Traffic Log
- Downloads:
- Views:
- Rating:

Traffic Log is a web statistics script. Traffic Log enables you to track hits and unique visitors, hits by page, by date, browser and captures the entry page for each visitor. The log file can be purged of old visits through use of the script. Traffic Log is not intended to duplicate the use of server logs, log analysis tools, or other tracking scripts that use SSI. Rather, it is intended where use of these methods are simply not possible, but meaningful statistics are desired. Each hit is captured through a standard HTML tag, which does not require SSI. All that is required is CGI capability. Because the scripts run on the web server, you can view the statistics on any pc that has a web browser and internet access.. Spelts Genealogy Data Repository. Spelts family genealogy database, photos and history. The name Spelts is a variant of the German name Spelz, a metonymic occupational name for a grower of spelt (a type of grain), Middle High German spUlze.
Free download from Shareware Connection - Traffic Log is a web statistics script.
Version: 1.0 | Size: 7 KB | Platform: Win2000, WinOther
Released Date: 04-06-2009 | Rating: 0 | Title: Traffic Log
Author Url: http://www.spelts.com
Program Info Url: http://www.spelts.com
Download Url: http://www.spelts.com/trafficlog/tl2.zip
Fatalyzer - Bodyfat percentage calculator.
Ticket Support System
Property Listing Script
LuaStudio
Stars Rate
Traffic Log
Matchmaking Solution
Likno Web Modal Windows Builder
STIVA Forum Script
123 Live Help Chat Server Software
Whois Online Website Block
eXpand Menu
E-shop Master Modules Edition
E-shop Master ASP Edition
Pretty Poll
E-Commerce
Flash Tools
HTML Tools
Java & JavaScript
Log Analysers
Reference & Tutorials
Scripting Tools
Site Administration
Web Database Tools
Website Promotion
Wizards & Components
XML/CSS Tools
Php Script Log Statistics
Firefox Web Traffic Log Extension
Web Traffic Stats Script
Web Traffic Bot Script
Web Traffic Exchange Script
NCSAnalysis - NCSAnalysis is a simple Web traffic log analysis tool that produces Excel-formatted reports detailing daily unique IP hits to specified site resources and/or directories.
MailDetective for MDaemon - Use MailDetective for MDaemon to analyze mail server log files and generate extensive e-mail usage reports basing on inbound and outgoing traffic flow, distribution between e-mail users and actual e-mail addresses. FREE trial version available!
ProxyInspector for WinRoute - Analyze log files of your WinRoute HTTP proxy & mail servers and produce comprehensive report on the corporate Internet connection usage. Reports include bandwidth consumed by each user, sites visited, incoming & outcoming mail etc.
ProxyInspector for WinGate - Analyze log files of your WinGate proxy server and produce comprehensive report on the corporate Internet connection usage. Reports include bandwidth consumed by each user, sites visited, hourly and weekly usage, attempts to access blocked sites etc.
ProxyInspector for ISA Server - Use this software to generate visually-rich self explanatory reports on virtually every aspect of corporate Internet usage. Reports can be viewed using built-in browser, sent via e-mail, printed out or exported to Excel. Download FREE trial now!
Shareware Connection periodically updates pricing and software information of 'Traffic Log' from company source 'David Spelts Software' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft, Using 'Traffic Log' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of Traffic Log.
Driver Fusion - To keep your laptop and desktop running smoothly and get the best performance out of it, it is important to pay attention to some aspects. It is quite important to ensure your PC device drivers are updated. Components like motherboards, GPU and ...
Spark Browser - Nearly every PC user needs to browse the web nowadays, irrespective of age and gender. Whether you use a laptop or desktop, it is mandatory to use a web browser to access web or download files. There was a time a majority of Windows users ...
Norton Identity Safe - Symantec has been one of the most popular and major players in computer security solution for years. Its cutting edge system security products usually come with data security features. However, with its Identity Safe, the company has given users ...
SiSoftware Sandra Lite - People use computers for various needs, including work, entertainment and information seeking. However, a majority of PC users do not bother much about intricate details of their PC’s hardware parts. A section of users are particular about ...
Baidu PC Faster - To keep your laptop or desktop computer running at peak speed and extract optimal performance out of it, using third party apps may be necessary. While some users still rely on Windows inbuilt PC cleanup and maintenance tools, some third party ...
Imagina - Average PC users have to deal with an ever increasing number of digital images these days. This has become a trend after invasion of digital cameras and smart phone with high quality cameras among the mass. You also need to edit and retouch ...
Internet Explorer 10 - Up to the late 1990s, the web browser used by the bulk of Windows users was invariably Internet Explorer while Netscape played the second fiddle. The scene was relatively identical post 2000 but emergence of Firefox and later Google Chrome ...
Google Drive - In last few years, the popularity and proliferation of Cloud storage and usage has shot up considerably. Everyone, including a teenager to a network administrator is using some type of cloud based data storage. You can opt for both free and paid ...
LazPaint Portable - When it comes to choosing a suitable image editor, PC users are bombarded with options! There are a huge number of apps and some of them cost a lot. If you are looking for a freeware image editor that offers decent image editing features and ...
Privatefirewall - Everything in life has two sides to it and same can be said about technological innovations. It is quite hard to carry out most activities without resorting to the web these days. Yet the internet itself is also the reservoir of malicious ...


