ePrivacy and GPDR Cookie Consent by Cookie Consent

Log software in Firewall & Proxy Servers - Free download Log - Top 4 Download

Log search results

ProxyInspector for ISA Server 2.6n

... innovative data processing technology analyzing Microsoft ISA Server log files and generating visually-rich self explanatory reports on virtually every aspect of corporate Internet usage. Reports can be generated for various IP addresses basing on given time interval and broad range of criteria. Reports can then be viewed using built-in browser, ...

ProxyInspector for WinGate 2.7i

... popular WinGate proxy server to retrieve from its log-files comprehensive information about you employees' behavior on the ... editions; ability to store the data retrieved from log-files in own database, which enables administrator to create ... with Interbase server database to provide outstanding reliability; log and audit files management (automatically archives or deletes ...

ProxyInspector for WinRoute 2.7x

... retrieve from its HTTP proxy & mail servers log-files comprehensive information about you employees' behavior on the ... edition; ability to store the data retrieved from log-files in own database, which enables administrator to create reports for long periods of time; interface with Interbase server database to provide outstanding reliability; works ...

iSafer 3.0.0.1

... ports and set permissions for folders. A „Firewall Log“ charts incoming and outgoing movement. NOTE: iSafer works in Windows 9X/NT/2K/XP only and there is no plan for any changes This is a Firewall which runs in socket layer - Winsock firewall is a filter which checks all the ...
software pick

Jana Server 2.6.0.225

... is permitted · Manage max. number of simultaneous log-ins · Brute-Force-Attack protection · FTP Gateway · ... blocked or permitted internet sites Administrator friendly log files / monitoring · 11 different log files · Java-applet-monitor (DUN-disconnection, number of connections, etc.) ...
software award

Jana Server 64-bit 2.6.0.225

... is permitted · Manage max. number of simultaneous log-ins · Brute-Force-Attack protection · FTP Gateway · ... blocked or permitted internet sites Administrator friendly log files / monitoring · 11 different log files · Java-applet-monitor (DUN-disconnection, number of connections, etc.) ...
software award

DNS Firewall 4.0

This easy-to-use DNS Firewall is what many people are looking for when it comes to monitoring DNS traffic and blocking specific domains. It is implemented as an application and allows loading of DNS blocking rules just by clicking on files containing the DNS rules. Switching between different sets of rules - ...
software award

TekSIP 4.1.4

... SIP endpoints for outgoing calls. You can also log session details into a log file and monitor active registrations and sessions in real-time. You can monitor number of active registrations and sessions using Windows Performance Monitor (Perfmon.exe). TekSIP ...
software pick

JAP/JonDo 00.20.001

... officially declare, that they do not keep connection log files or exchange such data with other mix providers. JAP shows the identity and number of organisations in each Mix cascade in detail, and verifies this information by cryptographic means. The users are thus able to selectively choose trustable mix cascades. ...
software pick

Arovax SmartHide 2.4.368

Arovax SmartHide will hide IP address fast and secure. It has fast servers providing the high speeds of the Internet. Arovax SmartHide will compress all transferred files ( it will save the money and traffic). Arovax SmartHide will hide IP address carefully. A user is invisible all the time while connected ...
software pick

Bandwidth Manager and Firewall 3.6.2.0

... connections, transferred data by network users, URL requests log or security log etc. Graphs generated from log data shows bandwidth usage for some user or ...

eConceal Standard for Windows 2.0.016.1

... not require any additional libraries (DLLs). It stores log information detailing programs involved in outgoing/incoming traffic, Communication ... in force. In addition, it maintains an Event Log detailing user events - e.g. changing security levels, loading rules, firewall shutdown etc. ...

PPPshar Pro 6.0

... Browser-based login to access Web, Logging - Complete Log of all browsing activity (sites visited) by users, capture browsing history of all users in your network. Restrict access to websites with advanced Site Blocker - Global Whitelist/Blacklist of sites, computer-wise block/allow of websites. ...

Log download notice

Top 4 Download periodically updates software information of log full versions from the publishers, but some information may be slightly out-of-date.

Using warez version, crack, warez passwords, patches, serial numbers, registration codes, key generator, pirate key, keymaker or keygen for log license key is illegal. Download links are directly from our mirrors or publisher's website, log torrent files or shared files from free file sharing and free upload services, including Rapidshare, MegaUpload, YouSendIt, Letitbit, DropSend, MediaMax, HellShare, HotFile, FileServe, LeapFile, MyOtherDrive or MediaFire, are not allowed!

Your computer will be at risk getting infected with spyware, adware, viruses, worms, trojan horses, dialers, etc while you are searching and browsing these illegal sites which distribute a so called keygen, key generator, pirate key, serial number, warez full version or crack for log. These infections might corrupt your computer installation or breach your privacy. log keygen or key generator might contain a trojan horse opening a backdoor on your computer.