logs downloads
GiliSoft USB Lock
10.6.17 download... while others will be blocked automatically. Reports and Logs: Look for security software that provides comprehensive reports and logs of USB activity, including file operations and access history. These logs can help you track and monitor any unauthorized ...
iBackup Extractor for Mac
3.15.0 download... Extractor to view the backup of your Call Logs, Contacts, Calendars, Photos, Internet browsing history, bookmarks, SMS, ... files from. View the backup of your Call Logs, Contacts, Calendars, Photos, Internet browsing history, bookmarks, SMS, ...
SubDirectory Cleanup
1.0.0.1 download... files older than a specified number of days, logs all actions taken, and logs amount of space cleaned up. It is a ...
Highster Mobile
3.0 download... text message is logged even if the phone's logs are deleted. GPS positions are uploaded at a ... you to do advanced settings for display options, logs, time triggers and more. You can access your ...
Syncios Data Transfer
3.5.0 download... almost all files, including contacts, text messages, call logs, photos, music, video and apps between iPhone & ... all files, including contacts, video, SMS, photos, call logs, music, Ebook and apps between phone to phone ...
DHE Drive Info
5.4.614 download... shows VBR and MFT data, S.M.A.R.T. attributes and logs, along with the sector browser. Plus, you can ... Value, Threshold, Worst, RAW, Type Capabilities Self-Tests S.M.A.R.T. Logs List of all available Logs inclusive GPL (for ...
Hidden Keylogger
2.43 download... Keylogger Pro allows you to remotely view the logs via Email and FTP. All of the computer ... etc.) are successfully found and included in the logs. See more: www.hiddenkeylogger.com Hidden Keylogger Pro is a ...
VeePN
1.5.8 downloadVeePN: A Comprehensive Review VeePN, developed by the eponymous company VeePN, is a robust and versatile Virtual Private Network (VPN) solution designed to meet the diverse needs of both casual ...
Access Denied XP
1.2 download... to prevent unauthorized use of such accounts. Color logs allow you to take knowledge about usage of computer and detect intruder in appropriate time. With logs you can see programs used by other users ...
PC On/Off Time
3.2 download... PC On/Off Time derives information from the event logs of the PC, it does not need to ... and provide complete information even if the event logs are lost or incomplete. It also allows the ...
Keyboard Monitor Software
3.0.1.5 downloadKeylogger surveillance tool automatically logs all keystrokes in such a methodical way so ... the background. * Easily search and navigate through logs for various dates. * Records all lost information
Jetico Personal Firewall
2.1.0.14 download... to the Internet. It offers detailed, configurable event logs, reports, plus the option to view and edit ... Firewall offers: * Detailed and configurable event logs * Detailed and configurable reports * Option to ...
SnakeTail
1.9.8 download... text log files. You can monitor Windows event logs; multiple window modes are supported (MDI, Tabbed, Floating). ... the entire text log file, filter Windows Event Logs using regular expressions. This tool will display ...
Windows Explorer Tracker
2.0 download... remote host via the mapped network drives. It logs the original operations in some .log files, and ... them conveniently. You can quickly load the history logs by specifying the start and end date on ...
Free ManageEngine Azure Performance Monitor Tool
1.0 download... This tool also provides the set of Event Logs records that are generated by all the deployed ... the bottom layer this tool presents the Event Logs which are generated by the current Role Instance. ...
REFOG Personal Monitor
8.1.6.2087 download... Personal Monitor. The PC monitoring tool intercepts and logs keystrokes, cut-and-paste operations, records launched applications and Web ... REFOG Personal Monitor may email or FTP all logs to you. And just to give you a ...
Syncios Data Transfer for Mac
3.4.0 download... can not only transfer contacts, text messages, call logs, photos, music, video and apps cross mobile platform, ... • Not only contacts, but also SMS, call logs, videos, music, photos and Apps transfer on Mac ...
Best Keylogger for Windows
3.3.8.31 download... know to open, and monitors all PC users. Logs are emailed to you in compressed, password-protected attachments. You can format logs, whether viewed at the PC or emailed, in ...
Tipard Android Data Recovery
1.2.10 download... files including deleted text messages, photos, contacts, all logs, message attachments, gallery, photos, videos, audios and more ... incredible tool for recovering deleted contacts, messages, call logs, message attachments, photos, videos, audios and more documents ...
PC On/Off Time
3.2 download... PC On/Off Time derives information from the event logs of the PC, it does not need to ... and provide complete information even if the event logs are lost or incomplete. It also allows the ...
dbForge Transaction Log for SQL Server
7.0 download... you can view and analyze SQL Server transaction logs and recover data from them. The tool provides ... and DELETE; * Filter the data in transaction logs by query types (INSERT, UPDATE, DELETE) or by ...
iSunshare iDevice Genius
3.1.6.1 download... tool that provides you to clean up crash logs produced by stuck or crashed applications and delete ... to your computer and then clean the crash logs, download file caches, and recordings to get a ...
Sysmon
15.15 download... is its ability to generate comprehensive and customizable logs. Users can tailor the configuration file to specify ... enhances the efficiency of monitoring efforts. Additionally, Sysmon's logs are highly detailed, providing valuable context such as ...
SymlexVPN
3.1.4 downloadSymlexVPN, developed by Symlex VPN, is a robust and user-friendly virtual private network solution designed to provide seamless and secure internet browsing experiences. Tailored for both novice users and seasoned tech ...
Alien IP
2.41 download... domain's location. It allows you to process web logs, ping remote addresses, and trace the route to their exact location. The ability to quickly trace a domain can also help ...