English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by free log files

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: FREE KEYLOGGER by PC Sentinel Software 2.5.0
Download FREE KEYLOGGER by PC Sentinel Software 2.5.0
more info
2007-02-01
Now with free Web Access to log files! Internet monitoring & keylogging software makes it easy to record all keystrokes on the computer and helps protect children when they go online.
2007-03-31
Keyboard monitoring software monitor user activity tool record each typed data characters save in invisible mode log files automatically Keylogger utility run in stealth mode capture visited websites online chats login passwords sensitive information
2007-03-23
ReportGen for Microsoft ISA Server allows you to search, query and report on a database created from the Proxy log files from Microsoft ISA Server.
2007-03-23
ReportGen for Novell BorderManager allows you to search, query and report on a database created from the Proxy log files from Novell BorderManager.
2011-12-04
This program reads the Yahoo Messenger archive log files, allows searching through them and easily convert them to standard formats, like HTML and plain text.
2007-12-10
Keylogger utility secretly makes record of every keystroke and also supports to capture windows screenshot or all visited website snapshot. Software makes a log file for storing this information and sends it to the predefined user email id.
2008-03-29
SurfStats analyzes log files and then creates html based web activity and conversion tracking report
Advance Keylogging Software 2.0.1.5 by File Recovery Utility
2008-07-22
Keystrokes monitoring software track and record all keys presses in your computer, visited websites, chat conversation, typed URLs, login name, passwords and saved them into hidden log file and facilitates to captures screenshots periodically.
Pen Drive Blocking Software 2.0.1.5 by Password Recovery Tools
2008-10-18
Pen drive blocking software monitors plug in and plug out of USB mass storage drive activity over Windows network of client’s computer system. USB drive data leakage protection tool save transferred data in log files at specified location on system.
0.037