Software Listing: Audit Log

  • atACC
  • License: Shareware
  • Price: 199.00
  • Rating

atACC, a complete accounting and inventory package, created keeping an ordinary entrepreneur in mind who has no idea of the basic accounting concepts. atACC is designed as a highly user friendly software that enables every one to handle accounts even without any accounting background. The foreign currency transaction facility has made atACC a highly recommended accounting package in overseas markets. FEATURES: Accounting Features: · In-built account structure · Extensive search option · Multiple budget handling · Advanced accounting reports · Multiple company creation · Day / Cash / Bank Book · Cheque Handling Facility · Bank reconciliation · Bounced and post dated cheque maintenance · Creditor / debtor ageing report · Bill wise ageing report · Audit log · Automatic Display of Balance Amount · Multi...

  • Platform: WinOther

FastAccess learns about your face as you use your computer. Unlike other biometrics, there is no manual enrollment required. Simply log in normally and FastAccess updates its facial database automatically. This ongoing learning process allows a unique combination of frequent yet highly reliable recognition combined with the flexibility to improve recognition performance over time and to keep up with appearance and environmental changes. Use your face to not only log into Windows but to websites as well. FastAccess remembers usernames and passwords to websites and will enter them for you - but only when your face is visible! Most security solutions stop after login.

  • Platform: WinOther
  • Crypt-o
  • License: Shareware
  • Price: 39.95
  • Rating

Crypt-o is a Client/Server password manager with many advanced features like strong data encryption, customizable databases, multi-user access, flexible permissions system, form filling, portable mode and Web interface. Crypt-o is a secure Client/Server solution for creating custom databases, which is designed for use in enterprise networks. The data is reliably stored in Firebird SQL Server database and is encrypted using AES encryption algorithm with 256-bit key. Crypt-o client applications access the Crypt-o Server using secure SSL connection. If needed, Crypt-o Server can be connected from any location over the Internet, Dial-up or WAN link.

  • Publisher: Soft-o
  • Date: 07-10-2013
  • Size: 6560 KB
  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, Windows Vista, WinOther, WinVista, WinVista x64

Varicent Model Analyzer is a peerless developer tool which eases analysis on Varicent ICM models efficiently. The tool features various hand-on supports to developers working on Varicent 6 and above, the leading Incentive Compensation Management solution.

Features:

Browse and preview detailed report on Varicent objects like Calculations, Reports, Tables, and Calendars etc at single click
Export Objects
Compare objects or models
Advanced Calculations Finder
Trace Audit Log.

  • Platform: WinOther

Status Fairy is free Windows Live Messenger plug-in that updates your Messenger Status line to Facebook and Twitter. Compatible with Windows 2000,XP, and Windows 7..

  • Platform: Win2000, WinOther

IT teams usually have many shared user IDs and passwords for managing servers and applications. With hundreds of systems and applications, the routine management of privileged accounts can become a real challenge, with significant productivity tradeoffs. Privileged Account Manager introduces a new approach for secure management of privileged passwords, to reduce risks and ensure regulatory compliance. The product creates a secure storage facility (password vault) for all privileged passwords, accessible from a web browser. When someone from your IT team needs a password for one of the accounts, the system checks it out from the storage, logging an audit log entry.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Proxy\'s new Pro 8.10 remote access software allows for remote access of computers, ensuring the safety and security of your computer. Customers can control the remote support service of their computers without having to worry about hazardous connections and assistance. With remote access, a properly authorized technician is given access to your PC to fix any glitches that come your way. The best part? You don\'t even need to be at your computer. Always-on service means that your computer can be accessed while it is unattended as well as attended, without disturbing the user. The software can also be used for the control of computers.

  • Platform: iOS 4.x, Mac PPC, Win2000, Win7 x32, Win7 x64, Windows 8, Windows Vista, WinOther, WinVista, WinVista x64

SignEasy is the simplest and most convenient way to electronically sign documents from your phone and tablet. The app allows you to sign PDF documents as well any other document format without the need of printing, faxing, scanning, pen and paper and documents.

With SignEasy, you will be able to sign & send documents using email or your preferred cloud storage services with ease and convenience in few steps.


1. IMPORT

Import a document from Email, Google Drive, Dropbox, Box, Evernote or other apps supporting “Export” or "Send To" functionality.

2. SIGN

Sign using just your finger or a stylus, add initials, date, fill text and images in the document

3.

  • Publisher: Glykka LLC
  • Date: 03-09-2014
  • Size: 8908 KB
  • Platform: Android 4.x

ApexSQL Log, SQL Server Transaction Log reader, lets you view transaction log data, audit SQL database changes and undo SQL database changes. ApexSQL Log reads SQL Server 2005 ,2008, 2012 and 2014 transaction logs. Determine who changed data and when the change occurred. Read the transaction log to find out who created, changed or dropped a database object. Reverse inadvertent or malicious database changes that occurred even before the product was installed. Replay all valid SQL transactions on a different database. Audit data, schema and permission changes. View transaction log data in human-readable format.

