Software Listing: Computer Log

A Java based expert system which aims for forensic investigation of several computer logs to find and map the security incident occured on a system. It uses log correlation methodologies to find and report the impact point and map intruders actions.
Cloforn - Computer Log Forensic System License - GNU General Public License version 3.0 (GPLv3).

  • Platform: WinOther

The DRS (Digital Replay System) is a desktop application for replaying and analysing combinations of video, audio, images, transcripts and computer log files in an integrated way..

  • Platform: Mac OS X, WinOther

This program is an interface that hooks up with the command-line and has options to do things such as shut down your computer, log off, restart the computer, hybernate, has a "coin flip" feature for those difficult decisions.
Gizmo385 Client-Side User Interface License - GNU General Public License (GPL).

  • Platform: WinOther

Algorius Net Watcher - Software that allows you to monitor user access and files opened on your computer via the network. It should be noted that Algorius Net Watcher is a unique and universal protection for your computer from unauthorized access over a local wired network or WiFi. With the automatic, visual and sound notification you can always timely prevent unwanted copying files, important documents or any other important information from your computer. - Log user access and files opened on your computer via the network; - Disconnect users automatically or manual; - Perform sound and visual notification; - Generate reports; - Handy and friendly interface; - Background information collection system that is launched before OS logon; - No administrator rights required to view the information collected.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista

Download, process, and analyze Apache and IIS logs on your local computer. Log Analyzer Expert automates the process of analyzing Web logs by scheduling and downloading raw or compressed logs, processing Web logs in Apache or IIS formats, creating numerous reports in several formats, and delivering reports to webmasters. Log Analyzer Expert handles routine tasks such as downloading and analyzing Web logs. Built-in scheduler allows setting the log analyzer to download Web logs periodically, automatically downloading the logs from a Web server via HTTP and FTP protocols. Supporting raw, ZIP and GZ compressed Web logs, the log analyzer recognizes logs in Apache and IIS formats.

  • Platform: WinOther

Logout - Unattended Log Off was developed as a small, simple and easy-to-use application that will silently force close all your running programs and log off the current user.

All you have to do is launch the application and you will be automatically logged off.



.

  • Platform: WinOther
  • RebootEx
  • License: Shareware
  • Price: 24.95
  • Rating

Advanced system utility for Windows NT/2000/XP or Vista operating systems that allows to automatically shutdown, reboot and/or relogon to your computer. The program provides the following key features: ability to reboot, shut down, shutdown & power off the computer, log off the current user, shutdown a remote computer and schedule user logon after reboot. A number of additional command line options makes it a highly efficient scriptable and secure tool..

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Asset Management Obtain software and hardware configuration Filter Web URLs Block computers from browsing predefined web sites. Web visited report Filter Applications Blocking Applications Applications used report. Application and Web Site Descriptions Management File Security File Operations Log, accessed, copied, created, deleted, moved, printed, renamed and restored files Prevent computer user from copying data(Disable USB/1394 Computers Monitor Monitor more than one agent computers at the same time. Automatic Snapshots Tracing Play back the latest history snapshots Computers Control Remote control to configure or maintain computer Send messages Lock the agent computer log out, restart or show down computer with PC-Monitor Wake up computers which support Wake-On-Lan Real-time Alerts Real-time alerts when...

  • Publisher: LanAudit
  • Date: 11-11-2008
  • Size: 8611 KB
  • Platform: Win2000, Windows Server, WinOther

As computers take on more and more automated tasks, they seem to spend more and more time fully powered on. In many cases personal computers are left running all the day just to execute some tasks that the computer may do during non-working hours. Shut Down Expert is designed to resolve these problems of your computer. It supports more type of tasks: - Turn Off (to turn off the computer) - Turn On (this option will hibernate the computer and will turn it on at the specified time) - Restart (to restart the computer) - Log Off (to log the current user off) - Turn Off Monitor (to turn the display off) - Screen Saver (to turn the screen saver on) - Standby - Hibernate (to hibernate the computer) - Wake Up (to wake the computer up from Hibernation, Standby, Monitor Off and Screen Saver modes)...

  • Publisher: Zyl Soft
  • Date: 05-07-2009
  • Size: 2077 KB
  • Platform: Win2000, Windows Server, Windows Vista, WinOther

LogMeister is a powerful solution to centrally monitor and analyze virtually any log your systems and applications can generate including Event Logs, text logs, RSS and more. It can be used for many purposes, including early detection of security violations and hardware failure, detecting website downtime, application and system debugging, error management across networks, monitoring of web server log files, or even watching for items of interest in RSS feeds. LogMeister will alert you to critical events throughout your network, facilitate central archiving of log data and assist with analysis and meeting audit requirements.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

ShutItDown RBS allows you to schedule tasks like shutdown, restart or log off. Also allow you to define a password so that other users besides you (the admin) can't change or cancel the scheduled tasks.
You can specify date and time and even specify if you want them to repeat every day or every week.

