English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by free log files analysis

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: Aves Bird Watcher Log 2.8
Download Aves Bird Watcher Log 2.8
more info
2008-03-23
SharkPoint for Windows v2 is a professional digital dive log that goes way beyond simply recording dive data and printing a dive log
2008-03-29
SurfStats analyzes log files and then creates html based web activity and conversion tracking report
Advance Keylogging Software 2.0.1.5 by File Recovery Utility
2008-07-22
Keystrokes monitoring software track and record all keys presses in your computer, visited websites, chat conversation, typed URLs, login name, passwords and saved them into hidden log file and facilitates to captures screenshots periodically.
Pen Drive Blocking Software 2.0.1.5 by Password Recovery Tools
2008-10-18
Pen drive blocking software monitors plug in and plug out of USB mass storage drive activity over Windows network of client’s computer system. USB drive data leakage protection tool save transferred data in log files at specified location on system.
SkypeLogView 1.00 by NirSoft Freeware
2008-11-06
SkypeLogView reads the log files created by Skype application, and displays the details of incoming/outgoing calls, chat messages, and file transfers made by the specified Skype account.
2009-01-28
Advance Keylogger software captures visited websites, screenshots, clipboard, other activities and send log file at predefined email in regular interval of time. Keylogger utility works in invisible mode and records typed keystrokes in a hidden file.
Family Keylogger 4.0.1.5 by Email hacking
2009-05-01
Family keylogger software is leading solution to capture all keyboard related secret activities in password protected encrypted log files during your absence. Keystroke monitoring program runs in stealth mode and is invisible from searching areas.
2009-05-12
Advanced keylogger utility provides facility to stores all typed keys used for login, email, password and other document into hidden log files. Keyboard monitoring software helps to monitor employee’s activities on computer during office hours.
2005-10-25
Performs event log based Intrusion detection and network wide event log management. Archives & analyses event logs of all network machines and alerts you in real time to security issues, attacks and other critical events.
0.039