  • Platform: Win7 x32, Win7 x64, WinServer, WinVista, WinVista x64

ProxyInspector for WinGate is a cost-effective solution for analysis of your corporate Internet connection usage. It works with popular WinGate proxy server to retrieve from its log-files comprehensive information about you employees' behavior on the Internet. It will provide you with visual easy-to-understand reports on users activity, visited sites, attempts to access blocked resources etc. Key features of the program include: support for WinGate versions 2.x - 5.x, Standard and Pro editions; ability to store the data retrieved from log-files in own database, which enables administrator to create reports for long periods of time; interface with Interbase server database to provide outstanding reliability; log and audit files management (automatically archives or deletes outdated files); ability to extract additional information from...

  • Publisher: ADVSoft
  • Date: 21-02-2005
  • Size: 4443 KB
  • Platform: Win2000, Windows Server, WinOther

Log Server and Analysis Platform http://www.log-viewer.com Log Viewer, Search Engine, Log Monitoring -On Any Log in Any Format, Anywhere. Automatic Problems Detection - Scan Logs Content, Auto Understand Problems. Report Engine, Complex Rules Analysis - Statistics, Aggregation and complex Rules. Log Collection, Log Server and Archive - Agent Less, Syslog, FTP, files system and more Transaction Analysis with Log Correlation - Track End user monitor logs, isolate problems Web Server Log Monitoring and Statistics - Analyze Apache, IIS, ISA, J2EE,.Net access logs XpoLog helps Customers Application teams to fix problems faster - Quickly navigate and search applications logs Operation teams to monitor and track end user problems - Auto collects and analyzes end user logs and systems errors.

  • Publisher: XpoLog
  • Date: 22-10-2008
  • Size: 1000 KB
  • Platform: AS/400, Java, Linux, Linux Console, Linux Gnome, Linux GPL, Linux Open Source, OS/2, Unix, Win2000, Windows Server, Windows Vista, WinOther

Log Server and Analysis Platform Quickly Isolate Applications and IT problems. Reduce operations cost, Prevent Business Loss, Correlate, Search and Report Any Type of Log. IT Systems and Applications generate huge volumes of Log Data. Logs and IT Data contain critical information on problems and errors. XpoLog is a log management that's collects, analyzes, report and search any type of log and IT data. XpoLog helps thousands of users to isolate and monitor problems. Download and Setup takes few minutes, XpoLog is non-intrusive. XpoLog primary features are Log Viewer, Search Engine, Log Monitoring -On Any Log in Any Format, Anywhere.

  • Publisher: XpoLog
  • Date: 22-10-2008
  • Size: 65429 KB
  • Platform: AS/400, Java, Linux, Linux Console, Linux Gnome, Linux GPL, Linux Open Source, OS/2, Unix, Win2000, Windows Server, Windows Vista, WinOther

Event logs are generated in systems running on Windows OS version NT, 2000 and XP. The logs generated are about application events, security events and system events. Detailed information about these event logs can be obtained by the event log viewer, an application provided by Windows. Windows event log viewer contains detailed information such as event type, their source, the date and time of their occurrence along with the cause. With the help of Windows events log monitor tool, users can keep a tab on all the Windows based and W3C based events to know about errors and problematic situations.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Lepide event log manager is a comprehensive event log management solution for event log archiving, consolidation, browsing, monitoring and reporting. It helps to collect all Windows and W3C events from computers available on the network and makes it possible to effectively monitor and audit them to sustain compliance and keep a check on network security and system health. Lepide event log manager monitors all event logs for computers available within the network and generates alerts on critical events, so that required can be taken on time. Event log management software provides a centralized platform to archive and browse event logs for required computer.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Lepide Event Log Manager is a comprehensive Windows event log monitor tool that helps enterprises in efficient log management. With the help of this application, organizations can carry out comprehensive log analysis by continuously monitoring both the system and web based events. Windows event log monitoring software is developed for viewing Windows and W3C events within a network and gathering information relevant to network security. With event log manager, it is possible to create a large database of generated event logs thus eliminating the problem of storing bulk of log messages. Moreover, it helps in defining a framework for logged events where data about event types, event status and system specifications can be obtained.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Audit Impression.

  • Publisher: CZ Solution
  • Date: 18-11-2012
  • Size: 51763 KB
  • Platform: WinOther

SmIKE is Small Internet Kick-about Explorer (compatible with MS Explorer) making log of all HTTP and file I/O operations (including HTTPS transactions) for W2K, XP and Vista. Small size (about 400 KByte), no installation required - simply download, unzip and run EXE file. Detailed log information is saved in SMIKE.LOG file. Tool menu options present reports of web page properties and behavior results. It is possible to automate web navigating process by running URL Batch File (Tool menu->Run URL Batch File). Batch file may be created in any text editor and saved with any extension. URL Batch file syntax is presented in readme file.

