The event log monitor sends you the new entries by mail if they are written in the log. With help of TCP/IP connection monitor, you can check if a specified computer is available in or outside your network (i.e. your webserver).
All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Information from the log file after it has been correspondingly decoded and operated is entered in the data base (DB). Logging other people's keystrokes or breaking into other people's computer without their permission can be considered as an illegal activity by the courts of many countries.
68. ProxyInspector for WinRoute - 100 users license
It will provide you with visual easy-to-understand reports on users activity, visited sites, incoming & outcoming mail etc. Key features of the program include: support for WinRoute versions 3.x and 4.x, Pro edition; ability to store the data retrieved from log-files in own database, which enables administrator to create reports for long periods of time; interface with Interbase server database to provide outstanding reliability; works on any computer in your LAN; easy wizard-style setup; embedded HTML viewer; ability to create individual reports on each user, group, client IP address, host etc; traffic analysis, including distribution between users, groups, client IP addresses and hosts; ability to create reports for any custom period of time and reuse the once created reports; various interface languages (currently English and Russian). DetailsDownload trialBuy now ($249.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows 98, Windows ME
Language: English, German, Russian
Vendor: ADVSoft
Log: After you apply the rule, you will see the result in the result list, by clicking the Save log button, a log file will be automatically generated, it record the detail datetime and the result list. (*Must have Flash player installed in your computer, it's free for download.).
73. WinPersonalizer
Thank you for your interest in WinPersonalizer. Edit your Log-On message. It won't slow your computer down while you work or play! It will not have to load every time your computer starts, which frees up valuable system resources. DetailsDownload trialBuy now ($19.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Language: English, German, Portuguese, Spanish, Italian, French
Vendor: Holersoft
Logging other people's keystrokes or breaking into other people's computer without their permission can be considered as an illegal activity by the courts of many countries. Our software is intended for authorized system administrators and/or owners of the computer ONLY.
75. Advanced Privacy Protector
For example every click you make on Windows 98 (and all windows after 98/ME/2000/XP and Windows NT with IE4) Start Menu is logged and stored permanently in Windows Registry. Advanced Privacy Protector is a very useful program for cleaning up the history of your activities on a computer. DetailsDownload trial (Full version: 795.6 KB) Buy now ($21.00) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: Systweak
All monitored data can be logged into the log file thus making the post-analyzing real. After running the software (with Serial Monitor attached to it) for a period of time and recording the log, the log can later be used to test the correctness of the protocol implementation.
Logging other people's keystrokes or breaking into other people's computer without their permission can be considered as an illegal activity by the courts of many countries. Our software is intended for authorized system administrators and/or owners of the computer ONLY.
Anti-Porn keeps a complete log of all web sites visited, filtered out or not, and keeps the track of all material emerged on computer, including files, images, music, and so on. You can have the inventory of your kid's computer history.