Event Log Explorer 4.5

FSPro Labs in Utilities \ Maintenance

Event Log Explorer 4.5

Event log analysis of Windows event logs is a vital task for any system administrator. The standard Windows Event Log Viewer has limited facilities, and doesn't allow you to perform effective event log analysis. Event Log Explorer is a simple but powerful utility for monitoring, viewing and analyzing events in the Security, System, Application and other Microsoft Windows logs. It extends standard Event Viewer functionality and brings a lot of...


   
 
Related Software

FirePlotter 2.24b180912 GISS (UK) Ltd  Network Monitors

FirePlotter is a real-time session monitor for your firewall. FirePlotter, simply shows you the traffic that is flowing through your internet connection moment to moment - in real-time. FirePlotter can also be described as a firewall traffic vizualizer, bandwidth analyzer, qos utility or...

PDF ShapingUp Advanced 5.0.0 Aplixio  PDF Tools

Looking for a powerful off-road PDF editor with a very light price. You found it! PDF ShapingUp is a comprehensive editor allowing you to create, manage and edit any PDF documents thanks to its many integrated tools. Without compromise, it's the perfect editor for all user profiles. It will very...

NetCrunch Suite 10.3.2 AdRem Software, Inc.  Network Monitors

NetCrunch Suite is an all-in-one and agentless network monitoring and management system, capable of monitoring every device in your network. Monitor bandwidth, availability, performance, services, NetFlow and more. Automatically generate views and maps and real-time displays. Receive alerts via...

Comodo IceDragon 61.0.0.20 Comodo Security solutions, Inc.  Internet

The Web is what you make of it! There is no doubt that the Web has evolved from viewing to doing, and it is today the world's foremost communicative medium. That is why the web browser is arguably the most important program on your computer. However, the Internet represents an insecure...

TeraByte Drive Image Backup and Restore 3.21 TeraByte, Inc.  Backup Tools

TeraByte Drive Image Backup and Restore Suite is an affordable and reliable drive image backup and restore software package that is used for backing up all of your hard drive data to other media or external drives (such as eSATA, USB or 1394) and allows you to easily perform a bare-metal restore...

Xopero Cloud Personal 3.9.6 XOPERO SOFTWARE S.A.  Backup Tools

Data security keeps you awake at night? Well, we have a perfect solution. Xopero Cloud Personal is a simple backup software that allows you to quickly and easily protect the data stored on your computer. You can decide which resources need to be protected: files and folders (e.g. Desktop and My...

PDF Studio Pro for Windows 2018 Qoppa Software, LLC  PDF Tools

PDF Studio is an all-in-one, easy to use PDF editor that provides all PDF features needed at a fraction of the cost of Adobe Acrobat and other PDF editors. PDF Studio maintains full compatibility with the PDF Standard. Features Create PDFs Scan-To-PDF Annotate and Markup PDFs Fill In & Save...

CD Label Designer 7.2 Dataland Software  CD/DVD Tools

CD Label Designer is application that will help you to design and print CD jewel case and DVD box labels, booklets, sleeves (envelopes), round and business card disk labels. It supports images, RTF texts, circled texts and shapes allowing you to arrange, change size, angle and transparency of...

WinGuard 10.2.1 WinGuard  Access Control

WinGuard locks your Desktop programs and Store apps using password protection. It does this by scanning for programs you add to its blacklist. If a match is found, WinGuard stops the application and displays a password prompt. Lock any app with password; Lock Software Installations; Lock MS...

GlassWire Firewall 2.0.123 GlassWire  Firewalls

GlassWire's free firewall software helps protect your privacy & security by monitoring your network activity for suspicious activity. You'll be shocked by how many applications on your computer are sending your private data over the Internet without you knowing. Once suspicious activity is...