  • Platform: WinOther

Event log management is a comprehensive process that entails gathering event logs from specific system on a network, analyzing all collected Windows and W3 Event logs, archiving Event logs in a centralized network location. For efficient administration of events on a Windows network, you should use Centralized Event Log Management software. Lepide Event Log manager is a versatile tool for security compliance, data audit and event monitoring on a Windows network. It is capable of monitoring large number of computers of a Windows Network. Event Log management tool also sends alerts for critical network wide events to Administrators.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

EventMeister is a powerful solution to centrally monitor and analyze Windows Event Logs. It will alert you to security issues and other critical events throughout your network, facilitate central archiving of log data and assist with analysis and meeting audit requirements. As EventMeister is a centralized monitoring solution there is no need to install agents on monitored PC\'s and servers! EventMeister gathers information from Windows Event Logs throughout your network either in real-time, or according to a specified schedule. Incoming data is scanned to look for entry patterns of interest.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Terminal Services Log is a server monitoring application that allows you to easily monitor user activities on your Terminal server. It reveals which applications your users are running on server and when are your users logged on the terminal server.Benefits of TSL:Improving users activity timeMinimizing users idle timeHighlighting potential non productive applicationsRecording an accurate source of activity timeReducing corporate risk through complianceTerminal Services Log is first and only application that logs sessions for every user connected to Microsoft Windows Terminal Services or Citrix Presentation Server - XenApp (also supporting Quest VAS, Ericom Powerterm and other application delivery solutions).

  • Publisher: TSL Inc.
  • Date:
  • Size: 9011 KB
  • Platform: Win2000, Windows Server

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Clear All History

Regardless of what you do online and who you share your computer with, its always has been and always will be a good idea to clear your traces and virtual footprints left behind on your system. Not only is this good practice to help protect your ...


WinLock

WinLock is a program that helps users lock down and limit access to certain functions of a Windows PC. Applications such as WinLock are crucial in environments where public access is allowed to PC’s, such as libraries or internet cafes, as ...


File Finder

File Finder is such a simple and easy program to use to track down and locate files and folders on your system. I think this has to be a fantastic selling point, but maybe also its downfall. It instantly took me back to the retro MS-DOS based ...


Arkout 3D Deluxe

Arkout 3d deluxe (or as we'll say from here on, simply arkout 3d) is a three dimensional re imagining of the classic concept of arcanoid, also known as brick or breakout. In the original arcanoid game, the aim is the move your baton across the ...


WinXP Manager

WinXP Manager is the tool letting you easily change and personalize your Windows XP based system. Its the edition of the tool released by Yamicsoft for Windows XP only, and is similar to Vista Manager and Windows 7 Manager, designed for later ...


Secure Virtual Desktop

Secure Virtual Desktop is a piece of software that allows you to enter a temporary ‘Secure’ desktop state, where everything is filtered and anonymous - sounds interesting, doesn’t it? Secure Virtual Desktop is definitely something ...


Simple Sticky Notes

Simple sticky notes is a freeware note taking utility to appeal to users in the same way in which a physical sticky note would; by allowing you to write something down very quickly with very little effort (without having to open a program or pull ...


Screencatch

There are numerous occasions when you need to take screenshot of anything on your computer. A screenshot is used for serving many purposes like tutoring, in eBooks, as electronic proofs etc.Taking screenshots is a relatively tedious task without ...


CloneCD

Despite huge growth in technology and tremendous increase in use of flash drives, use of CDs and DVDs hasn’t disappeared yet. Conventional 700MB CDs are still in use, largely due to the fact that they are extremely cheap. In addition of being ...



New Downloads

Pigeonhole U3 Organizer

Ever wished you could just
type stuff and find it again
without having to save it and
then remember what you called
the ...

C-Organizer Pro

C-Organizer Professional is
your one-stop organizer
software including all the
features you need in order to
keep track ...

Bytescout BarCode Reader
SDK

Can read barcode from image,
read barcode from PDF, read
barcode from TIF in your
Windows desktop and web
applications. ...

HueScope Separator

Create art by detecting color
within photos. Mimics
watercolor art with color
separations that target
specific watercolor ...

Halloween Night 3D
Screensaver

Halloween is here and it\'s
spooky! Would you like to take
a walk all alone deep in the
woods and stumble upon an odd
...

Tipard DVD Ripper Platinum

Tipard DVD Ripper Platinum can
help you rip DVD to MP4, MKV,
AVI, WMV, MOV, M4V, TS and
others. Besides, it enables
you ...

WinMX Music

WinMX Music joins the family
of powerful file sharing
applications with an overall
enjoyable and intuitive
layout. To ...

Metadefender Cloud Client

Metadefender Cloud Client is a
free malware analysis tool
that investigates the sanity
of your system. It uses 40+
...

Linklibs for Windows

World First Desktop app for
Link Management and Tracking
with UTM Link Builder &
URL Shortener. You can also
share ...



Related Searches

Access Vba Audit Log
Application Review Audit Log
Audit Log All Print Jobs
Audit Log Network Printer
Audit Log Automated
Audit Log Excel Template
Audit Log File Server
Audit Log Filter Tool
Audit Log Internet Usage
Audit Log Job Sql Server
Audit Log Mysql
Audit Log Parser