UEStudio 05.10 serial key or number

UEStudio 05.10 serial key or number

UEStudio 05.10 serial key or number

UEStudio 05.10 serial key or number

UTILTEXT: Text, ASCII, HTML, DBF editors and viewers, print utils, font managers

 File nameFile descriptionFile sizeModified1.16ivw230.exeI-View v2.30 - Off-Line HTML Browser for Win165093881997-10-07 10:07:452.16pstx10.zip2401471996-08-13 09:50:403.2col95.zip571231996-01-03 07:06:554.2paste10.zip2Paste v1.01 - Shows text or a file list that is ready to be pasted from the clipboard to an application930481999-02-01 12:54:515.30lines.zipSelector of various VGA text modes52131995-10-25 08:57:406.32ivw230.exeI-View v2.30 - Off-Line HTML Browser for Win325791481997-10-07 10:07:507.32pstx10.zip2651901996-08-13 09:50:468.4fs1111.zip4FS (Four Frame System) v1.1111 - General HTML pages for e-book publishing9732442002-11-04 12:03:239.4html.zip4HTML Assistant v1.0 - HTML editing tools for Win328297112001-01-18 08:41:0410.4lctrl.zip4L - Control program for the HPLJ 4L Printer322221995-12-07 09:12:2611.4pr415.zip2631791995-04-11 08:13:3112.a2pr.zipAccent Access Password Recovery v1.03 for Win95/98/NT291382000-03-31 11:55:1713.a97pwd.zipAccess97 Password Recovery Utility for Win321555051999-12-03 09:00:3914.abbrev24.zipABBREVV v2.4 - Abbreviation list maintenance util for DOS577732000-05-15 13:11:3615.abbrew24.zipABBREVW v2.4 - Abbreviation list maintenance util for Windows530232000-05-15 13:11:3616.abcode99.zipABarCode v99 - Bar code add-in for MS Access'973305412000-02-07 10:38:2217.abg.zipA Binary God - Util to convert ASCII text to binary form1306472001-08-13 12:08:1118.ac98.zipAscii-chart - Resident util that helps to paste ASCII chars into edited text270271998-12-07 13:14:3019.accesspw.zipAccessPassword v1.10E - Access 95/97 Password Recovery Tool183351999-04-08 09:19:2020.accver.zipACCVER v1.01 - Allow to work with multiple versions of MS Access databases5371621999-11-04 08:49:4121.acehtml6.exeAceHTML PRO v6.03 - HTML Editor for Win3257228642004-10-04 10:54:2222.acomp107.zipAccent Composer v1.07 - Accented chars entering helper for Win95/NT4232621999-03-11 14:53:0523.acplus16.zipAuto Correct Plus v1.6 - Keyboard util for Win95/98/NT that helps correct typographical errors1281282000-03-22 19:01:3924.acpr.zip5012072000-09-13 13:42:5225.acrodc17.exeAcrobat Reader DC 17.009.20044 for Windows 7-101101138722017-04-11 12:37:0126.acrodc18.exeAcrobat Reader DC 18.011.20055 for Windows 7-101206829922018-09-19 20:00:3327.acrodc19.exeAcrobat Reader DC 19.021.20058 for Windows 7-101758490082020-02-11 20:39:2828.acrodc20.exeAcrobat Reader DC 20.012.20041 for Windows 7-101774341602020-08-11 11:16:5829.acrodos.zipThe Acrobat Reader for DOS26102371995-11-16 09:16:0030.actualsr.zipActual Search & Replace v2.6.2 - Text string searching util for Win9x/NT7800272005-05-19 11:10:2331.aditor.zipADITOR PRO v3.02 - Advanced text editor for Win9x/NT5901852000-02-03 09:59:3232.adobcln1.zipAdobe Reader and Acrobat Cleaner Tool v1.0 (for v9)6284882015-12-31 13:33:3933.adobcln2.zipAdobe Reader and Acrobat Cleaner Tool v2.0 (for v10/11)6668942014-05-17 16:04:2634.adobcln4.zipAdobe Reader DC and Acrobat DC Cleaner Tool v4.04806492015-12-31 13:30:5235.adraw125.zipAcidDraw v1.25r - ANSI/ASCII Screen Editor833741999-09-03 09:19:4936.adscan32.zipAdScan32 - Text searching tool for Win3215972192004-01-22 10:17:0837.advtext.zipAdvanced Text Storage v1.0 - Windows application to store, edit and reuse frequently used texts2454442000-08-17 09:43:1038.ae170.zipAE - Another Editor v1.7927551996-08-26 13:57:3339.ae2000pr.zipAdvanced Excel 2000 Password Recovery v1.119670932002-01-07 12:00:3740.ae95pr.zip3322862000-09-13 13:41:3041.ae97pr.zip10337432000-10-18 09:42:5942.aebex.zipAdvanced eBook Explorer v1.1 - eBooks collection manager7040572002-10-09 14:31:4343.aed20.exeANSIED v2.0 - ANSI Editor2123171998-08-10 10:38:2644.afc.zipAdvanced Font Catalog v1.20 - Util to catalog all kind of font media10054142004-12-10 14:57:4645.afcomp.zipActive File Compare v1.4 for Win9x/NT/2000 - ASCII text files comparator6150052002-03-25 16:25:4246.afiutil.zipWimpy Automated Font Installer - TTF Font Installer120731998-04-15 14:04:0047.afr.zipAdvanced Find and Replace v7.7 - Tool for Win9x-7 to search and replace text strings in TXT, DOC, XLS, HTML and PDF documents12701332012-07-22 20:36:4948.afv.exeAdvanced Font Viewer v2.4 for Win329842852005-01-28 14:17:0249.ahc113.zipAbsolute HTML Compressor v1.13 for Win95/98/Me/NT/20005144532002-02-25 15:50:5850.ahp.zipAlgART HTML Packer for Win321245962000-02-03 09:38:3751.aht10.zipAdvanced HTML Toolkit v1.0 - Offline browser and text editor with HTML syntax highlighting6402432000-11-14 09:21:1552.ahtmlc30.zipAdvanced HTML Coder v3.0 for Win32 - Tool to compress, optimize and encrypt HTML files6648582003-06-25 11:51:1553.akey41.zipAutoTyper v4.01 - Automatic document typer147741997-09-18 11:21:1854.akfv31.zipakFontViewer v3.1 - Windows Font Viewer2604151999-10-21 12:27:0555.album20.zipWeb Album Creator v2.0 - Photo albums for web creator21495882001-02-02 14:10:4256.align11.zipAlign v1.1 - Aligns data in columns in an ASCII text files377062000-03-10 10:14:4557.alite.zipALITE v2.1r - Lite version of spreadsheet program AS-EASY-AS2294202007-06-21 11:03:0258.allch35.zipAllchars for Windows v3.5 - Makes the chars not found on your keyboard accessible withing Windows3560042000-03-31 11:27:0659.alpr.zipAdvanced Lotus Password Recovery v2.106125882009-04-30 20:39:3460.altpdf.zipAlterPDF v4.7 - Free software for converting, modifying, and manipulating PDF files165673102020-08-11 16:21:5661.alwrt1.zipAnet AllWrite v1.11 - WYWISIG editor for creating HTML pages14174631998-12-07 13:15:1762.ami2wd.zipAmiPro v3.0 Conversion Utility to MS Word 7.0 File Format62521998-03-24 14:09:2763.ampr.zip5924802000-06-22 13:32:3164.ampr100.zipAccent Money Password Recovery v1.00 - MS Money files password recovering utility237782000-03-17 09:11:2965.an2as03.zipANS2ASC v0.3 - ANSI 2 ASCII Converter83851997-07-17 09:35:0566.an3dvr12.zipAnfy 3D v1.2 for Win9x/NT - 3D effects for use in web pages45125322000-04-03 11:42:1867.anfy210e.exeAnfy v2.1 for Win9x/NT - Special Java applets based effects for web pages51176432003-12-09 12:02:5768.anote123.exeAnother Notepad v1.23 - Windows Text Editor3830351997-10-22 13:10:1169.anote95.exeAnother Notepad v1.23.32 - Win32 Text Editor3928611997-10-17 09:49:4170.ansi2asc.zipANSI 2 ASCII Text Converter v1.20307581995-11-20 15:49:0571.ansiv110.zipANSI Graphics Visualiser v1.1142211998-01-02 12:09:5372.antiword.zipAntiword v0.33 - DOS application to display and/or convert MS Word document to ASCII text file1734642004-10-08 14:09:3973.anvi10.rarAnvi v1.0 - ANSI Viewer for DOS/OS2/Win321317372002-06-13 09:32:0974.ao20pr_p.zip9569462002-05-31 10:15:4675.ao20pr_s.zip9881892002-06-03 14:37:3876.ao95pr.zip3373202000-10-18 09:41:5577.ao97pr.zip10522342000-11-22 10:02:2178.aopb.zipAdvanced Office Password Breaker v3.09225112009-04-30 20:24:3279.aopr.zipAdvanced Office Password Recovery v4.1230200772009-04-30 20:20:3680.aoxpp20.zip12944332003-09-09 13:55:2681.aoxps20.zip12305162003-09-09 13:55:2782.apdfpr.zip24421112009-04-30 20:17:3283.apdfprp.zip15891952005-04-04 14:31:1884.aplus404.zipANSI PLUS v4.04 - Console driver for MSDOS/Win3/Win'953944761995-11-27 11:13:0185.apo.zipAbacre Paperless Office v1.0 - Paperless office file database7945852003-05-07 14:20:1986.apsw.zipASCII Paint v1.4 - Win32 util for drawing ASCII pictures470122001-12-20 10:49:5787.apxpr.zip6357502000-10-18 09:46:0588.ar1014en.exeAcrobat Reader v10.1.4 for Windows XP-7508440962012-08-14 22:50:1189.ar11010e.exeAcrobat Reader v11.0.10 for Windows XP-7758581122014-12-09 09:41:0790.ar813en.exeAcrobat Reader v8.13 for WinXP/Vista218062562009-05-28 10:16:0591.ar950en.exeAcrobat Reader v9.5.0 for Windows XP-7335609842013-01-08 09:45:0792.arach_32.exeArachnophilia v5.5 - HTML editor with internal browser27166342015-09-02 11:02:3093.arch3000.exeArchivarius 3000 v4.79 - Full-text searching tool82918712018-10-01 12:40:4594.arspedup.zipAcrobat Reader Speedup v1.342324782005-12-16 10:56:0295.arv111.zipA Real Validator - HTML/XHTML Syntax Checker for Win9x/NT/200023940242001-07-10 11:03:5096.asa57.zipAS-EASY-AS v5.7 - Spreadsheet program for DOS5714651998-10-01 11:59:4997.asahlp.zipAS-EASY-AS Help file316511998-03-05 09:03:3798.asawin95.exeAS-EASY-AS v1.60ac for Win95-XP - Spreadsheet program16836772007-06-21 11:02:1899.asc10.zipASC v1.0 - ASCII Code Finder209311997-02-20 09:08:11100.aschtm50.zipASC TO HTM v5.0 - Text files to HTML converter for Win9x/NT/2K19460442004-12-20 10:58:24101.ascii350.zipASCII Table Resident Viewer v3.50348011996-06-14 11:17:40102.asciia11.zipASCII Art v1.1 - Creates ASCII Screens966051996-03-12 09:27:15103.asciic18.zip854251996-10-25 08:23:59104.asciid31.zipASCII DRAW v3.1770411995-08-30 09:04:00105.ascrtf20.zipAscToRTF Conversion Tool v2.016707922004-03-22 10:44:13106.asctab40.zipAscToTab v4.0 - Text files to HTML/RTF format conversion tool10803842002-04-05 12:52:43107.askey121.zipResident ASCII table130571995-01-20 12:33:54108.askw.zipAS Keywords Generator v1.07 - Create search keywords for given HTML page3156902001-09-10 13:18:27109.astro.zipAstroHelp v1.11 for WinWord v.6,7 - Add-on for developing Windows Help files1673171998-06-19 12:07:29110.asutype.zipAS-U-TYPE v1.2 - Tool for Win32 to increase typing productivity15377642002-01-17 10:47:00111.aswit.zipACESOFT SUBLIMATE WRITING INTO TEXT for