FEATURES:

TE Quickly shut down, restart or log off your pc.
TE Schedule shut down, restart or log off tasks in your pc.
TE Able to run minimized and start automatically with windows.
TE You can schedule daily or weekly tasks and they will be performed automatically until you disable them.

  • Platform: Win7 x64, Windows 7, WinOther, WinVista, WinVista x64

Power Monitor Off , Restart Computer , Log Off , Shut Down , Increase/Decrease Volume , Mute/Un-Mute , Run Program/Open File , Toggle Use Proxy by defining Hot Key for each/any one of them. All the features can be accesses using Right Click on System Tray Icon. Registered users can send in request to add relative feature(s). Trial Version does not have any nagging pop-ups.Registered Users Can send request to get relative feature(s) added.Trial Version Does not have any Naggin Pop-Ups.Upgrades for Registered Users at No Extra Cost.Registered Users Can send request to get relative feature(s) added(at no extra cost).

  • Publisher: RTMenu
  • Date: 07-08-2009
  • Size: 5191 KB
  • Platform: Win2000, WinOther

Clap Commander: control your computer by using a microphone and clapping!The program allows for remotely controlling your computer from another part of the room by clapping your hands. Clap once - and Media Player will launch, clap twice - and make Media Player pause or start a movie over from the beginning, clap three times - and the computer will turn off. The program recognizes the sounds picked up by the microphone and if they resemble a person clapping, a user-defined action will be performed. Now there is no need to get up and turn off the computer by hand when watching a movie at night: clap several times and the computer will turn itself off.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Vista, WinOther, WinVista, WinVista x64

The DRS (Digital Replay System) is a desktop application for replaying and analysing combinations of video, audio, images, transcripts and computer log files in an integrated way..

  • Platform: Windows 7, Windows 8, WinOther, WinVista

nRF Logger application allows developers to view log sessions created by other applications using the API released on GitHub. It is being used by all Nordic Semiconductor Android applications including nRF Master Control Panel and nRF Toolbox to log connection events.
With nRF Logger installed developers may debug their apps when not connected to the computer. Log sessions may be also shared by customers to obtain detailed information.

6 log levels are supported:
- DEBUG
- VERBOSE
- INFO
- APPLICATION
- WARNING
- ERROR

A log session may be marked with a flag or given a description to easily find it in the future.

  • Platform: Android 4.x

Define a Key Combination as Hot KeyRegister Hot Key(s) & Launch Programs / Open File with with Hot KeyThe Program sits in System TrayRemove Hot Keys whenever not requiredA Free Windows Utility by RTMenu.com. Power Monitor Off,ShutDown,Hibernate,Auto Shutdown,IP Address Utility. Power Monitor Off Utility can be used to power monitor off easily. Schedule Auto Shutdown, Log Off, Restart, Hibernate and other computer control features. Get another Virtual Desktop and toggle between visrtual desktops using system tray icon or shortcut / hot key. My System Tray Icon Utility can be used to create various computer control desktop shortcuts easily, such as Shutdown Computer, Log Off Current User, Toggle Use proxy and much more.

  • Publisher: RTMenu.com
  • Date: 06-08-2009
  • Size: 2949 KB
  • Platform: Win2000, WinOther

The protection of the computer and stored files against undesirable access is more and more important. This comprehensive software package offers innovative and professional security and encryption modules for private and business use. The encryption modules support the certificate-based HYBRID-System (PKCS) and the password- or secret-based SYMM-System. As secret are allow to use a password, a smart card, a USB-token, a chip card or a CD or DVD. The using of the recognized encryption algorithm AES and Blowfish guarantee the security of the files. abylon SYMM CRYPT and abylon HYBRID CRYPT are a context sensitive PlugIn for the File Explorer and allow the encryption from files with the right mouse menu.

  • Platform: Win2000, WinOther

Automaticaly save logs of instant messenger conversations form MSN, ICQ, and AIM iIChat Logger 2.0 will allow you to automatically log conversations in MSN, AIM, Yahoo and ICQ instant messengers. This is useful if you want to keep track of important conversations or if you are concerned about what others might be chatting about on your computer. iIChat Logger can perform basic logging, but it also supports advanced features to ensure successful monitoring of instant messaging on your computer. Log File Locked - Most other chat logging programs store the logged information in unprotected files that can easily be deleted by other users.

