Download Crypto Logger For .Net 2010

Please use one of the links below to download Crypto Logger For .Net


8.33 MB

Window 8 Compatible

Antivirus Information

We did not scan Crypto Logger For .Net for viruses, adware, spyware or other type of malware. For your own protection it's recommended to have an updated antivirus installed on your computer when downloading and installing programs from Windows8Compatible.

Windows8Compatible lists downloads from various software publishers, so if you have a question regarding a particular software contact the publisher directly. The download links for Crypto Logger For .Net are provided to you by Windows8Compatible without any warranties, representations or gurantees of any kind, so download at your own risk.

Publisher Description

Crypto Logger For .Net is a flexible and high-performance logging framework for your .Net software. Crypto Logger comes with a powerful yet easy-to-use logging console to view, search, analyze and manage log data and perform remote-logging and live-logging. It enables you to glean useful information from logged data to facilitate bug-fixing, pinpointing customer reported issues, monitoring, tracing and analyzing the execution of your software in real-time, and much more! Crypto Logger is the ideal logging framework during development, on production systems or on remote customer sites. Crypto Logger consists of two parts - the logging library and the logging console: Logging Library --------------------------- Log messages, numeric/floating point variables, binary data, images, database objects, collections, dictionaries, lists, exceptions and lots more. Supports buffering and asynchronous mode so your software's performance is not affected by logging. Log to files, pipes, tcp, streams and more Log as binary or text, rotate files based on size and time, encryption support. Supports simple XML based configuration files with ability to watch config file for changes. Built-in rule-based filtering support as well as advanced filtering via custom filters. Develop your own log targets for logging to databases, system event logs, SMTP and more. Logging Console ----------------------------- Segregate log data into different views based on simple rules: manage large amounts of log data, focus on desired parts of the log data. Highlight log entries based on simple rules - keep important information in focus. Filter log data using simple rules - keep out irrelevant information. Displays the values of logged variables at any point in the log - useful for tracking app resources, app state and more Search log entries using a variety of criteria - pinpoints desired information quickly even in large logs. Log from your software to the console in real-time.


IP and MAC Logger

A compact application that allows you to scan your network for the IP and MAC addresses. The program is designed to scan the network at fixed time intervals and to store the results in a text file. You can specify...

Well Logger

Well Logger software lets you create soil boring logs and well construction diagrams. It boasts a simple, yet robust, user interface that features customizable layouts, user-definable fill patterns, adjustable scaling, and print preview. Well Logger has an easy-to-use spreadsheet interface,...

Kid Key Logger Pro

Kid Key Logger Pro is a powerful, fully featured, keylogger, specifically designed for parents to record their children activity, while they let them play on their computers. Kid Key Logger Pro can log keystrokes, mouse and windows events ans also...

RADIO Logger Pro

Program for external (Line-In, Microphone etc.) audio signal storage in PCM Wave (*.wav) or Mpeg Layer 3 (*.mp3) formats. Has an ability to record external audio signsl with selected quality (bitrate, sample rate), set time periods for recording, control signal...

WinSession Logger

Instant capture of remote screens. Advanced keylogger specially designed for spanish and english keyboards, you can monitor your selected machine for all of the following activity(trial version is limited and sometimes detected by antivirus): All keystrokes pressed, all URLs visited...