DOS/Win - ASC2 normaliser/HTML address extractor481231998-04-15 14:04:00112.atcomp18.zipCompare v1.8 - ASCII files comparator239501999-07-09 11:06:55113.ath_hwr1.zipHaCKeR style text reader/maker152481996-08-15 10:29:42114.atps200.zipAT Paster v2.00 - Typing Support & Clipboard Management Util for Win9x/Me/NT/20002667632001-01-19 10:08:25115.ats102.zipAdvanced Text Storage - Windows application to store, edit and restore frequently used texts via clipboard2865662001-06-21 12:31:17116.auhtml72.zipAUTOHTML v7.2 - Text 2 HTML Convertor988901997-12-10 10:09:18117.aur8630c.zipAurora v3.0c - 286 executable1479231996-11-08 11:44:34118.auror30c.zipAurora v3.0c - Powerful Text Editor for DOS6691361996-11-08 11:44:39119.autins34.zipAutoInsult v3.4 - Insult generator for Win9x/NT3739042001-01-31 10:15:38120.autogrep.zipAutogrep - Menu driven grep-like utility552281997-12-08 11:36:36121.autotxt3.zipAutoText v1.3 - TXT 2 EXE Converter1938551998-02-09 11:54:01122.avd-436.zipACID View v4.36 - ANSI, RIP & GIF Viewer1953461998-04-27 09:52:15123.aview20.zipANSI View v2.0 - 32-bit ANSI Viewer480051995-11-08 09:40:01124.aw065b.zipArt Worx v0.65 (Beta) - ANSI Editor1087031995-07-19 10:09:42125.aw2000pr.zipAdvanced Word 2000 Password Recovery v1.119663202002-01-07 11:58:23126.aw95pr.zip3350742000-09-13 13:42:15127.aw97pr.zip10143932000-10-18 09:44:51128.awopr.zipAdvanced WP Office Password Recovery v1.336547412009-04-30 20:37:40129.awppr10.zip3747102001-08-23 11:07:56130.awrdpr.zipAccent Word Password Recovery v1.0 - Util for recovering password to MS Word 6-9 documents345932000-10-27 09:06:49131.aws35.zipAWS v3.5 - ASCII drawing tool872121999-04-16 07:43:09132.axgdc.zipAXGDC v1.0 - NG compatible compiler/linker742112000-10-25 13:33:37133.aypad12.zipAYPad v1.2 - Notepad replacement1994451998-11-26 12:25:15134.ayps11.zipAYPaste v1.1 - Util for pasting text into application incl. WWW browsers845831998-12-07 13:17:16135.barcode.zipBarcode generator for PCL*-based printers320642000-02-07 09:51:03136.batchcnv.zipBATCHCNV - Utility to VIEW program124891996-10-28 08:11:45137.batchprn.zipBatch & Print Pro v1.36 - Tool for batch printing of defined documents18903212004-06-15 09:16:30138.batcon10.zipBATCON v1.0 - A collection of batch files for text format conversions (ASCII,HTML,NG,HLP,RTF,DOC...)6784601998-01-27 09:44:49139.bav121.zipBinary ANSI Viewer v1.211668161995-10-24 07:09:53140.bbgrep12.zipBlackboard Grep 32 for Win95/NT - Text string search utility7083021997-05-15 08:51:07141.bccdiz13.zipBCC-DIZ v1.3 DIZ Files Displayer for Win321103672000-10-11 13:04:38142.bcmag200.zipBarcode Magic v2.0 - Util for the creation of barcodes2715122000-02-16 09:12:06143.bdbfs127.rarBDBFS v1.27 - DBF Editor for xBase Professionals (in Russian)4603782006-07-04 18:05:11144.bdbfs127.zipBDBFS v1.27 - DBF Editor for xBase Professionals5214412006-07-04 17:37:49145.bes200.zipBES v2.00 - Binary External Sort for DOS/OS2 by SEN494811999-02-12 10:09:26146.bfg-cans.zipCANsi Tools v0.01 alfa - Crunched ANSI Tools409171996-07-19 14:46:46147.bgasci13.zipbg_ascii v1.32 - Interactive ASCII Graphic Tool3599362001-06-14 10:31:01148.bhm119.zipBhaum v1.19 - TXT/HTML editor and RTF Viewer for Win328699912001-03-26 14:57:38149.biblio1.zipPhilip Stone's Bibliography Pro 2000 for Win95 - Biblio writer1878051999-03-18 11:00:47150.big500.zipBIGECHO v5.00 - Displays large chars on screen124071995-08-07 11:46:18151.big5view.zipBig5View v1.5 - BIG5 Chinese text reader for Windows3417581999-03-12 14:47:40152.bigtxt33.zipBigText v3.3 - Electronic Books Creator3885431999-08-19 09:43:49153.bintext.zipBinText v2.04 - A file text scanner166482000-03-16 09:36:32154.bkmrk11a.zipBookMark Keeper v1.1 - Documents bookmarks creator2706362000-05-24 10:37:37155.blf10.zipBlank Line Fix v1.0 - Blank lines from text files remover for Win9x/Me/NT/20005070192001-01-19 09:55:49156.bmstr25.zipBrowser Master v2.5 - Win32 tool for Web page developers7555772001-08-09 12:56:06157.bnr500.zipBanner 5.00 - Create large banner using ASCII printer295851995-08-07 11:46:19158.boxer130.exe53274002008-09-25 11:59:03159.boxer140.exeBOXER for Windows v14.0 - - Text Editor for Win9x-766326562010-03-04 13:09:44160.boxer75a.zip4191251997-07-21 10:00:58161.breeze56.zipBreeze v5.6 - Word processor and text editor3179821999-08-19 09:43:52162.brght092.zipScreen Bright v0.91beta - B&W Monitor brightness control70521998-07-09 11:02:59163.brkwin10.exeBrick for Windows v1.0 - Request/response program that displays all possible permutations from vocabulary of a given ARRAY OF CHARS4136902012-07-06 13:15:40164.brzwin15.zipBreeze for Windows v1.5 - Complete Text System for Windows14125531997-12-05 10:07:56165.bss150.zipBunch's String Search Utility v1.50469321996-08-15 10:29:46166.bszr15.zipBrowser Sizer v1.5 - Web developers helper6923972001-08-09 12:49:00167.btype20.zipBanana Type v2.0 - ANSI Viewer328751996-03-12 09:27:16168.bukvice.zipRussian Font Driver44681995-01-20 12:33:55169.burti600.zipBURTI - Latvian keyboard and EGA/VGA screen driver for DOS117181999-02-26 13:45:44170.bx60.zipBrief Extension Macro Package (BX) v6.01404831997-11-25 10:50:57171.bxos275c.zip4976721997-07-21 10:01:01172.byteb122.zipByteBoy'99 - Source File to MS-Excel Sheet Converter1096612000-04-04 11:14:12173.calbx148.msiCalibre v1.48.0 for Win64 - E-book manager618414082014-08-11 09:35:54174.calbx285.msiCalibre v2.85.1 for Win64 - E-book manager675389442017-05-13 16:56:51175.calbx348.msiCalibre v3.48.0 for Win64 - E-book manager700456962019-09-13 19:48:41176.calbx423.msiCalibre v4.23.0 for Win64 - E-book manager1237729282020-08-21 10:31:12177.calib148.msiCalibre v1.48.0 for Win32 - E-book manager564198402014-08-11 09:35:45178.calib285.msiCalibre v2.85.1 for Win32 - E-book manager623984642017-05-13 16:56:20179.calib348.msiCalibre v3.48.0 for Win32 - E-book manager640696322019-09-13 19:47:37180.calib423.msiCalibre v4.23.0 for Win32 - E-book manager1099366402020-08-21 10:28:31181.calvin23.zipCALVIN v2.3 - Clone of UNIX vi screen editor392211998-01-02 12:01:29182.castog60.zipCase Toggler v6.0 - Command line text converter128671999-07-27 12:47:43183.ccc.rarCCC v1.00 - Czech special codes convertor for DOS44691998-01-27 09:46:25184.ccdf.zipConvert comma-delimited data to columnar data768992001-07-19 10:01:54185.ccgrep.zipCCGrep for Windows 95/NT1443361996-07-16 12:19:34186.cclr311.zipClipClear v3.1.1 - Windows clipboard clear utility159041999-02-26 13:46:20187.ccmdr_i.zipColor Commander v1.1A plus - VGA color palette utils743761996-07-23 11:19:38188.ccp-23.zipChange Code Page - Win9x/NT util for Croatian char conversion334441999-09-27 09:14:53189.cdbf223e.zipCDBF v2.23 - DBF Viewer & Editor (the last 16-bit version)1179472001-03-06 08:37:14190.cdbfapi.zipCDBFAPI.DLL v1.15 - Set of functions for work with the files of DBF format904112002-04-29 15:27:56191.cdbfinfo.zipCDBFinfo v1.00 - Add-on to Windows Explorer1519572003-05-19 09:26:53192.cdbflbsd.zipCDBF Lite v1.03 for FreeBSD - DBF Viewer454292001-02-08 09:36:54193.cdbflcgi.zipCDBF Lite v1.14 for Linux (shared) - DBF Viewer531992001-11-20 09:00:13194.cdbflcgs.zipCDBF Lite v1.14 for Linux (static) - DBF Viewer1902862001-11-20 09:00:14195.cdbfldos.zipCDBF Lite v1.15 for DOS/32 - DBF Viewer1119752002-04-29 15:26:11196.cdbflos2.zipCDBF Lite v1.14 for OS/2 - DBF Viewer779892001-11-20 09:00:15197.cdbflrex.zipCDBF Lite v1.14 for OS/2 (DLL for REXX) - DBF Viewer859342001-11-20 09:00:15198.cdbflw32.zipCDBF Lite v1.15 for Win32 - DBF Viewer533692002-04-29 15:26:52199.cdbfshel.zipCDBFShell v1.01 - Add-on to Windows Explorer1952092003-05-19 09:27:49200.cdbfw.zipCDBF for Windows v2.40 (without installator) - DBF Viewer & Editor36180732016-12-17 13:50:27201.cdbfwgui.zipCDBF for Windows v2.40 (with installator) - DBF Viewer & Editor39387872016-12-17 13:50:23202.cdbf_dos.zipCDBF v2.99.02 for DOS/32 - DBF Viewer & Editor1904922002-12-09 11:55:33203.cdbf_lnx.tgzCDBF v2.99.02 for Linux - DBF Viewer & Editor1195022002-12-09 11:55:32204.cdbf_win.zipCDBF v2.99.02 for Win32 - DBF Viewer & Editor1189012002-12-09 11:55:33205.cdbook.zipCd-Book - CD-ROM booklet creator104081999-01-25 10:24:14206.cdboxp13.zipCD Box Labeler Pro for Win95/98/NT - Laberer program for CD Jewel Case & CD, Floppy & ZIP Labels20751882000-03-06 09:45:30207.ce363.zip364951997-09-04 11:42:44208.cekit20.zipCentral European Starter Kit v2.0 - Everything you need to use CE langs in Office, Web browsers and E-mail progs under Windows4449222000-02-16 09:38:13209.cfind22.zipCFIND v2.2 - Text Search Util222471995-10-05 11:34:54210.charw110.zipCharWatch v1.10 - Printer & Screen Character Manipulator104701997-03-03 09:50:40211.chenhu20.zipShareware Windows programs for Chinese language support7495691998-04-02 09:09:06212.chkdbf.rarDBF-file checker v1.4 for DOS534512000-02-22 11:31:36213.chkweb11.zipCheckWeb v1.1 - HTML links analyser457161997-11-18 10:40:02214.chm2wb91.zipchm2web v9.1 - HTML Help Conversion Utility10471852003-03-10 12:18:36215.chm30.zipCharmaper v3.0 - Utility for font character map viewing4252392003-01-28 11:08:49216.chmdecmp.exeCHM Decompiler v1.50 - CHM files decompilation tool10092972003-11-27 13:19:43217.chmpdf.zipCHM2PDF Pilot v2.00 - CHM to PDF conversion tool11723072006-05-29 08:42:49218.chmppro.zipCharacter Map Pro v1.81 for Win322374281999-11-02 13:49:52219.chrfrq23.zipCHRFRQ v2.3 - Count Character Frequencies in Text File92562000-03-10 10:11:13220.chrwks22.zipCharacter Workshop v2.2 for Windows3657911996-03-14 08:33:41221.chyfo171.zipChyfo v1.7.1 - ODBC-accessible database to text file converter for Win9x/NT/2000187052001-01-05 11:41:12222.cin-ct13.zipCinogen's Cool Text Convertor v1.13125231997-06-28 15:37:48223.ckd!106.zipCyrillic Keyboard Driver v1.0666951997-07-15 12:57:21224.clean102.zipCleaner v1.02 - Unwanted chars cleaner in a text pasted to clipboard1637261999-03-12 07:16:18225.clip11.zip101 Clippings - Allows to save text clippings for future use5230991997-07-21 10:01:06226.clip240.zipClipWatcher v2.40 - Clip trapper1069101996-10-02 12:25:30227.clip2txt.zipCLIP2TXT v1.0a - Copy the Windows Clipboard to a File337721999-02-03 11:10:05228.clipcase.zipClipCase - Text formatter in the system clipboard2728902000-02-16 09:39:33229.clipedit.zipClipEditor v2.5 - Windows clipboard manager382262000-02-01 11:56:32230.cliptx20.zipCliptext v2.0 - Access commonly used texts fast!1949171999-10-08 13:28:38231.cliptxt.zipClipTxt - Win95/98 program that stores texts and call them back via clipboard2461021999-06-10 08:44:02232.clipvu13.zipBlackboard Clipvu for Win95/NT - View/print/save the text in your clipboard6945631997-01-22 10:12:54233.clrizer.zipHTML Colorizer v1.0124091997-01-27 09:44:13234.cm32.zipCM32 v2.6.0.9 - Resident Foreign Characters Map for Win9x/NT436162002-01-07 12:07:21235.cnt500.zipCount v5.00 - Char, word and line counter in txt file205981995-08-07 11:46:25236.cntchrs.zipCount Characters - Character Counter by Funduc1098092002-03-07 10:39:08237.cnvrt11.zipConvert It v1.1 - Croatian national char set converter408571997-04-17 10:37:08238.cnvtxtwp.zipCNVTXTWP v1.1 - ASCII text file into a WP 5.1 converter579981998-01-27 09:40:39239.cod1_4.zipCodepage Translator v1.5 - Russian chars converter1811761999-01-22 11:21:19240.code39.zipCode39 TrueType Barcode Font v1.00169481998-01-12 12:10:09241.codedig2.zipCode Digger v2.0 - Text searcher for Win95/NT2819431997-11-11 08:46:16242.coder2.zipCyrillic Recoder for Win951221151999-03-12 12:36:10243.codeview.zipMihov Code Viewer - Text files / source code browser1641661999-03-17 06:44:23244.codrip10.zipCodeRip v1.0 - HTML source code ripper12853152003-06-11 11:12:20245.col.zipCOL v1.2 - A command to set colour and text screen size31531997-12-08 12:03:28246.color.zipThe Color Machine - HTML Color Picker v1.11818531999-01-26 10:48:39247.colpick.zipUtility to select HTML color codes in Hex293491997-12-17 08:33:59248.coltyp11.zipCOLTYP v1.1 - Hi-Color Text Typer677781996-05-30 09:35:41249.column.zipColumn-Row Guides v1.2 - Tool to adjustment of column or row data7095172002-03-18 11:57:21250.column23.zipCOLUMNS v2.3 - Text Column Layout And Page/Line Number Filter112262000-03-10 11:44:34251.col_prt9.zipPrint a text file in 2, 3 or 4 columns using compressed mode129961998-04-01 11:52:04252.combine.zipCOMBINE - Add on batchjob utility for Ralf Brown's Interrupt List99741997-07-15 12:57:21253.compv12.zipCompView - Text files viewer using compressed characters421812000-04-07 09:24:36254.conv11.zipConverter v1.1 - Text file conversion program for Windows4213581996-08-13 09:51:09255.convert.zipConvert - Russian codepage converter for Windows NT262171997-11-18 10:41:25256.convert2.zipConvert - Tool for converting UNIX text files (TXT,HTML) to Windows format1116101999-11-24 09:09:37257.converte.zipHTML Converter Macro v1.1 - HTML 2 Winword doc macro conv.86591996-08-26 13:59:37258.convr911.zipCONVERT v9.11 - Converts between data formats (DBF,ASCII...)1075941999-11-29 13:27:59259.convtx23.zipConvert v2.3 - Convert text formats (HTML,RTF,TXT) for Win163411996-08-05 15:21:26260.coolhtml.zipCoolHTML v1.5.1 - Web pages generator for Win95/98/Me3519912000-11-02 10:29:00261.copytext.zipCopyText v2.0 - Text copy to clipboard and Windows manipulator562962000-03-10 09:41:44262.copywrit.exeCopyWriter v3.01 for Win9x-XP - General purpose text editor6253742004-10-12 13:08:07263.country.zipCOUNTRY - Util to get/set DOS country settings528181997-07-15 12:57:24264.countryx.zipDavid Aylott's Country Database for MS Access1602771999-03-04 11:10:12265.courea13.zipCouch Reader v1.3 - Big Letter Displaying ASCII Texts811071996-04-18 13:14:18266.cp15en.zipCyberprinter v1.5 - Printing processes logging tool30322612004-08-17 11:29:40267.cp500.zipCut and paste v5.00 - capture part of screen to file173971995-08-07 11:46:26268.cpast221.zipCut and Paste in text mode255701996-04-29 08:38:12269.cpc202.zipCodePrint for C/C++ v2.02 - Source code reformatter/printer1418641996-08-28 11:06:54270.cpcheck.zipCode Page Identifier v0.542711997-06-10 12:40:25271.cpg27.exeCool Page v2.7 - HTML Editor for Win3229900402001-09-10 11:33:54272.cpi303.zipCPI v3.03 - Analyzer and extractor for DOS codepage files2091121997-07-15 12:57:25273.cpl20.zipConvPL v2.00 - Convertor of Polish national characters354291996-03-01 08:23:12274.crdtot10.zipCRD format to text converter v1.0 (in German)201771999-11-11 09:51:26275.cread217.zipRead v2.17 - A Text Browser570121996-05-29 10:20:36276.crmpvw10.zipCharMap Viewer v1.0 for Win32107852000-11-20 10:08:50277.crunchie.zipCrunchie v1.4.2 - HTML Compressor1047461997-10-01 14:18:33278.crvrt25.zipCRovert v2.5 - Croatian national char set converter568011997-04-17 10:37:08279.csdiff50.zip13758252005-04-02 10:51:34280.cse6.exeCSE HTML Validator Professional v6.00 - Tool to check validity of HTML syntax32727002003-06-09 13:42:11281.csfnt78.zipCrossFont v7.8 - Windows tool to convert MAC/PC fonts17136132020-09-01 21:07:18282.csrepl40.zipCriline Search and Replace - Text/binary files string replacer11249042005-08-15 11:40:03283.csrom.zipCSROM v1.21 - Shadow RAM Latin II / Kamenicky driver94691995-10-25 13:14:29284.csvcnv.zipAdvanced CSV Converter v5.15 for Windows23431692018-07-29 22:25:50285.csved255.exeCSVed v2.5.5 - Tool to view and manipulate CSV files22993832020-07-24 13:39:35286.csvpad12.zipCSVPad v1.2 - A portable CSV editor for Windows6776732015-06-22 12:29:23287.ctc.zipConnective Text Clipboard v1.1 - Util to store and reuse frequently used snippets of text2261151999-06-02 13:22:15288.ct_4.zipCT rel.4 - Character Toggler for Text Files64171998-12-01 10:56:56289.cut500.zipCUT v5.00 - Cut extracts sections of text by columns from file210871995-08-07 11:46:27290.cutwidth.zipCutWidth - Trims the width of text78091997-01-15 11:10:09291.cview300.zip393522000-10-25 11:16:58292.cyrkb30.zipCyrillic Keyboard v3.0 - Cyrillic Keyboard Layouts for Windows1101701997-09-16 09:04:00293.cyrkit40.zipCyrillic Starter Kit v4.0 - Cyrillic Fonts/Keyboard for Win95/NT/3.14654091999-03-12 14:47:46294.d2h101.zipDBF2HTML v1.01 - DBF to HTML Converter467392000-10-23 15:37:17295.daedit21.zipDaily Edit v2.1 - Text editor for Windows13379472001-09-25 11:00:50296.dataview.zipDATAVIEW v0.42 - ODBC Explorer, Commander and dBase III View/Edit for Win98-Vista4161832007-04-15 09:15:21297.davince.zipDaVince Tools v2.0 - Group of applications for Win9x/NT/2000 to create PDF files30795302002-03-19 14:13:59298.db2htm16.zipDBF2HTML Pro v1.0 - DBF 2 HTML Converter3060651998-04-27 10:06:49299.db2html.zipDb2Html v4.1b for Win32 - DBF to HTML Converter5538102000-10-31 12:50:14300.db3scn14.zipDB3SCN v1.4 - dBase III Screen Program or Format Generator247272000-03-10 12:38:23301.dbed1934.zipdBed Pro v1.93 beta4 - Russian DBF Viewer/Editor (NC-like)2056021999-02-11 09:40:18302.dbed20.zipTSE macro to edit dBase databases125621998-06-02 09:47:28303.dbf2dat.zipDBF2DAT v1.1 - DBASE files to TXT converter117782000-10-26 12:14:56304.dbf2dat2.zipDBF2DAT - DBF to text files convertor398232000-10-26 12:14:57305.dbf2txt.zipDBF2TXT Converter v6.1801172001-01-05 11:16:44306.dbfcnv.exeDBF Converter v1.10 - DBF to XML/CSV/HTML... format converter3870252006-02-20 14:36:31307.dbfcnv.zipDBF Converter v5.71 for Windows41821032018-12-01 09:29:46308.dbfix315.zipDBF Structure Fixer v3.15190431999-02-11 09:40:18309.dbfpck11.exeDBF View and DBF Creator for Win95 (in Croatian)898901999-11-24 09:21:59310.dbfrec.zipDBF Recovery v2.47.2 for Windows6578532009-09-21 18:38:41311.dbfv2_33.zipDBFVIEW v2.33 - Database viewer and editor for DOS295952000-02-28 12:08:02312.dbfview.exeDBFViewer 2000 v7.35.1 for Windows97348882020-08-19 18:40:43313.dbfview1.zipDbfView v1.04 for Win95/985017812000-10-31 15:00:47314.dbfview5.zipMulti DBF Viewer for Windows v5.0428272000-10-19 10:42:34315.dbf_conv.arjDBF File Converter from Kamenicky to Windows character set580531997-11-24 10:26:00316.dbf_view.zipDBVIEW v0.22 - DBASE III files viewer/editor for Win9x/NT824002005-01-10 10:16:16317.dbldbl12.zipDOUBLE v1.2 - Text File Comparator98221997-04-21 10:34:13318.dbm113c.zipDBM v1.13c - Database Manager for DOS3557442000-10-27 09:40:03319.dbt111.zipdTAB v1.11 - Makes ASCII report from DBF file168711997-11-26 12:48:10320.dbview.zipDBVIEW v1.21 - DBF viewer for Total Commander file manager1330442002-10-15 10:46:29321.dbviewer.zipDBViewer - Database Viewer / Editor for Windows16067841998-03-24 11:18:18322.dbviewsm.zipDBView SM v1.5 - Russian DBF Viewer577431996-06-25 12:01:11323.dc054dos.zipUniversal Russian Codepage DeCoder v0.54c for DOS787781999-03-25 14:34:12324.dc054win.zipUniversal Russian Codepage DeCoder v0.54c for Win9x/NT626031999-03-25 14:34:19325.dconvert.zipDataFile Converter v2.0 - DBF/Access/Datafile format converter4159961999-02-26 13:49:18326.dcrit95.zipDiacrit v2.0 - Win95 util for access to accented characters3036171998-04-01 11:52:10327.de-html.zipD-HTML - HTML 2 Text Converter for DOS160651996-08-30 08:43:40328.decode.zipCyrilics char-set converter180781996-05-31 10:14:47329.dedup11.zipDEDUP v1.1 - Duplicate lines remover297881997-12-10 09:20:56330.dedupe13.zipRemoves Duplicate Lines Anywhere178502000-09-04 13:41:51331.dejava.zipDeJAVA - Byte code files disassembler397561996-09-30 12:37:20332.desknote.zipCS Desktop Notes for Win95/98/NT275131998-10-27 07:16:20333.detagger.zipDe-tagger v1.0 - HTML to text convertor9205782002-08-30 11:03:26334.dfc.zipDOS Fine Colors - Palette Editor48081996-03-19 08:26:15335.dfprn.exeDefPrin v1.71 - Tool for checking the default printer4775442004-06-15 09:45:46336.dg52.zipData-Grep rel.52 - UNIX-like extended GREP utility1273321997-03-24 11:27:49337.dheedt18.zipDHE v1.8 - The Web Code Editor for Win3221593962004-09-10 10:25:59338.dida172.zipDiDa v1.72 - HTML Editor3327451996-10-25 08:24:13339.didapro.zipDiDaPro v2.50 - HTML Editor for Win324887492000-10-25 13:48:15340.dipro32.zipDiDaPro v2.50a - HTML Editor for Win164888212000-10-25 13:48:18341.dirdb14i.zipDisplays info about DBF files95661995-10-04 09:39:04342.dirhtml.zipDirhtml v4.57 - Crates index.html file from a directory list4985632003-06-09 11:36:08343.diz10.zipDIZ v1.0 - File_id.diz Viewer68521997-04-16 10:34:14344.diz100.zipDizMaker v1.00 - FILE_ID.DIZ Editor1515721997-04-07 10:15:53345.diz2exe.zipDIZ2EXE for Win95/98/NT v1.0 - Screen page text file to EXE converter117801999-01-08 10:54:25346.dizdir30.zipDIZDIR v3.0b - Creates file listings from DIZ in archives716441996-07-16 12:19:47347.dized50c.zipDIZEDIT v5.0c - DIZ file editor1236691996-07-15 12:37:57348.dizrvd15.zipDizRevue for DOS v1.50 - Vendinfo.Diz file viewer2446601997-09-18 11:21:32349.djvuvwer.exeDjVu Viewer - Small .djvu file reader for Windows19256862017-06-11 11:34:50350.dl103.zipDouble Lister v1.03 - File Viewer for DOS182292000-10-25 11:33:25351.dls017.zipDuplicate (tag)line stripper v0.1797951996-08-15 10:30:06352.dn11301.zipDana Text Editor v1.13 for Win3211108712000-10-25 13:54:51353.dnot19.zipNotGNU v1.9 - Text editor1624281996-08-05 15:21:28354.doc2html.zipDOC 2 HTML Converter (VB macro written)877141999-03-17 06:38:07355.doc2txt.zipSlice MS Word/Excel/PowerPoint documents24691999-09-23 13:49:10356.docc210.zipDoc Compiler v2.1 - Gathers picture files into a html document1584672000-10-05 11:59:19357.docempty.zipDocEmpty - Clears documents folder in Win95 start menu140021997-07-17 09:35:12358.docmech.zipDocMechanic v2.0 - Tool to recover damaged Word documents8719542007-09-11 13:01:44359.docpdf.zipDocument 2 PDF Pilot v1.2 - TXT/RTF/HTML/DOC/... to PDF format converter25219232003-11-05 12:04:13360.docretrv.zipDocument Retrieval for Win9x/NT - Text in indexed files finder1806111999-03-12 07:37:18361.docv52.zip16262271997-04-22 09:51:43362.docvu31.zip3423251997-04-07 10:17:14363.dosappfn.zipEnhanced DOS application fonts for Windows251021998-09-03 13:04:10364.doscli30.zipDOS Clip - Clipboard for DOS exp/imp to Win147081998-03-24 13:43:56365.dosclr15.zipDOS prompt color changer46541995-12-15 08:41:33366.doscvt27.zipDOS Converter v2.7 - DOS/UNIX text file converter198941995-01-20 12:34:27367.dosfon.zipDOSFON - New DOS Fonts for Windows188371998-06-30 10:14:32368.dosft220.zipDOSFONT v2.20 - DOS font changer2080771996-05-02 12:09:46369.dospdf.zipDOSPDF v0.11 - Set of utilities to read PDF files under DOS20594322007-10-26 10:42:29370.dosprint.zipDOSPrint v3.3 - Epson matrix printer emulator under Windows1747292006-07-24 09:23:02371.dosprn.exeDOSPRN v1.85 - Program enabling to print from DOS apps under Windows16618832016-11-10 10:47:16372.dosrus.zipRussian Font Driver / Recoder for DOS91061998-04-07 09:04:25373.dos_font.zipDosFont v2.0 - Custom Font Driver129941996-02-23 11:20:10374.double17.zipDouble v1.7 - Text File Comparing Utility191022001-07-02 11:31:01375.dox200d.zipDOX v2.00 - RTF/TXT/HTML Converter for DOS267841999-03-01 08:25:58376.dragvu13.zip5520911996-01-01 08:37:10377.drform33.zip7030131997-02-12 09:54:17378.drgtxt20.zipDragText v2.0 - Drag and drop text utility2374591997-01-03 10:49:30379.drops.zipDROPS - Int1c Resident for Character Falling Effect with src18201997-11-07 12:48:43380.drume21.zipDRUME v2.1 - Data recovery util for MS Excel files12188181999-11-10 09:46:27381.dsfonts.zipCollection of DOS fonts417531996-02-06 09:04:46382.dskjet10.zipDeskjet v1.0 - Lets you find which ink nozzles are congested142872000-10-11 13:09:20383.dsr10.zipDuplicate String Remover v1.0 - UTil that removes duplicate strings (lines) in a long list of strings2898361999-03-17 06:43:22384.dtamas33.zipData Master v3.3 - dBase files Editor3649161997-01-27 12:10:20385.dtb500.zipDETAB v5.00 - Converts tabs to spaces229481995-08-07 11:46:29386.dtfl202.zipData File v2.02 - Software to create form & database apps30678741999-02-26 13:49:34387.dtnotes.zipdtNotes v3.0 - Virtual post-it notes1946572004-05-27 11:26:19388.dublk10.zipDupBlock v1.0 - Text duplication tool for Win321971212002-03-07 10:40:10389.dupli.zipDupli Find v1.1 - Duplicate lines in text files searching util166491999-11-03 12:29:59390.dv95.exe20185091999-08-09 11:40:36391.dw1212.exe2824551997-09-08 08:31:54392.dwhtml20.zipDarekWare HTML Author v2.0 - HTML Editor644171996-01-30 09:30:29393.dxl31.zip20467951997-07-14 13:48:31394.dxl95111.zip21167961997-07-14 13:48:38395.dz2csv15.zipDIZ2CSV v1.50 - VENDINFO-to-database Converter829611998-05-13 10:42:35396.dzperl58.exeDzSoft Perl Editor v5.8 - Perl CGI scripts editor for Win3218761362007-10-17 10:29:44397.dzphp42.exeDzSoft PHP Editor v4.2 - PHP language editor for Win3232431922009-09-16 09:03:42398.easybk26.zipEasyBook v2.6 - The Electronic Book Creator3898761996-10-15 09:07:01399.easycsss.zipEasy CSS Scroller for Win329815582002-08-23 12:59:59400.easyh130.zipEasy Home Page v1.3 - HTML editor for Windows1372931998-03-24 13:40:22401.easyhtml.zipEasy As HTML for Win95 - HTML editor158051998-03-24 13:40:22402.easypdf.exeEasy PDF - WYSIWYG PDF editor for Win9x/Me/NT/200047799182001-06-29 09:48:13403.easytype.zipEasyType v1.3 - Windows util that automatically complete words when writing texts in any text editor11085052002-01-07 14:44:22404.easywr30.zipEasyWrite v3.0 - Simple freeware word processor for Win322905172001-06-25 09:21:37405.ebookmrk.zipElectronic Bookmark - Tool to trace the page number of an electronic book457372004-01-22 10:40:46406.ecm.zipExtended Character Map v1.41 - Char map software for Win9x/NT1945831999-01-13 09:58:11407.ecopad26.zip2232201996-04-29 08:38:37408.ecpd324a.zip9557161998-03-12 12:12:39409.ed2516.zip2299961998-03-24 13:40:27410.eda351ed.zipEDA v3.51 - Large ASCII Files Editor2148271996-11-19 09:21:36411.edit12.zipEdit! v1.2 - Text editor for DOS1024842001-03-30 09:31:59412.edit44.zipSwift Programmers Editor v4.4 for NC/VC225911998-04-07 09:04:17413.editd25.zipEDITD v2.5 - Text file editor for Windows3811951999-03-24 07:09:01414.editeu53.zip23969942005-04-26 10:53:01415.editor.zipFancy Editor v1.0 - Fast text editor for Win951815261999-02-19 10:07:01416.editp157.zipEditPro v1.57 - Win9x/Me/NT/2000 Text Editor for Professionals9713452003-01-17 15:41:03417.editpad.zipEditPad v3.x - Windows NotePad Replacement2995731999-10-29 09:18:52418.editv41u.zipEDITV v4.1 - Text file editor with Borland Turbo Vision1848711999-06-17 08:58:56419.edp401.zipDOS Text Editor v4.01 from Croatia508631998-03-20 12:20:09420.edthtm12.zipEdithtml.inf for Win95 v1.2 - Adds Edit function to the right click menu of an HTML file20701998-10-16 10:48:24421.edtlw320.zipEDTECH Editor for Technical Graphics v3.2 for Win95/98/NT8034351999-11-17 09:44:20422.efontd20.zipEasy Fonts v2.0 for DOS - Any to CHR font format converter951522005-06-10 14:45:39423.efontw30.zipEasy Fonts v3.0 for Win - TrueType Fonts to CHR font converter265252005-06-10 14:45:39424.ehtml.exeEnhanced HTML v4.4.70 - Full featured WYSIWYG web pages editor with built-in FTP client for Win98-XP76522902002-09-04 12:39:19425.eject13.zipEJECT v1.3 - Sends Form Feed Char to LPT1 Printer34352000-03-10 10:15:21426.elp_100.zipEasy Label Printer v1.0 - Envelope labels printing tool987392004-09-06 14:31:35427.em4w121.zipE-Mage for Web v1.2 - Image galleries generator8743092003-05-30 10:03:04428.emp079c.zipEmpathy ANSI Editor v0.79 pre705691999-04-12 08:44:46429.enhnp11.zipEnhanced Notepad v1.1313481998-10-28 10:58:28430.enh_5_7.zipEnhanced Font Driver v5.7- Russian, Ukr. etc. font drivers1070941998-06-02 09:47:29431.env416.zipEnvelopes Plus v4.16 - Envelopes and labels printing program1293301996-10-11 08:53:10432.envelp60.zipEnvelope Printer v6.0 for Win9x/NT/20001238252001-08-20 12:50:00433.envelwiz.zipEnvelope Wizard - Util for envelopes printing2161262001-05-11 11:16:54434.envpnt.zipEnvelope Printer for Win376151998-03-24 13:40:28435.eoedit.zipEoEdit v0.98 - Windows Text Editor20267262000-02-25 11:58:17436.eol.zipChange End-Of-Line marks (DOS/UNIX text converter)47301997-10-20 10:12:20437.ep34.exeEasyPad v3.4 - Czech shareware HTML Editor for Win95/NT15291712000-11-02 09:31:55438.epp212.exeEditPlus Text Editor v2.12 for HTML, ASP, Perl, C/C++ and Java10905602004-05-17 10:06:56439.epp500.exeEditPlus Text Editor v5.00 for HTML, CSS, PHP, ASP, Perl, C/C++, Java, JavaScript and VBScript (32-bit)20487042018-03-26 13:08:42440.eppx500.exeEditPlus Text Editor v5.00 for HTML, CSS, PHP, ASP, Perl, C/C++, Java, JavaScript and VBScript (64-bit)22833042018-03-26 13:08:49441.epson10.zipEPSON printer codes from an input file to PS converter458371998-01-02 12:01:31442.epstl308.zip
Источник: [https://torrent-igruha.org/3551-portal.html]
, UEStudio 05.10 serial key or number

Activating your license key

You can activate UltraEdit / UEStudio and unlock trial mode by entereing your license ID and password into the activation dialog. (You receive your license ID and password via email after placing a successful order online, over the phone, or via purchase order.)

You can access the activation dialog by any of the following methods:

  • By clicking the "Enter license key" button in the trial dialog
  • By clicking the "Enter license key" option in the File menu
  • By clicking the "Enter license key" option in the "Support" drop down menu

An Internet connection is required to activate your license. If you do not have an Internet connection and need an offline activation, you must contact IDM support to obtain offline activation codes.

After entering your license ID and password, click the Activate button to finalize the activation and unlock trial mode. After your license ID and password have been validated, you should see a dialog indicating that the activation was successful:

Please note: If you purchased an IDM All Access subscription license, you will only need to activate your license one time. Once one IDM application has been activated on the system with the All Access license, all other IDM applications on that system will be automatically activated as well.

If necessary, click the Support options button and then the Proxy button to input proxy server information. For most users this should not be necessary as all IDM applications will use the proxy settings specified for Internet Explorer, if configured, on the system.

Offline activation

If online activation is not possible because there is no Internet connection available, you will need to use the offline activation dialog to register. To access the offline activation options, press Ctrl + Shift, then click the Activate button in the Activation dialog. This will open the offline activation dialog as shown below.

The License ID and Password fields must be entered as provided in your license email. The User Code 1 and User Code 2 fields will be pre-populated with numeric values. You must call or email this information to support@ultraedit.com in an email, and we will reply with the value to enter into the Authorization Code 1 field.

Please note: If any values other than those provided by IDM Computer Solutions, Inc. are entered here, this will cause the values in the user code fields to be recalculated the next time the offline activation dialog is opened. Please do not enter any values except those provided by our support team.

Источник: [https://torrent-igruha.org/3551-portal.html]
UEStudio 05.10 serial key or number

WO2002093399A1 - Managing a remote device - Google Patents

MANAGING A REMOTE DEVICE TECHNICAL FIELD

This invention relates to managing a remote device, including obtaining data from the remote device and presenting the data to a client device. BACKGROUND

Today's rapidly changing information technology (IT) environment has created significant obstacles, or "pain points" for corporate IT managers worldwide. Corporations and their IT departments are faced with the daunting task of managing the sheer growth in the size and complexity of their internal and external networks, as well as the rapid integration of new Web-based applications with legacy systems. This creates the necessity of highly trained and specialized IT staff, to have the necessary intelligence to manage so many different systems that make up the internal and external network. When combined with an overall shortage of IT talent in the marketplace, more cautious IT spending, and a generally insufficient level of specialized training within existing IT staffs, the need for scalable third party management solutions has become urgent.

Third party management solutions can sometimes bring more problems than solutions. The implementation cycle associated with management tools are huge. The costs associated are also more than many IT departments had planned. When combined with the need for specialized team to work the third party tools, IT departments need to look elsewhere, creating a need for outsourced IT management services, which can deliver a continuous automated IT management solution, using the Internet, for example. Firewalls and other internal network security systems can prevent third party remote access to data stored in devices on an internal network. This can be problematic, particularly for network administrators who cannot access the internal network, but who need to obtain information about one or more devices on the internal network. Systems currently exist which allow such a device to send pre-selected status information to a remote device via electronic mail (e-mail). These existing systems, however, do not provide enough flexibility for some users.

SUMMARY In general, in one aspect, the invention is directed to obtaining data from a device using an agent. This aspect includes receiving a plug-in containing system calls for obtaining the data from the device, loading the plug-in into the agent, obtaining the data from the device using the system calls, and transmitting the data over an external network using one or more of a plurality of protocols. This aspect may include one or more of the following features. The agent may include shared libraries containing system calls for obtaining other data from the device. The shared libraries may be loaded into the agent when the plug-in is loaded. The data may be obtained from the device periodically, such as every minute. The plurality of protocols may include simple mail transfer protocol (SMTP), hyper text transfer protocol (HTTP), and secure sockets layer (SSL) protocol. Data transmission may be effected using at least one of a proxy and socket.

The agent may reside on an internal network that includes the device. A machine may be selected on the internal network to transmit the data over the external network. The external network may include the Internet. The agent may reside on the device. The agent may reside on a machine located on the internal network that is not the device. The network may include a network device located on the internal network and the agent may reside on a server that is also on the internal network. The data may relate to one or more of the following: a processor on the device, memory on the device, a hard drive on the device, the internal network on which the device is located, and software installed on the device.

In general, in another aspect, the invention is directed to providing, to a client, data that was obtained by an agent from a remote device on an internal network. This aspect includes receiving the data via an external network, at least some of the data being received periodically, formatting the data, and making the formatted data accessible to a client via the external network. This aspect may include one or more of the following features.

Formatting the data may include generating a report based on the data. The report may be a natural language report. Formatting the data may include generating a display based on the data and updating the display periodically as new data is received periodically via the external network. The data may be received every minute. Formatting the data may include determining if the data indicates that an operational parameter of the device exceeds a preset limit and generating a report to a client indicating that the operational parameter exceeds the preset limit.

The external network may include the Internet. Making the formatted data accessible to the client may include providing a World Wide Web site through which the data can be accessed by the client. The formatted data may be made accessible to the client using wireless application protocol.

In another general aspect of the invention, a method includes automatically and repeatedly collecting data indicative of an operating state of a machine, and automatically transmitting information related to the collected data to a location remote from the machine. The information is transmitted in the form of electronic mail messages complying with a standard electronic mail messaging protocol, such as a Simple Mail Transfer Protocol. h another general aspect of the invention, an article comprising a machine- readable medium on which are tangibly stored machine-executable instructions for monitoring a computer, includes instructions operable to cause a processor to perform the method of the first general aspect of the invention.

Embodiments of the invention may include one or more of the following features. A monitoring computer receives the electronic mail messages and analyzes the information to derive performance measures. The monitoring computer generates a report embodying the performance measures and makes the report available electronically, for example, from a web site. The report includes a natural language document expressed in a natural language format.

The machine may be a network server, a desktop computer, or an intelligent appliance. The data collected includes a time-ordered sequence of performance measurements taken at fixed time intervals. The collected data, for example, include measurements of CPU usage, process queue length, memory usage, memory paging rate, disk usage, network usage, paging space occupancy, file system occupancy, and process resource usage. The collected data are typically collected from a registry, a system call, a virtual file system, a virtual device, or an input/output control call to a device. The information related to the collected data is compressed and encrypted for inclusion in the electronic mail message.

In another general aspect of the invention, a method includes automatically and repeatedly receiving electronic mail messages that include information related to remotely collected data. The collected data are indicative of a performance of a machine and the electronic mail messages comply with a standard electronic mail messaging protocol. The method also includes automatically analyzing the information to determine the performance of the machine.

In yet another general aspect of the invention, an article comprising a machine- readable medium on which are tangibly stored machine-executable instructions for monitoring a remote machine includes instructions operable to cause a machine to perform the method of the third general aspect of the invention.

Embodiments of the invention may include one or more the following features. The information related to the remotely collected data is extracted from the electronic mail messages. The collected data is a time ordered sequence of performance measurements and analyzing the collected data includes comparing at least some of the performance measurements with a corresponding threshold value to determine whether the performance measurements are within a range of acceptable values. The analysis also includes determining the number of performance measurements that are within the range of acceptable values.

A natural language report is generated by selecting items of information to be added to the report based on the analysis of the information included in the email messages. The items of information are, for example, selected based on the comparison of the performance measurements to the threshold values or based on the number of performance measurements that are within the range of acceptable values. The natural language report typical includes a natural language sentence or a graphical display. The natural language sentence may include a measurement value or a threshold value. Part of the natural language sentence is sometimes enhanced, for example, using bold typeface, italicized typeface, colored typeface, underlining, or a different font size from the rest of the sentence to draw attention to the sentence. The natural language sentence includes a hyperlink to more detailed information about a section of the sequence of performance measurements. An electronic mail message that includes the report is generated and transmitted over a network.

Other features and advantages of the invention will be apparent from the following description and from the claims.

DESCRIPTION OF THE DRAWINGS Fig. 1 is a view of a network that includes an internal network having devices to be monitored by an agent. Figs. 2 to 9 and 28 to 41 show installation screens for the agent, including the relay portion of the agent.

Fig. 10 is a flowchart showing a process for monitoring a device on the internal network. Fig. 11 is a flowchart showing a process for providing data from a monitored device to a user.

Figs. 12 to 26 show Web pages for viewing the data from the monitored device.

Fig. 27 shows a computer on which the processes of Figs. 10 and/or 11 may be implemented. Figs. 42 to 51 shows a cellular telephone for viewing data obtained by the agent.

Figs. 52a, 52b and 53 show Web pages for enrolling in a service in order to download the agent.

FIG. 54 shows a system for monitoring a server;

FIG. 55 A is a table of sampling periods; FIG. 55B is a table of sources of data indicative of an operating state;

FIG. 55C shows kinds of data collected;

FIG. 55D shows data contained within a rule for analyzing data;

FIG. 56 is a flow chart of the process of collecting data from the server;

FIG. 57 is a flow chart of the process of transmitting the collected data; FIG. 58 is a flow chart of the process of analyzing the collected data and generating a report;

FIG. 59 is a block diagram of the structure of a report; FIG. 60 is a flow chart of the process of installing agent software; and FIGS. 61-91 are screenshots of the process of FIG. 60.

DESCRIPTION Fig. 1 shows a network system 10. Network system 10 includes an internal network, such as a local area network (LAN), and an external network, such as the

Internet. Internal network 11 is segregated from external network 12 via a firewall 14. Firewall 14 allows messages, such as e-mail, to be exchanged between devices (e.g., computers) on internal network 11 and external network 12. However, firewall 14 does not permit devices on external network 12 to directly access data stored on internal network 11.

Internal network 11 contains several devices. These devices may be computers with network interface cards, including servers and desktop computers, and/or network peripherals, such as routers, hubs or switches. Internal network 11 includes three desktop computers 16, 17 and 19, server 20, router 13 and switch 18. Other devices may also be included in addition to, or instead of, these devices.

External network 12 contains a server 21, which has access to a database 22. hi this embodiment, server 21 is one or more World Wide Web (or simply "Web") servers that are capable of receiving data, storing the data in database 22, processing the data, and hosting a Web site that makes the processed data accessible to client devices, directly or indirectly via the Internet. The details of the processing performed by server 21 and the

Web site hosted by server 21 are provided below. A computer program, known as an "agent", is installed on a device, such as computer 19, on internal network 11. The agent permits a remote client device to manage computer 19 and to monitor computer 19 and other devices on internal network 11. This is done through the use of communications provided from the agent to server 21. The communications may be transmitted via e-mail using simple mail transfer protocol (SMTP), hyper text transfer protocol (HTTP) or secure sockets layer (SSL) protocol. SSL is a protocol developed by Netscape® for transmitting private documents over the Internet. SSL works by using a public key to encrypt data that is transferred over an established SSL connection. Additionally, the communications might have to have additional provisions for crossing through a firewall, such as supporting authenticated proxies and the like. More than one agent may be installed on a single network.

Each agent 24 is comprised of three core software components: an engine 25, one or more plug-ins 26, and a relay 27. These core components may run on the same device or on different devices. Here, engine 25 and plug-ins 26 run on computer 19 and relay 22 runs on server 20. Plug-ins 26 are installable computer programs that are responsible for collecting the state of hardware, operating systems and/or applications, in a device that is being managed/monitored by agent 24. Examples of operating systems that may be managed/monitored include, but are not limited to, the Microsoft® Windows® family (Intel 8086-like hardware platform), including NT4® (Workstation, Server, Terminal Server), Windows2000® (Professional, Server, Advanced Server) Windows9x® (95(all versions), 98 (all versions) and ME(Millennium), and Linux versions kernel 2.2, 2.4 (RedHat 6.2 and above, Conectiva 6.0 and above).

The plug-ins constitute shared libraries containing system calls for collecting data from a device. Engine 25 is a computer program that is responsible for controlling plug- ins 26, grouping the collected data and sending the data to relay 27 using, e.g., transmission control protocol/internet protocol (TCP/IP). Relay 27 is a computer program that is responsible for sending the collected data to server 21 over the Internet (or, more generally, external network) via, e.g., SMTP, HTTP or SSL. Relay 27 need not be installed in all computers on internal network 11. A client can choose to install relay 27 on a single computer on internal network 11 with Internet access and direct all agents running on internal network 11 to send data to that one relay, which will then send the data to server 21.

Agent 24 may be installed on the device to be monitored, as is the case here, or it may be stored on another devices (e.g., a server) on the same internal network as the device to monitored (which is the case for network peripherals management). During the installation process, relay 27 is configured to permit functions such as sending and receiving messages using e-mail or HTTP or SSL. Engine 25 is then executed. After engine 25 is executed for the first time, it calls all the installed plug-ins and reads configuration information contained therein. Engine 25 creates a schedule to call the plug-ins at periodic time intervals. Once engine 25 is up and running, engine 25 will, at the time intervals, call the plug-ins. For example, a plug-in can be scheduled to execute every minute, every 5 minutes, and so on. After each plug-in executes, the plug-in returns data that it collected to engine 25.

In this embodiment, the following plugs-ins are available, although other plug-ins may be used instead of, or in addition, to the following. "Sysinfo" collects information regarding the configuration of the entire system from the point of view of the system's operating system. "Vmstat" collects information regarding the CPU usage and memory usage of the computer system where the plug-in is installed. "lostat" collects information regarding the disk I/O usage of the computer system where the plug-in is installed. "Netstat" collects information regarding the network statistics of the computer system where the plug-in is installed. "Fsinfo" collects information regarding the file system of the computer system where the plug-in is installed. "Psinfo" collects information regarding the processes that are miming on the computer system where the plug-in is installed. "Swpinfo" collects information regarding the swap area of the computer system where the plug-in is installed. "Lvminfo" collects information regarding the logical volume manager of the computer system where the plug-in is installed. "SQL Server", where "SQL" stands for "Structured Query Language", collects information regarding the state of a Microsoft® SQL SERVER 2000® database server on internal network 11. The "SQL SERVER plug-in" collects data that enables server 21 to generate a detailed report regarding the configuration, performance, etc. of the SQL SERVER 2000® database server. "Network" collects information from network devices that are connected to internal network 11, i.e., devices that are not physically part of the device on which agent resides, but are in the same internal network. "Oracle" plug-in collects information regarding the state of an Oracle® database server on internal network 11. The Oracle plug-in collects data that enables server 21 to generate a report regarding the configuration, performance, etc. of the Oracle® database server.

Engine 25 receives the collected data from plug-ins 26 and stores the collected data in a file in a binary and, in this case, proprietary format. Engine 25 compresses the file using a compression technique, such as the BZ2 compression method. Engine 25 sends the compressed data to the relay, which is responsible for encrypting the data.

Relay 27 receives data collected by one or more agents on internal network 11, encrypts the data, and sends the data through the Internet to server 21, where the data is analyzed. Relay 27 can run in a device other than the monitored (shown) device and can receive connections from more than one agent simultaneously. The relay's connection to the internet may be dial-up or permanent and may support SMPT, HTTP and/or SSL. In addition, the relay supports proxies and SOCKS (Windows® sockets), making it easier for outbound connections to go through firewalls. In this embodiment, relay 27 uses two methods of encryption. The encryption method that relay 27 selects corresponds to the transfer protocol that relay 27 uses to send the data to server 21. If SSL is used to transfer the data, relay 27 uses the encryption method that is available from the OpenSSL library, hi this embodiment, SSL version 3/Transport Layer Security (TLS) version 1 with Rivest, Shamir, and Adelman (RSA), Triple Data Encryption Standard (3DES) is used with a key of 128. RSA is a public-key encryption process developed by RSA Data Security, Inc. The RSA process is based on that fact that there is no efficient way to factor very large numbers. Deducing an RSA key, therefore, requires large amounts of computer processing power and time. The RSA process has become the de facto standard for industrial-strength encryption. DES is a popular symmetric-key encryption method that uses a 56-bit key.

If SMTP or HTTP are used to transfer the data, relay 27 encrypts the data using the sapphire, symmetrical, encryption process, in which the key used is a session key. This means that the key will only be used once. The key used is 128 bits. The server needs this key for decryption. Therefore, relay 27 uses the RSA, asymmetrical, encryption process to encrypt the key using a 1024 bits key.

Server 21 includes a computer program 29 to receive the encrypted and compressed data from agent 24, decrypt and decompress the data, and store the data in a database 22. Database 22 may be part of, or external to, server 21. Computer program 29 also retrieves the data from database 22 and presents the data to a client 30. Computer program 29 may include a Web server module, which formats the data and makes the data accessible as a Web page or even a WAP (Wireless Application Protocol) page. The formatting may also include generating a report in Adobe PDF format or using Java applets for displaying real-time graphics of data collected by the agents. An additional form of communicating information being collected by the agents that can be employed by server 21 is notifications. Notification are "real time" alerts sent every time a certain event happens (such as a threshold being exceeded) to portable communication devices such as cellular phones, pagers, etc. In this context, real-time is defined roughly by the data sampling rate of the agent and any delays associated with data transmission. The notification process may operate as follows. The user can specify occurrences that prompt a notification and the necessary configuration. For example, the user can be notified in response to changes in CPU usage, memory usage, disk VO, network I/O, file system/logical drive utilization, and the status of a process. For CPU usage, memory usage, disk I/O, network I/O, file system/logical drive utilization, the user configures a high point and a low point, e.g., CPU Utilization has the high point set to 80% and low point to 50%. The following scenarios may occur: (1) The user has the high point flag set to false and the value is below the high point. (2) The value reaches the high point and the flag is set to false. In this case the user receives the form of notification chosen and the high point flag is set to true. (3) The value is above the high point and the high point flag is true. Nothing is done here, since the user has already been notified. (4) The value is below the high point, above the low point and the high point flag is true. Nothing is done here. (5) The value is below the low point and the high point flag is true. The user is notified that it reached the low point and the high point flag is false

Notifications in response to the status of a process status function analogously. The user provides the name of the processes to be monitored. A user is notified once when the process stops running and receives a notification when the process starts running again. Generally speaking, only the resources the user has chosen are verified. Computer program 29 also analyzes the data collected from a device (e.g., device

19) in order to produce a natural language and conclusive report. In this context, the term "natural language" means a human-readable format that can be presented and understood by, e.g., a network administrator or the like. Computer program 29 generates the reports according to a rule-based system. For each of the reports there are sets of rules that determine what goes in the report.

In this embodiment, computer program 29 includes the following software modules (called "wizards") for generating different types of reports. Performance Wizard Service delivered through the Internet analyzes the foregoing performance of computational servers and presents results by means of conclusive, natural language reports. Consolidated Performance Wizard Service delivered through the Internet analyzes the foregoing performance of a group of computational servers, as a whole, and presents the results by means of conclusive, natural language reports. Capacity Wizard Service delivered through the Internet infers the future performance behavior of computational servers, studies possible upgrades, and presents results by means of conclusive, natural language reports. Consolidated Capacity Wizard Service delivered through the Internet infers the future performance of a group of computational servers, as a whole, and possible upgrades, and presents the results by means of conclusive, natural language reports. Real Time Monitoring (RTM) Service delivered tlirough the Internet shows, via an Internet browser or WAP (Wireless Application Protocol)-enabled device (such as a mobile phones or notepad), the updated status of the computational resources (such as memory usage, CPU usage, disk usage and network interface usage) of a computer. The service can also send alerts by WAP, SMS (Short Message System), e- mail or similar electronic communication channels whenever the consumption of each computational resource exceed pre-defined thresholds. The RTM Wizard service generates real-time graphical displays of data from an agent monitoring a device on internal network 11. Asset Wizard Service delivered through the Internet collects, keeps and analyzes information about computer hardware and software components such as hardware internal configuration, operating system version, installed software and upgrade history. Oracle Wizard Service delivered through the Internet analyzes the foregoing performance behavior of an Oracle © database and presents the results by means of conclusive, natural language reports. SQL Server Wizard Service delivered through the Internet analyzes the foregoing performance behavior of a Microsoft SQL Server © database and presents the results by means of conclusive, natural language reports. The rules used by computer program 29 are static and configurable in terms of thresholds and tolerances. This means that the addition of new rules requires adding or changing existing code in computer program 29, while changing the criteria of existing rules does not require such a change. Thresholds define a level, for a given resource consumption variable, above wliich, resource usage is considered critical. For instance, with computer processing units (CPUs), a threshold value is 75% utilization. Tolerances define for what percentage of an analyzed period a threshold was exceeded. Exceeding a threshold may not indicate a problem, unless the threshold is exceeded for a certain amount of time.

There are four combinations of situations involving thresholds and tolerances: (1) a threshold was never exceeded, (2) a threshold was exceeded for a period of time below tolerance, (3) a threshold was exceeded for a period of time above tolerance, and (4) a threshold was exceeded all the time. Different text may be provided (e.g., displayed) in a report for each of these four situations, for every resource variable being analyzed, and for every language supported.

Prior to operation, agent(s) (including engine, relay and plug-ins) are installed on computers of internal network 11. Installation may be perfonned by downloading the agent software from a Web site. An agent may be downloaded and installed for each type of platform on the internal network, e.g., Linux, Windows2000, etc. The agent is installed on each device to be monitored and in each device that is to act as a relay for internal network 11. A user, such as a network administrator, identifies himself (e.g., by e-mail address) and selects desired installation options. The agent automatically enables operation under the user's account through a Web site, such as "my.automatos.com", that is accessible via the Internet. The user then activates the monitoring services on the various devices. Installation options are described in more detail below.

Figs. 52a and 52b show Web pages for creating an account via a Web site, from which the agent can be downloaded. The Web pages request identification information for the user, such as the user's name, e-mail address, a password, and language preference, among other things. Fig. 53 shows a similar Web page for entering information on the company of the user that enrolled via the Web pages of Figs. 52a and 52b. Once enrolled, the user downloads the agent from the Web site and begins the installation process. During installation and operation, agent 24 generates and displays a graphical user interface (GUI) that has three tabs for checking the status of the agent and altering the agent's operation. The tabs are: "Status", "Settings" and "Start/Stop". Each tab may have different panels. Each panel presents a set of closely related parameters displayed in separate fields. Some of these parameters can be edited. Each tab is described below, along with the meaning and functionality of the fields contained therein.

Fig. 2 shows an example of status tab 31. Status tab 31 is displayed on a device running agent 24. The fields in status tab 31 are fixed, meaning that they cannot be edited.

In Fig. 2, machine panel 32 presents information describing the device on which the agent is installed, e.g., device 19. This information includes the operating system 34 of the device, the name 35 of the device and the MachinelD 36 of the device. "MachinelD" is the device's machine identifier. The Machine ID is a number that is generated during installation and that uniquely identifies device 19 to computer program 29 running in server 21 (shown in Fig. 1).

Agent panel 37 presents a start time 39, which is the date and time of the agent's activation, and a PID number 40, which is the agent's process ID (identifier) number. A process ID is a number that identifies a process in an operating system on the monitored device. Using the process ID or "PID", it is possible to send signals to a process running in an operating system, such as an instruction for the process to terminate. The modules field 41 shows each active collection module and its version number. Each module is responsible for coordinating the collection of data related to a specific service (e.g., Capacity Wizard, Performance Wizard, etc.). Whenever plug-ins are installed for new services, new modules are inserted and collectors may be added. Collector field 42 shows the name of each collector within a device being managed and indicates if such collectors are active ("UP"). Each collector is responsible for collecting data from a certain device resource, such as hard disk, memory, etc. Fig. 28 shows status tab 31 with other options 43 in the pull-down menu of collector field 42.

Data TX Panel 44 shows the Internet Protocol (IP) address 45 of the device in which the agent is installed and indicates if the device is currently sending samples to server 21. In the example of Fig. 2, the device's IP address is 127.0.0.1 and it is sending samples. If the device were not sending samples, icon 46 (Fig. 3) would be displayed in lieu of icon 47. LastTXBytes field 49 shows the amount of bytes sent to relay 27 in a last collected data sample. TotalTXBytes 50 field shows the total amount of bytes sent to relay 27 to present. Sent field 51 shows the amount of collected data sent to relay 27.

Last Sent field 52 shows the date and time that the last collected data sample was sent to server 21. Failures field 54 shows the number of failed sample transmission attempts. Last Failures field 55 shows the date and time of the last failed sample transmission attempt. When no failures occur an "unknown" status is indicated (as shown). Also shown in Fig. 2 is an agent service indicator 2. "UP" (shown) indicates that the agent is active. "DOWN" (not shown) indicates that the agent is inactive.

Fig. 4 shows an example of settings tab 57. Settings tab 57 is displayed on a device running agent 24. Some of the fields in settings tab 57 are fixed, others may be edited. In Fig. 4, General panel 59 displays a customer ID field 60 and a TMP

(temporary) path field 61. CustomerlD field 60 shows the e-mail address used during enrollment and input when the agent is installed. TMP path field 61 shows where samples are stored until they are sent to relay 27. Primary Relay panel 62 contains Relay Server field 69, which shows the JP address of the primary relay device on internal network 11, and Relay Port field 65 which shows the primary relay device's JP port number. Alternate Relay panel 66 includes a Relay Server field 67 and a Relay Port field

69. Relay Server field 67 indicates an alternate relay server's IP address. The alternate relay is automatically used when the primary relays is down. Relay Port field 69 provides the alternate relay server's IP port number. Clicking on Apply button 70 executes any alterations made in the fields shown in Fig. 4. The Start/stop tab 71 is displayed on a device running agent 24. In this tab, it is possible to activate and/or deactivate agent data sampling. Fig. 5 shows start/stop tab 71 when agent 24 is active ("UP"). Fig. 6 shows start/stop tab 71 when agent 24 is inactive ("DOWN").

In Agent Service panel 72, Start button 74 activates agent sampling (i.e., data collecting) (shown active) and Stop button 75 deactivates agent sampling. Reload Plug- ins button 76 reloads plug-ins installed in the agent.

Referring now to Fig. 7, a GUI 77 for the relay is similar to the GUI (Fig. 2) for the agent. GUI 77 is displayed on relay server 20 (Fig. 1) during installation and/or operation. As shown in Fig. 7, relay GUI 77 also has Status tab 79, Settings tab 80, and Start/Stop tab 81 with similar panels and functionalities as those described above.

Fig. 7 shows the relay GUI status tab 79. As was the case with the agent GUI status tab, most of the fields in relay GUI status tab 79 cannot be edited. Machine panel 82 presents information describing relay server 20, its operating system, name and MachinelD. The example presented in Fig 7 shows a computer (relay server) named "WRIEIRO2" executing Windows 2000 Professional with Service Pack 1 installed. The relay sever can be installed in a different operating system than the agents are installed.

Relay panel 84 includes Version field 85, which provides the relay's version number, Start Time field 86 which provides the date and time of relay activation, and PJD field 87 which provides the process ID number.

Data RX (Receive) panel 89 includes the TX (Transmit) Queue Len field 90 which indicates a backlog of samples to send to server 21 (Fig. 1), TotalRXBytes field 91 which shows the total amount of bytes received by the relay from all agents until the present, and Active Sessions field 92 which shows the number of active agents' sessions that are sending samples to the relay. The IP addresses of the agents that are generating the samples are listed in drop-down field 94. Data TX (Transmit) panel 95 includes the following fields. Data TX time field 96 shows the amount of time spent transmitting a last sample from relay 27 to server 21. Sent field 97 shows the amount of collected samples sent from relay 27 to server 21. Failures field 99 shows the number of failed data transmission attempts from relay 27 to server 21. Mode field 100 shows the mode of transmission from relay 27 to server 21 : in this embodiment, either SMTP for e-mail data transmission or SSL for SSL data transmission. LastTXBytes field 101 shows the amount of bytes sent by relay 27 to server 21 in an immediately preceding transmission. Last Sent field 102 shows the date and time that the last collected sample was sent from relay 27 to server 21. Last Failure field 104 shows the date and time of the last failed data transmission attempt. When no failures occur "unknown" is displayed.

Status tab 79 also includes a relay service indicator 105. Relay service indicator 105 indicates "UP" when relay 27 is active and "DOWN" when relay 27 is inactive.

When relay 27 is switched from "UP to "DOWN", the TX and RX statistics are reset, e.g., TotalRXBytes, DataTXTime, etc.

Figs. 8 and 29 to 41 depict settings tab 80. Settings tab 80 is displayed on a device running relay 27. Some of the fields in settings tab 80 are fixed, others may be edited.

General Panel 106 (Fig. 8) includes the following fields. CustomerJD field 107 displays the e-mail address input while installing the relay. This e-mail address identifies the user in my.automatos.com and cannot be edited. TMP path field 109 indicates where samples are stored until they are sent to server 21. Communications port field 110 (Fig. 29) displays the JP communication port used to transmit samples from agent 24 to relay 27. hi this example, the default value is 1999.

Protocol selection panel 111 (Figs. 30 to 33) allow a user to select protocols 113 (Fig. 31), including SSL, HTTP and SMTP, that may be used to transmit data over the Internet. Fig. 30 shows the case where SSL is selected. In this case, the server name and port 112 are input. Fig. 32 shows the case where HTTP is selected. In this case as well, the server name and port 114 are input. Fig. 33 shows the case where SMTP is selected. In this case the server name and port 118 are input, along with e-mail addresses 111, including the sender's e-mail address ("FROM") and the recipient's e-mail address ("TO"). In this embodiment, the SMTP server default address is mail.automatos.com (not shown) and the SSL server default address is ssl.automatos.com (not shown).

Figs. 34 to 41 shows screens for allowing a user to select firewall settings 128. hi this embodiment, there are several proxy and Windows® sockets (SOCKS) configurations. Basically, the user inputs the name or IP address of the proxy or SOCKS server and the port of the proxy or SOCKS server. In the case of an authenticated proxy or SOCKS server, a login ID and password may be required. Different screen configurations for inputting this information are shown in Figs. 34 to 41. The Start/stop tab 81 (Fig. 9) is displayed on a relay device, hi this tab, it is possible to activate and/or deactivate data sampling transmission. Start/stop tab 81 indicates "START" 122, when relay service is "UP" 124, and "STOP" 125 when relay service is "DOWN" (not shown).

Fig. 10 shows a process 126 performed by agent 24 (including relay 27) for obtaining data from a device and providing that data to a remote server (or other type of processing device). Fig. 11 shows a process 127 performed by remote server 21 for processing received data and making that data accessible to remote client 30, e.g., over the Internet.

Referring also to Fig. 1, in process 126, agent 24 is activated and receives (1001) a plug-in containing system calls for obtaining data from device 19. It is noted that agent 24 may use a previously-installed plug-in to obtain data from device 19. A new plug-in is used if agent 24 needs to retrieve added or different data not obtainable by plug-ins already available to agent 24. Agent 24 loads (1002) the new plug-in, along with the preexisting plug-ins.

As noted, engine 25 creates (1003) a schedule to call the plug-ins at periodic time intervals. For example, a plug-in can be scheduled to execute every minute (as in this example), every 5 minutes, and so on. After each plug-in executes, the plug-in returns data that it collected to engine 25.

Accordingly, process 126 waits (1004) for the scheduled time interval (one minute here) and calls (1005) the scheduled plug-in at the appropriate time. The plug-in collects the appropriate data from the monitored device. Here, engine 25 uses system calls from the new plug-in to obtain (1006) data from device 19. Engine 25 may also obtain any other available data using the system calls from the pre-existing plug-ins. The data may relate to, but is not limited to, one or more of the following: a processor on the device, a memory on the device, a hard drive on the device, an internal network on which the device is located, an operating system of the device, and/or software installed on the device.

Engine 25 compresses (1007) the obtained data and transmits the compressed data to relay 27. As noted above, relay 27 may reside on the same device as engine 27 or on a different device (shown).

Relay 27 encrypts (1007) the data that it receives from engine 25 and transmits (1008) the encrypted data to server 21 over the Internet. Blocks 1004 to 1008 may be repeated periodically, as shown, in order to obtain real-time data from device 19. Data is thus transmitted from agent 24 to server 21 periodically, thereby allowing a client to monitor changes in device 19 in real-time. This feature is described in more detail below. In process 127 (Fig. 11), server 21 receives (1101) the compressed and encrypted data. The data is received periodically, as it is transmitted, e.g., every minute, five minutes, etc. Computer program 29 in server 21 decompresses and decrypts the data and stores the data in database 22. Alternatively, instead of storing the data in database 22, computer program 29 may process the data as it is received, which is the case when real time notification is utilized.

