.: Event Log
Adding events to the Application Event Log is as simple as ABC with ABCEventLog. The only component to support multiple event types, event sources and both local and remote event logging. That's right - log events on your database server from your web server!
vb, asp, event, log, event log,
Whois Tool is a client utility that communicates with WHOIS servers located around the world to obtain domain registration information. Whois supports IP address queries and automatically selects the appropriate whois server for IP addresses. This tool will lookup information on a domain, IP address, or a domain registration information .
whois, network tool, network software, net tools, network monitoring, port scan, network utils, network security, port scanner, intrusion detection,
Ip2CountryResolver allows you to identify the country by given IP Address. If you are doing business on the Internet and you want to know where your users are from, you've found the right place! Ip2CountryResolver will help you to find and identify visitor's geographical location country and country code by its IP address. The tool is designed with a user-friendly interface and is easy to use.
find country by ip address, network tool, network software, net tools, network monitoring, network utils, network security, port scanner, intrusion detection, event log,
EventMeister is a powerful solution to centrally monitor and analyze Windows Event Logs. It will alert you to security issues and other critical events throughout your network, facilitate central archiving of log data and assist with analysis and meeting audit requirements. As EventMeister is a centralized monitoring solution there is no need to install agents on monitored PC's and servers.
event log monitoring, monitoring, event log, windows event log, log reder, log viewer, event notification,
BHO Scanner gives you a quick look at the BHOs installed on Remote PC.It is known that the browser helper objects are loaded each time the browser is started up. Some BHOs are helpful, like the Adobe Acrobat or Google, but there could be malicious ones among them that will harm your computer, especially those planted by viruses or spyware. BhoScanner allows you to discover browser helper objects of your computer including parasites and trojans.
network tool, network software, net tools, network monitoring, hacking, port scan, network utils, network security, port scanner, intrusion detection,
Tail XP 188.8.131.52
Ever wanted to follow a log file, capture debug messages or monitor syslog? Then this product is for you! Featuring multiple types of monitors: file monitor, event log, syslog, OutputDebugString, word wrap of lines and coloring of lines based on regular expression rules. Best of all: it docks to the top or bottom of your desktop like ICQ and other windows resize accordingly.
tail, linux tail, log file, log viewer, outputdebugstring, event log, log, logs, track, changes,
IeCacheExplorer displays the details of all cookies that Internet Explorer stores on your computer and reads all information from the history file on your computer, displays the list of all URLs that you have visited. It also allows you to clear history, delete cookies and temporary internet files. The tool is designed with a user-friendly interface and is easy to use.
network tool, explorer, network software, net tools, network monitoring, port scan, network utils, network security, port scanner, intrusion detection,
DnsEye is monitoring network traffic by capturing Domain Name System DNS packets in network and displays the host names resolve information. The program allows to monitor requested URLs in network, to open it in browser and save captured DNS name list in the file. The tool is designed with a user-friendly interface and is easy to use.
dns, network tool, network software, net tools, network monitoring, port scan, network utils, network security, port scanner, intrusion detection,
xStarter Web Pilot 1.84
xStarter is an advanced automation tool that allows system administrators to automate their repetitive tasks. The program uses its built-in scheduler to automate backups, file archiving, FTP synchronizing, starting specific applications, controlling their output and more. The Web pilot edition includes a built-in web browser interface that allows you to deploy tasks to remote computers and control their execution.
automation, scheduler, system utility, launcher, automate, dial up, dir event, macro, copy, coping,
AdventNet EventLog Analyzer Free Edition 4.0
ManageEngine EventLog Analyzer is a web-based, agent-less syslog and event log management solution that collects, archives, and reports on event logs from distributed Windows host and, syslogs from UNIX hosts, Routers and Switches. It helps organizations meet host-based security event management (SEM) objectives and adhere to demands of regulatory compliance requirements likes HIPAA, SOX, and GLBA .
syslog, event logs, syslog monitor, hipaa compliance, sarbanes oxley compliance, glba compliance, event log monitoring, syslog monitoring, event log manager, event log,
NetSendFaker allows you to send anonymous net send messages to anyone that is connected to the network. You can also emulate messages as if they were sent from other computer. The tool is designed with a user-friendly interface and is easy to use.
network tool, net send, network software, net tools, network monitoring, hacking, port scan, network utils, network security, port scanner,
ShareAlarmPro is a network tool that allows network administrators and users easily perform a network shares monitoring. Using ShareAlarmPro you can monitor users attempting to access secured shares and confidential files, detect and log network access to shared folders, monitor security events, monitor accessed files, disconnect users from open files or deny network users access, monitor sharing permission changes.
shared folders, network monitoring, access detect, monitor, folder monitoring, network security, intrusion detection, event log, access monitoring, security events,
This is a HTTP traffic generator for testing web applications. You can specify the requests count and interval between two requests. The generated requests are sent to the specified URL. It is a very simple and fast program which can simulate client activity.
network tool, network software, net tools, hacking, port scan, network utils, network security, port scanner, intrusion detection, event log,
Remote task manager 2.4
With this program you can kill remote process, shutdown remote computer, change remote computers domain, view system information of remote computer, send message ,view event log of remote computer, start or stop services on remote computer
remote task manager, process, shutdown, services, event log,
Event Log Watchdog 3.0
Event Log Watchdog monitor's your Windows Event Logs and notifies you via Email or Syslog when a new event is logged. You can define which Event Logs you wish to monitor and what types of events you wish to receive Email notification of.
event log, windows nt, windows 2000, windows xp, utilities, smtp, monitor,
Browse Pages:  2