  • Platform: WinOther

Target Email Extractor is a precise, fast and advanced email extractor, an ideal tool for email marketing. It can extract emails from various sources including Search Engines, WebSites, Web Directories, List of URLs and local files. Easy to use, multi-threaded, full support for proxy and has numerous options and filters to control extraction. Specify keyword of the search and the software brings you hundreds of addresses from web sites found by the search engine. This is called targeted email because the harvested emails associated with the keywords of your search and it is targeted to a particular and much more productive audience than just sending mass mailings to people who have no interest in your topic.

  • Platform: WinOther, WinVista

Auto Shutdown PC is a handy software that help you automatically shut down, power off, reboot, hibernate, suspend or log off computers at scheduled time and conditions you specified. It can shut down computer at scheduled time even when no user is logged on, the computer is in suspended power conservation mode or the CPU usage is idle or too high. It gives you different ways to schedule the shutdown event for your needs, such as once, daily, weekly, monthly, and yearly. Moreover, before the shutdown, you can specify to start some applications or MS-DOS batch commands to make some cleanup. Key features: 1.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Atomic Minesweeper

Atomic mine sweeper is a freeware mine sweeper clone style game, programmed and playable using flash player. Although the name (and genre) of the game suggests that it is simply a mine sweeper clone, the actual game itself is a very complex ...


Intergalactic War

Inter galactic war is another free ware two dimensional shooter game, falling into the ever prevalent genre of top down shooters. As the title suggests, in inter galactic war you play as a space ship fighting enemy space ships as you fight your way ...


Joomla

Nowadays, most people use Joomla, Wordpress or Drupal to make their websites. Creating websites by the use of CMSs is an easy yet effective way as one does not require to code heavily. We’ll be talking about Joomla, a powerful Content ...


Ultrasurf

There are many cases where you need to access a website which is otherwise blocked by your ISP. You need to use a proxy but a using free proxy that is never easy and convincing. Also, whenever you want to hide your identity online, you need to use ...


FireStones

Fire stones is a freeware puzzle game in which you must match three of the same coloured block in a row to destroy them, and although this may start to sound like bejeweled, the game actually takes a lot from tetris, as your blocks will fall from ...


Slash Xonix

Slash xonix is a freeware game which takes the lesser known classic title xonix, and revamps and reworks it into a title for the desktop computer. Xonix (the game on which slash xonix is obviously based) is a game in which you must split the screen ...


Speedtest4free

For a long time now, Internet Service Providers have been battling it out, attempting to bring their customers the latest and greatest internet speeds available, to beat their competitors and steal their customers. Its always a good idea to know ...


Auslogics Duplicate File Finder

If you have a lot of data and perform regular backups, or are particularly bad at keeping your system clean, tidy and organized, you may find that your computer starts to get a little clogged up with duplicate files. In my case, this is most obvious ...


My Paint

Do you own an android phone? Do you find It annoying how there is no visual note storing app (or indeed, any app for storing notes or writing important things down at all)? My paint is a handy downloadable app for the android operating system that ...



New Downloads

Database Browser

This Easy to use tool allows
user to connect to any
database and browse or modify
data ,run sql scripts, export
and print ...

PDFZilla

PDFZilla is a desktop
application that quickly and
accurately convert PDF files
into editable MS Word
Documents, Excel ...

Smart Calendar Software

Smart Calendar software helps
you to generate event
calendar. You can type your
events into calendar easily.
Events can ...

SPRuler

The screen ruler by means of
which it is possible quickly
and with ease to measure in
pixels any objects on the
screen of ...

NolaPro Free Accounting

NolaPro is a free web-based
Accounting Suite. Install on
your own PC for secure access
over the web. No user ...

Edraw MindMaster

MindMaster is a cross-platform
and multi-functional mind
mapping software. It provides
effective mind mapping
solutions ...

Security Task Manager

based on behavior analysis and
protects Windows computers
from new malware and
security-critical software.
The compact ...

Acronis True Image

Acronis True Image - the
fastest, easiest and most
complete full image backup
software available. The only
personal ...

Assault Droid

3d action game. Make your way
out of the enemy base through
the hordes of mechanical
guards.



Related Searches

Computer Log Book Format
Computer Log Report
Computer Log Log
Temperature Computer Log
Computer Log Book
Computer Log Book Program
Computer Log Sheet
User Computer Log Book
Log Computer
Clock Timer Log Computer Use
Computer System Log
Log Computer Use Time