Home > By category > Utilities >Network > Trace Log



Trace Log

  • Downloads: 
  • Views: 
  • Rating:

Trace Log is a handy utility tool that enables you to perform real-time monitoring on any server logs simultaneously. The main goal is to group all related log files into one tool so that you don't have search and dig for them. This tool enables you to attach any log files, such as Tomcat logs, WAS logs, IIS logs, etc.If this is the first time you are use Trace Log, you need to configure and attach any necessary log files. Once attached, a configuration file will be stored locally in your user profile of that computer. The next time you use this tool again, it will load the configuration automatically and you can begin monitoring the log contents immediately.

Free download from Shareware Connection - Perform real-time monitoring on any server logs simultaneously.

Publisher: Choon-Chern Lim | License: Shareware
Version: 1.5 | Platform: Win2000, WinOther
Released Date: 25-6-2009 | Rating: 0 | Title: Trace Log

Author Url: http://mesh.dl.sourceforge.net
Program Info Url: http://mesh.dl.sourceforge.net
Download Url: http://mesh.dl.sourceforge.net/sourceforge/tracelog/TraceLog-installer-1.3.0.exe

Trace Log related downloads:

Trace Dump - This command-line tool produces a summary of event trace-log data.

Reporting Services LogViewer - The Reporting Services LogViewer tool demonstrates how to read and analyze the Reporting Services trace logs and the Report Server execution log data.

FPTool - FPTool is a application to view the trace log of Flashplayer.

FlashTracer - Flash Tracer is a debugging tool for Flash platform.

LobTraceStream - LobTraceStream is an easy C++ trace/log mechanism, that allows to specify at runtime different trace levels for each of the modules of your application.

Shareware Connection periodically updates pricing and software information of 'Trace Log' from company source 'Choon-Chern Lim' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft,  Using 'Trace Log' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of Trace Log.

New Reviews

Sony Movie Studio 13 Platinum - Sony enjoys a prime position in consumer level media software development and its Movie Studio has a large fan following. However, in recent years competition from Adobe and Corel has caught up. The recent overhaul of Sony’s video editor ...

MAGIX Video easy - Editing videos was a complicated task even a few years back and it was restricted to studios and post production areas in general. However, advancements in computer technology and advent of numerous portable video capture devices have made things ...

Backup Dwarf Home Edition - Making backups of data and media content has become extremely important for computer users nowadays. Owing to hardware failure, you may end up losing gigabytes of precious data. Besides, you may not want to leave sensitive data accessible to all ...

Adobe Muse CC 2014 - There was a time when Dreamweaver used to be the most widely used web design app and competitors from Microsoft or other small players used to lag behind. While the powerhouse app still enjoys a humongous user base worldwide, emergence of new ...

Cryper - Nowadays PC users can no longer rely completely on any security software. Newer ways of data theft and exploits are emerging on the horizon, making PC security a complicated and worrisome thing. If you are particular about the data you store in ...

DriverPack Solution Professional - To keep your laptop or desktop performing well consistently, it is important to pay attention to some aspects. Using top antivirus utility, cleaning up junk feels periodically are some such examples. However, you also need to keep drivers of ...

Tiranium Premium Security 2014 - Antivirus or Internet security software has become a mandatory requirement for computer users, including casual users and network administrators. However, it is quite commonplace for average PC users to get a little confused when selecting a ...

CleanMyDrive - PC experts unanimously agree that using Macs tend to be a smoother and faster experience than running Windows based PCs but the Apple laptops and desktops also need maintenance and performance tweaking, occasionally. Regular web browsing, ...

Movavi Video Suite - Video recording has become accessible to the mass owing to advancement of technology and advent of handheld devices like tablets and phone with such features. Whether you use a camcorder or use an Android phone, shooting 1080p HD video is pretty ...

SyncBack SE - For any computer users, the importance of backup is immense. Even if you use a powerful computer with latest storage technology, taking backup of data is near mandatory. However, a number of users find the task of choosing the right backup ...




New Downloads

iBackup Extractor

iBackup extractor finds all
iPhone, iPod Touch and iPad
backups on your computer, and
allows you to browse through
them, ...

UltraFileSearch Lite
Portable

File Search Utility which is
able to quickly find Files,
Folders and Text on your
Local, Network, DVD, CD-ROM,
USB Hard ...

Leawo iPod touch 4 Transfer

Leawo iPod touch 4 Transfer is
the combination of an iPod
Transfer, iPhone Transfer and
iPad Transfer which can
transfer ...

Acronis Backup for Virtual
Host

Protect your VMs with Acronis
Backup 12 - the world\'s
fastest, easiest virtual
backup! This single solution
protects ...

Art Plus Digital Photo
Recovery

Art Plus Digital Photo
Recovery tool can help you
recover lost images from
corrupted or accidentally
formatted digital ...

Tipard iOS Data Recovery

Tipard iOS Data Recovery is
able to recover the lost and
deleted photos, contacts, text
messages, music and other data
...

Akick Data Backup

Akick data backup software
that backups your data with
minimal effort. Simply, it
creates a compress copy of
your ...

UnHackMe

UnHackMe is specially designed
to detect and remove Rootkits.
UnHackMe is the first
BootWatch Antirootkit, that
uses ...

Secure Eraser

Secure Eraser uses the most
renowned method of data
disposal and overwrites
sensitive information in such
a sure way that ...

IPMScan

Control and testing of
IPv4-networks, obtaining
various information on knots
of system. Determination of
network safety ...

Abelssoft Undeleter

You deleted your files
accidentally? Even data which
has already been removed from
the Recycle Bin finds the
Undeleter ...

VOGLA BACKUP

Install Vogla to your PC or
MAC and backs up all of your
files. Installs in minutes.
Automatically backs up your
files ...