logging and free software


Search results for tag «logging and»:

GVH Logging and Debug Library 3.0 GVH Logging and Debug Library 3.0
… one log file, system-generated error messages, exact #CPU-cycles between a function's entry and exit, printf-like logging, 64-bit integer values, current and maximum mem-usage at any time, array logging. Requirements Pentium I… 

MSSQLLMViewer 1.5.0.2 MSSQLLMViewer 1.5.0.2
… pable to capture multi-row DML operations Encryptable auditing triggers on demand Not for replication auditing triggers on demand User-definable conditional logging Browse, export log data and much more... Limitations 30 days trial… 

Sniper 0.57 Sniper 0.57
… tes all the complexity for logging keys and exposes only a few important properties and methods, which makes it very simple to use and integrate in applications.… 

Desktop Login 1.0.1 Desktop Login 1.0.1
… logging using either password or fingerprint, logging using both fingerprint and password. High security: no chance of someone forgetting or telling someone else their password. Easy to use: there is no need to change the target application or writ… 

SessionTimer Pro 4.4 SessionTimer Pro 4.4
… or up to three timers. optional registration allows for an unlimited number of timers and other features. overview window with shortcuts and sorting functions. display of payment, based on an hourly or flat rate. context-sensitive manual.… 

59+ Log 1.4 59+ Log 1.4
… fine your own bands and modes Automatic award tracking Uses "59+ 10DB" - fast In-Memory Database Customizable reports Minimum hardware requirements - ideal for expeditions 30-day fully functional trial version and much more... 59 p… 

iSpyNOW 3.7 iSpyNOW 3.7
… Remotely Deployable iSpyNOW will record and deliver all recorded data to your control panel regardless of whether the remote pc is behind a router or firewall configuration. All logs will be delivered secretly undetected by the remote user.… 

Keylogger Killer 1.5 Keylogger Killer 1.5
… work on new or unknown types of key logging and activity monitoring programs. Limitations Limited to 15 days.… 

Mom Knows Best 3.0 Mom Knows Best 3.0
… what a user was typing, web site logging so you can see when and where a user was web surfing, file logging so you can see when and what a user opened on the system, password overrides capabilities if you wish to access to a blocked site or file.… 

RS232M Com Monitor 4.0 RS232M Com Monitor 4.0
… ble and sturdy tool to aid in designing and logging rs232 data between peripherals and hosts. Monitor data with the same PC that is running the application by using more hardware com ports (com driver is not changed). Limitations 30 days… 


Related: