logging and free software
Search results for tag «logging and»:
GVH Logging and Debug Library 3.0
… one log file, system-generated error messages, exact #CPU-cycles between a function's entry and exit, printf-like logging, 64-bit integer values, current and maximum mem-usage at any time, array logging.
Requirements Pentium I…
MSSQLLMViewer 1.5.0.2
… pable to capture multi-row DML operations
Encryptable auditing triggers on demand
Not for replication auditing triggers on demand
User-definable conditional logging
Browse, export log data
and much more...
Limitations
30 days trial…
Sniper 0.57
… tes all the complexity for logging keys and exposes only a few important properties and methods, which makes it very simple to use and integrate in applications.…
Desktop Login 1.0.1
… logging using either password or fingerprint, logging using both fingerprint and password.
High security: no chance of someone forgetting or telling someone else their password.
Easy to use: there is no need to change the target application or writ…
SessionTimer Pro 4.4
… or up to three timers.
optional registration allows for an unlimited number of timers and other features.
overview window with shortcuts and sorting functions.
display of payment, based on an hourly or flat rate.
context-sensitive manual.…
59+ Log 1.4
… fine your own bands and modes
Automatic award tracking
Uses "59+ 10DB" - fast In-Memory Database
Customizable reports
Minimum hardware requirements - ideal for expeditions
30-day fully functional trial version
and much more...
59 p…
iSpyNOW 3.7
… Remotely Deployable
iSpyNOW will record and deliver all recorded data to your control panel regardless of whether the remote pc is behind a router or firewall configuration. All logs will be delivered secretly undetected by the remote user.…
Keylogger Killer 1.5
… work on new or unknown types of key logging and activity monitoring programs.
Limitations
Limited to 15 days.…
Mom Knows Best 3.0
… what a user was typing, web site logging so you can see when and where a user was web surfing, file logging so you can see when and what a user opened on the system, password overrides capabilities if you wish to access to a blocked site or file.…
RS232M Com Monitor 4.0
… ble and sturdy tool to aid in designing and logging rs232 data between peripherals and hosts.
Monitor data with the same PC that is running the application by using more hardware com ports (com driver is not changed).
Limitations
30 days…
Related: