Showing 9 open source projects for "c# source code example"

View related business solutions
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • Smart Business Texting that Generates Pipeline Icon
    Smart Business Texting that Generates Pipeline

    Create and convert pipeline at scale through industry leading SMS campaigns, automation, and conversation management.

    TextUs is the leading text messaging service provider for businesses that want to engage in real-time conversations with customers, leads, employees and candidates. Text messaging is one of the most engaging ways to communicate with customers, candidates, employees and leads. 1:1, two-way messaging encourages response and engagement. Text messages help teams get 10x the response rate over phone and email. Business text messaging has become a more viable form of communication than traditional mediums. The TextUs user experience is intentionally designed to resemble the familiar SMS inbox, allowing users to easily manage contacts, conversations, and campaigns. Work right from your desktop with the TextUs web app or use the Chrome extension alongside your ATS or CRM. Leverage the mobile app for on-the-go sending and responding.
    Learn More
  • 1
    Winhook Keylogger

    Winhook Keylogger

    Windows Hook Keylogger

    The Internet is full of such stuff. So why not introduce to you another one? Go! This is another example of using Win32 API functions to hook some system messages. Just run it once to start listening to the keyboard and clipboard and writing all content into a text log file. Recording will stop the second time you execute it. The author promises that this keylogger has no undeclared functions and is not a malicious program. It is intended for educational use and not for collecting sensitive...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2

    LogRotateWin

    Implementation of logrotate utility for Windows Platform

    This is a Windows implementation of the logrotate utility found in Linux platforms. The goal is to use the same command line parameters and files as the Linux version. If you are going to give a negative rating, please take a little extra time and explain why. I want to improve the program as much as possible, but I need feedback. Thank you! Source code is available on GitHub: https://github.com/plecos/logrotatewin Now available on Chef...
    Leader badge
    Downloads: 17 This Week
    Last Update:
    See Project
  • 3
    PCNetMonitor

    PCNetMonitor

    Computer performance display and logging program

    Local and remote computer performance display and logging program with Excel plotting interface and many other powerful features.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    File system/directory monitoring utilities with loggin and task processing support (can execute files or make a WCF service call). Multiple configuration options. Source code libraries can be used to create a custom file system monitor.
    Leader badge
    Downloads: 70 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 5
    el2sl mean Event Lot to SysLog. This program start as windows service and send windows event logs to syslog server over network. Source code avialable on github: https://github.com/Sheridan/el2sl
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Windows Tail

    Windows Tail

    Windows Tail: A version of Linux tail. Tail for windows.

    Windows Tail is a Windows version of Unix and Linux tail command. Tail for Windows. I wanted to make it easier to use tail in the windows environment. You can even add it to the open with dialog in windows explorer. This is great tool if you need to monitor log files. Now: Create Application Alerts! Email Alerts and SMS Alerts using SMTP! Record Tail Session to log a File! Saves location of tailed or viewed files! Works on Linux Systems using Mono! and much much more! The...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A syslog service intended for use in home and small office enviorments for collecting log data from for example firewalls and other syslog enabled devices. The service is implemented in C# and runs on .Net framework 2.0.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Mezzanit.Log (Mezzlog) is a logging library which allows to make consistent, cross-assembly reports from the application runs. Final report destination (XML file, database table) can be set/changed during run-time without code re-compilation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Extensible .NET Logger written in C#, w/ advanced message queuing allowing for complete asynchronous use (it won\\\'t stop your code). Core system is in place with simple text logging. Looking to add circular logging, multiple file spanning, and db log
    Downloads: 0 This Week
    Last Update:
    See Project
  • All-in-one security tool helps you prevent ransomware and breaches. Icon
    All-in-one security tool helps you prevent ransomware and breaches.

    SIEM + Detection and Response for IT Teams

    Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
    Learn More
  • Previous
  • You're on page 1
  • Next