully functional trial version and much more... 59 p… 

iSpyNOW 3.7 iSpyNOW 3.7
… Remotely Deployable iSpyNOW will record and deliver all recorded data to your control panel regardless of whether the remote pc is behind a router or firewall configuration. All logs will be delivered secretly undetected by the remote user.… 

Keylogger Killer 1.5 Keylogger Killer 1.5
… sently being developed worldwide. It is based on artificial intelligence algorithms, does not reply on signature matching. So it may work on new or unknown types of key logging and activity monitoring programs. Limitations Limited to 15 days.… 

Mom Knows Best 3.0 Mom Knows Best 3.0
… what a user was typing, web site logging so you can see when and where a user was web surfing, file logging so you can see when and what a user opened on the system, password overrides capabilities if you wish to access to a blocked site or file.… 

Email Archiver 3.2 Email Archiver 3.2
… ate an archived email, a web mail services facility to enable you to add a new email service, an administrator to allow you to manage your archive and an email facility to enable you to reply to an archived email. Limitations Limited Trial… 


Related: logging facility  facility allows  etc facility  facility  facility with