Showing 4 open source projects for "log visual"

View related business solutions
  • Easy-to-use online form builder for every business. Icon
    Easy-to-use online form builder for every business.

    Create online forms and publish them. Get an email for each response. Collect data.

    Easy-to-use online form builder for every business. Create online forms and publish them. Get an email for each response. Collect data. Design professional looking forms with JotForm Online Form Builder. Customize with advanced styling options to match your branding. Speed up and simplify your daily work by automating complex tasks with JotForm’s industry leading features. Securely and easily sell products. Collect subscription fees and donations. Being away from your computer shouldn’t stop you from getting the information you need. No matter where you work, JotForm Mobile Forms lets you collect data offline with powerful forms you can manage from your phone or tablet. Get the full power of JotForm at your fingertips. JotForm PDF Editor automatically turns collected form responses into professional, secure PDF documents that you can share with colleagues and customers. Easily generate custom PDF files online!
    Learn More
  • Save up to 90% off rates for USPS, UPS, DHL Express, and more with the best multi-carrier shipping software for e-commerce businesses. Icon
    Save up to 90% off rates for USPS, UPS, DHL Express, and more with the best multi-carrier shipping software for e-commerce businesses.

    For Small / Medium E-Commerce Businesses

    Whether you're established or just getting started, Shippo is the best shipping software for growing e-commerce brands that need to save time and money, fulfill and ship at scale, and delight customers. Create shipping labels for all carriers & save money with discounted rates. See all your online sales channels in one place and automatically access discounted USPS and DHL Express rates, or use your own carrier accounts. Sign up is free and there are no monthly fees or cancellation fees.
    Learn More
  • 1
    Ascii Art for Java

    Ascii Art for Java

    Visual components ready for ASCII rendering

    Instantly create ASCII reports, multi-column tables, graphs, ... These can be rendered on screen, files and most importantly log streams.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Windows Tail

    Windows Tail

    Windows Tail: A version of Linux tail. Tail for windows.

    Windows Tail is a Windows version of Unix and Linux tail command. Tail for Windows. I wanted to make it easier to use tail in the windows environment. You can even add it to the open with dialog in windows explorer. This is great tool if you need to monitor log files. Now: Create Application Alerts! Email Alerts and SMS Alerts using SMTP! Record Tail Session to log a File! Saves location of tailed or viewed files! Works on Linux Systems using Mono! and much much more! The...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    NLog is a logging platform for .NET with rich log routing and management capabilities. It uses familar logger pattern known from log4xxx. Advanced routing options include buffering, asynchronous logging, load balancing, failover, and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Lumbermill is a visual log processing and distribution center for Log4j and (in 2.0) java.util.logging (JSR47). It is a Swing/GUI standalone application that supports viewing and archiving of log events.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB