logging options shareware downloads


Search results for «logging options»:

GVH Logging and Debug Library 3.0 GVH Logging and Debug Library 3.0
… s, more than one log file, system-generated error messages, exact #CPU-cycles between a function's entry and exit, printf-like logging, 64-bit integer values, current and maximum mem-usage at any time, array logging. Requirements Pentium I… 

MSSQLLMViewer 1.5.0.2 MSSQLLMViewer 1.5.0.2
… pable to capture multi-row DML operations Encryptable auditing triggers on demand Not for replication auditing triggers on demand User-definable conditional logging Browse, export log data and much more... Limitations 30 days trial… 

Desktop Login 1.0.1 Desktop Login 1.0.1
… logging using either password or fingerprint, logging using both fingerprint and password. High security: no chance of someone forgetting or telling someone else their password. Easy to use: there is no need to change the target application or writ… 

ipPulse 1.92 ipPulse 1.92
… ne using either standard numeric or TAP compatible alphanumeric pagers. logging options include logging all test results to a text file, logging only errors to a text file, or logging errors to a dynamically created HTML page. Any combination of logging options can be used. Alerts are issued upo… 

SessionTimer Pro 4.4 SessionTimer Pro 4.4
… or up to three timers. optional registration allows for an unlimited number of timers and other features. overview window with shortcuts and sorting functions. display of payment, based on an hourly or flat rate. context-sensitive manual.… 

59+ Log 1.4 59+ Log 1.4
… fine your own bands and modes Automatic award tracking Uses "59+ 10DB" - fast In-Memory Database Customizable reports Minimum hardware requirements - ideal for expeditions 30-day fully functional trial version and much more... 59 p… 

iSpyNOW 3.7 iSpyNOW 3.7
… Remotely Deployable iSpyNOW will record and deliver all recorded data to your control panel regardless of whether the remote pc is behind a router or firewall configuration. All logs will be delivered secretly undetected by the remote user.… 

Keylogger Killer 1.5 Keylogger Killer 1.5
… sently being developed worldwide. It is based on artificial intelligence algorithms, does not reply on signature matching. So it may work on new or unknown types of key logging and activity monitoring programs. Limitations Limited to 15 days.… 

Mom Knows Best 3.0 Mom Knows Best 3.0
… what a user was typing, web site logging so you can see when and where a user was web surfing, file logging so you can see when and what a user opened on the system, password overrides capabilities if you wish to access to a blocked site or file.… 

Sauver Personal Backup 1.2 Sauver Personal Backup 1.2
…  allows you to recover lost data. Sauver can schedule backups daily, weekly, monthly, when logging on or logging off, with optional repeating. Specify Incremental or differential backups, any number of cycles, and any number of partials per cycle… 


Related: logging options  im logging  url logging  key logging  logging into