Event Log Explorer

download buy now home page
developer:FSPro Labs
license:Shareware
version:4.5
size in Kb:4,792
price:$149
 
platform: Windows Server, WinServer, Windows 7, Win7 x32, Win7 x64, Windows, Windows 2000, Windows XP, Windows Vista, Win2000, WinVista, Windows Vista Ultimate, Windows Vista Ultimate x64, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, Windows Vista Home Basic x64, Windows Vista Home Premium x64, Windows Vista Business x64, Windows Vista Enterprise x64, Windows 8
downloads:64
our rating:5 Stars
popularity:
1346/1997656
link error:Report
Event Log Explorer

Rate me

Description:   Event log analysis of Windows event logs is a vital task for any system administrator. The standard Windows Event Log Viewer has limited facilities, and doesn't allow you to perform effective event log analysis. Event Log Explorer is a simple but powerful utility for monitoring, viewing and analyzing events in the Security, System, Application and other Microsoft Windows logs. It extends standard Event Viewer functionality and brings a lot of new features. Feel free to download it right now - this program is FREE for personal use!


More Downloads Related to Event Log Explorer

Viewer - Backup - Monitor - Print - Log - Monitoring - Events - Security - System - View - Export - Event - Application - Analyzer - Viewing - Windows Event Log

Executable Explorer Executable Explorer shows the links between an executable and the modules (DLLs, OCXs) it requires to run on the system, imported and exported functions (APIs), reference material such as headers; process and module memory information; COM type library and class information in the Registry. The ...

Application As Service Application as Service is an advanced system utility which lets you run any application as Windows 2000/XP/2003 Service. You can easily configure Application as Service using its intuitive GUI interface or command line configurator directly from your software. Application as Service features very low CPU ...

WMI Explorer WMI is an acronym for Windows Management Instrumentation. WMI is the Microsoft's implementation of Web-Based Enterprise Management (WBEM) - a new management technology that allows software to monitor and control managed resources throughout the network. Such managed resources include hard drives, file systems, settings of ...

EventLog Inspector Manage local and remote Windows events more effectively with EventLog Inspector. The new cost-effective solution allows system administrators to extend Windows event log with more features. EventLog Inspector provides administrators the ability to broadcast event log events to a dedicated syslog server or forward the ...

Active Directory Change Tracker Active Directory Change Tracker, a powerful tool to track, analyze, and report all changes made to your AD configuration. Active Directory Change Tracker audits all changes made to your Active Directory by periodically collecting only the changed data, reporting what exactly changed, along with the ...

Event Monitor Capture Event Monitor Capture is an application that allows you to monitor everything that happens with your PC. You can view a list of the events that happen.First, you have to choose the SMTP server details and then access the 'Log' section. Monitor and keep track ...

Glary Disk Explorer Glary Disk Explorer give you the power to organize your data and to see how the data occupies your hard disk. By using Glary Disk Explorer you can easily and quickly free up additional space on your disk when needed. Just select the Drive or ...

Macgo Free iPhone Explorer for Mac Macgo Free iPhone Explorer for Mac is a free iOS file explore software, it is designed to access, explore and manage your iOS file system. With the freeware, you can easily add and delete all types of file saved on your iOS devices. Moreover, it ...

Macgo Free iPhone Explorer Macgo Free iPhone Explorer for Mac is a free iOS file explore software, it is designed to access, explore and manage your iOS file system. With the freeware, you can easily add and delete all types of file saved on your iOS devices. Moreover, it ...

WMI Tools WMI Tools is a free toolkit from AdRem Software designed to access WMI information both locally and remotely. The General Info view presents a general summary of the system. The Processes view shows a list of active processes and their resource utilization. The Services view shows ...

Magic UDF (Universal Disc Format) Burner Magic UDF (Universal Disc Format) Burner v1.0.1RC1 (VCL) - UDF CD/DVD burning components for Borland Delphi/C++ Builder developers. Magic UDF Burner VCL is a complete disc burning solution for write-once and rewritable media using non-sequential recording. Magic UDF Burner VCL includes all the features required ...

dhtmlxMenu :: Ajax Menu Component dhtmlxMenu represents an excellent solution for web navigation. If you need to integrate Ajax-enabled DHTML navigation system into your web application or web site you can do it easily with dhtmlxMenu. This JavaScript navigation component enables to create attractive popup or drop down menus. It’s ...


Latest Downloads from Event Log Explorer publisher FSPro Labs

Hide Folders Hide Folders effectively protects your data by hiding and locking your secret files. It allows you to set different protection (hide, lock, read-only) for your files and folders and protect them with a password. The program comes with smooth...

Hide Folder Ext This unique program lets you hide a folder on external or removable disks and protect it with a password. While all other folder hiding programs are intended to hide folders on internal hard drives, Hide Folder Ext hides data on external devices....

My Lockbox My Lockbox is a security software enabling you to password protect folders on your computer. The protected folder is hidden and locked from any user and application of your system and also from the net. To access the protected folder you have to...

Internet Explorer Password Recovery Wizard The World Wide Web (WWW, Web) is a global information space. Lots of web resources like web mailboxes, blogs, forums etc. provide a personalized access for the Internet users. Users of such sites are required to authenticate themselves with a...

FTP Password Recovery Wizard File Transfers Protocol (FTP) was developed to transfer data reliably and efficiently between client and server. To provide data privacy, FTP-client must authenticate itself on the FTP-server with a password. Commonly, it?s enough to input this...

Email Password Recovery Wizard Nowadays it?s difficult to find a person who doesn?t have an email address. When you create your email account, you get account password in order to prevent others from accessing your mail. Commonly, it?s enough to input this password once into...

Lock My PC These days, computers are everywhere: from banks and government offices to shops and homes. We tend to rely on our machines more and more each day. We store our valuable data, personal and business-critical information, photos, credit card...

Hide Folders XP Every day we trust our personal files to a computer. Most of us store various bits of personal or business-critical information on our hard drives. If you share your computer with co-workers, children, or a spouse, or your computer is always...

Credit Card Knight Prevent your credit card data from being stolen by carders. Most Internet Explorer users have autocomplete settings on. When you are shopping on-line and filling an order form, Internet Explorer saves the data you have entered into a safe place...

Internet Password Recovery Wizard Using the Internet is inseparably linked with passwords. Every time you open private pages, check your email, download or upload files via FTP or simply connect to the Internet via your Internet service provider, you authenticate yourself with a...

Access Boss Access Boss is a unique easy-to-use tool, that enables you to effectively restrict access to a PC for certain users based on time factor. All you have to do is install Access Boss under an Administrator account, run the program and choose which...

Identity Knight Modern computer technologies evolve with blazing speed. As we emerge into a new digital era, we tend to trust machines with virtually every aspect of our life. Development of secure network communication technologies opens new horizons of...

New software

Popular software

Current software picks