Computer program 29 formats (1102) the data for display. In this embodiment, the data is formatted as one or more Web pages (e.g., Figs. 15 to 18), reports (see the attached appendices), notification messages (e.g. pager messages, e-mails, etc.) and/or or graphs/charts (e.g., Fig. 25) for showing real-time operation behavior of device 19.

Computer program 29 makes the formatted data accessible to a remote client via the Internet. That is computer program 29 functions as a Web server to provide a Web site containing Web pages with the formatted data. A user at client 30 can navigate through the site/data via one or more hyperlinks. Computer program 29 may generate natural language reports that indicate an operational parameter of a device exceeds a preset limit. In this scenario, computer program determines if received data indicates that an operational parameter of the device exceeds a preset limit and generates a report to client 30 indicating that the preset limit has been exceeded. Preset limits for the operational parameters may be stored in, and retrieved from, database 22 by computer program 29. Client 30 (Fig. 1) can access the formatted data from server 21 through one or more Web pages. Fig. 12 shows an example of a Web page 140 that can be used to access the data. Web page 140 contains hyperlinks 141, 142 and 144 to data for devices, in this case computers, being monitored by agents. Window 145 provides a list 146, which contains groupings by "department" of one or more devices being monitored by agents.

Clicking on hyperlink 142 provides links to data for all computers being monitored. Clicking on hyperlink 144 provides links to data for a selected group from list 146. If hyperlink 146 is selected, Web page 147 (Fig. 13) is displayed. Web page 147 contains link 149 to one computer (BOSB000117) and link 150 to another computer (WVTLLELA). Clicking on hyperlink 149 displays Web page 151 (Fig. 14). Web page

151 provides hyperlinks 154, which allow a user to display information about the selected device.

Clicking on hyperlink 155 displays the general information shown on Web page

152 (Fig. 15) about the selected computer. Web page 152 displays information about the configuration and operation of the selected computer. As shown, this information includes the operating system on the computer, the operating system version, the CPU on the computer, the CPU speed, the amount of memory, the type of CD-ROM (Compact Disc Read Only Memory) on the computer, along with other information. Clicking on hyperlink 156 (Fig. 14) displays the capacity of the device's hard drive, shown in Web page 157 (Fig. 16). Clicking on hyperlink 159 displays network information (e.g., the IP address) for device 19, shown in Web page 160 (Fig. 17). Clicking on hyperlink 161 displays a list of the software installed on device 19, shown in Web page 162 (Fig. 18). Other information also may be accessible.

Web page 164 (Fig. 19) is also accessible through the Web site provided by server 21. Web page 164 provides options for viewing statistics relating to monitored devices. For example, clicking on hyperlink 165 displays Web page 166 (Fig. 20). Web page 166 provides a list 167 of groupings of devices (by department), along with buttons 169 which link to Web pages that provide statistics for a selected grouping from list 167.

Selecting "All Dept" 170 and button 171 on Web page 166 displays Web page 172 (Fig. 21). Web page 172 identifies the CPU on all computers from list 167. To select only computers from a single group (i.e., department), select that group and button 171. Selecting button 174 (Fig. 20) generates a Web page 175 (Fig. 22) that displays operating system information for computers from a selected group. Selecting button 176 generates a Web page (not shown) that displays memory statistics for computers from a selected group. Selecting button 177 generates a Web page (not shown) that displays software statistics (e.g., software installed, versions, etc.) for computers from a selected group.

Selecting button 179 generates a Web page (not shown) that displays product information (e.g., model, version, etc.) for computers from a selected group. Selecting button 180 generates a Web page (not shown) that displays manufacturer information for computers from a selected group. Fig. 23 shows another example of a Web page 181 displayed by server 21. Web page 181 allows a user to access services through server 21. Among these services are real-time monitor (RTM) wizard 182. RTM wizard 182 is part of computer program 29 and allows a client to view data from device 19 as that data changes in real-time. Selecting RTM wizard 182 displays Web page 184 (Fig. 24), in which a user can select a device 185 to be monitored from pull-down menu 186. Once the device has been selected, a window 187 (Fig. 25) is displayed for showing the status of a selected function over time. In this embodiment, a user can choose to monitor a device's memory usage 189, disk input/output (I/O) 190, CPU usage 191, and network VO 192. The selected function is displayed in terms of percentage of use 194 versus time 195 and is updated automatically as new data arrives at server 21.

Web page 196 (Fig. 26) also provides options for obtaining natural-language reports based on the data collected by agent 24. Performance wizard 197, capacity wizard 199, Oracle wizard 200, SQL server wizard 201, and asset wizard 202 are software modules that are included within computer program 29. These modules analyze the data received from the agent(s), generate reports, and provide those reports to a user, in Adobe PDF format, at client 30, on demand (through the site) or automatically (by e- mail).

Generally speaking, the various reports generated by the "wizards" provide information relating to one or more devices on a network over a period of time, although each report is different. The reports combine data, charts, and natural language information, making them look like reports generated by a human being. Reports may include hyperlinks linking their sections, to make it easy to access a section that interests the user. Also, the beginning of each report also may contain a summary of the information found in more detail in other sections of the report, making it easy to jump to the other sections.

Appendix A shows an example of a report generated by asset wizard 202. Appendix B shows an example of a report generated by Oracle wizard 200. Appendix C shows examples reports generated by SQL server wizard 201. Appendix D shows an example of a report generated by performance wizard 197. Appendix E shows an example of a report generated by capacity wizard 199. Other types of reports may be generated instead of, or in addition to, the reports shown in the appendices.

As shown in Web page 196 (Fig. 26), for time-related reports, the user can select a starting date 205 and an ending date 206 for the report. Computer program 29 generates and displays a report that encompasses that time period. Pull-down menu 207 allows the user to select the device or devices about which to generate a report. Web page 196 relates to SQL server wizard 201; however, similar Web pages are provided for the other wizards shown in Fig. 26. Server 21 may also transmit the device monitor data (e.g., reports, etc.) using wireless application protocol (WAP) to a wireless device, such as a cellular telephone 230 (Fig. 42). Fig. 42 shows a screen 232 for a wireless user to select the language in which to receive information. User inputs to the wireless device are likewise sent back to server 21 via WAP. Fig. 43 shows the selection of languages 233 on screen 232. Fig. 44 shows a screen 235 for the user to enter a login ID, here called an "alias". Fig. 45 shows a screen 236 for the user to enter a password. Fig. 46 shows a screen 237 for the user to obtain a list of devices on internal network 11 for which monitoring data is available. Fig. 47 shows a screen 238 that shows the list of devices (in this example, servers). Fig.

48 shows a screen 239 which allows the user to select which features to monitor on the selected server, e.g., configuration, CPU usage, virtual memory, disk I/O, etc. Fig. 49 shows a screen 240 with the selected data, in this case, CPU usage. Fig. 50 shows a screen 241 with the selected data, in this case, virtual memory usage. Fig. 51 shows a screen 242 with the selected data, in this case, network information.

Fig. 27 shows a computer 210 on which either of processes 126 or 127 may be implemented. That is, computer 210 may represent either a device with an installed agent on internal network 11 or server 21 (Fig. 1). Computer 210 includes a processor 211, a memory 212, and a storage medium 214 (e.g., a hard disk) (see view 215). Storage medium 214 stores machine-executable instructions 216 that are executed by processor

211 out of memory 212 to perform processes 126 and/or 127.

Although a personal computer is shown in Fig. 27, processes 126 and 127 are not limited to use with the hardware and software of Fig. 27. They may find applicability in any computing or processing environment. Processes 126 and 127 may be implemented in hardware, software, or a combination of hardware and software.

Processes 126 and 127 may be implemented in computer programs executing on programmable computers or other machines that each include a processor, a storage medium readable by the processor (including volatile and non- volatile memory and/or storage components), at least one input device, and one or more output devices. Program code may be applied to data entered using an input device (e.g., a mouse or keyboard) to perform processes 126 and 127 and to generate information. Each such program may be implemented in a high level procedural or object- oriented programming language to communicate with a computer system. However, the programs can be implemented in assembly or machine language. The language may be a compiled or an interpreted language. Each computer program may be stored on a storage medium or other type of article of manufacture, such as a CD-ROM, hard disk, or magnetic diskette, that is readable by a general or special purpose programmable computer for configuring and operating the computer when the storage medium or device is read by the computer to perform processes 126 and 127. Processes 126 and/or 127 may also be implemented as an article of manufacture, such as a machine-readable storage medium, configured with a computer program, where, upon execution, instructions in the computer program cause a machine to operate in accordance with processes 126 and 127.

The invention is not limited to the specific embodiments described above. For example, the invention is not limited to the protocols, hardware, or software described herein. The invention is not limited to generating the specific Web pages or reports described herein. The blocks of Figs. 10 and 11 may be reordered and/or blocks may be left out or added.

As shown in FIG. 54, a system 310 includes a local server 312 connected to an intranet 314 that is connected to the Internet 316 through a firewall 318. Intranet 314 includes a Mail server 3150 with a Simple Mail Transfer Protocol (SMTP) server 3151 that delivers mail to and from the intranet 314. Intranet 314 also includes a workstation 3152 that is used by an administrator of the Intranet. Workstation 3152 typically has a web browser 343b for browsing web pages and a mail client 3154 for receiving and sending email messages, for example, through SMTP server 3151. A monitor server 320, which is also connected to the Internet 16, monitors the operations of the local server 312 automatically without requiring continued involvement by an administrator of the local server 312. The administrator of the local server 312 may have a laptop computer 322, which is connected to the Internet 316 and may be used to access the local server 312. For purposes of automatic monitoring, local server 312 executes an agent 324, which collects data that indicates the operating state the local server 312, including configuration information and performance data. The data provide a measure of how well the local server 312 is performing its intended functions. Agent 324 automatically transmits the collected data using email (which conforms to a standard email protocol) to an email address associated with the monitor server 320. The monitor server 320 analyzes the data and automatically generates a report containing a summary of the status of the local server 312, diagnoses of problems or defects that may exist in the local server 312, and a listing of resources on the local server 312 that may need to be updated to keep up with future demands on the local server 312. The monitor server 320 transmits the report using an email (which also conforms to a standard email protocol) to an email address associated with the administrator of the local server 312. The administrator can then access the report from any computer that is reachable by email, including laptop computer 322 and workstation 3154. The administrator can also access the report from a web page on monitor server 320 from any computer that has a web browser, such as workstation 3152. Thus, the system 310 provides automatic unattended continuous monitoring of the server 320 and automatically sends performance reports to any authorized person located anywhere using simple email. By using email to send the data and the report, the system 310 allows information to be sent through the firewall 318 without compromising the security of the intranet 14 or requiring that the firewall 318 be reconfigured.

Local Server 312 includes a processor 330 and a storage subsystem 332. Storage subsystem 332 is a computer readable medium, such as computer memory, a floppy disk, a hard disk, a CDROM, an optical disk or a tape drive. Storage subsystem 332 stores an operating system program 334 that is executed by the processor 330. As will be described in greater detail below with reference to FIG. 55 A, local server 312 may have any one of a variety of operating systems installed. Operating system 334 includes a kernel 336, which further contains device drivers 338 that are used by the operating system to access devices in the local server 312. The device drivers 338 provide an input/output control ("IOCTL") application programming interface ("API") 339 that may be used to obtain performance data from the device drivers 338. The operating system 334 provides a system call API 340 and a registry 342 that may be used to obtain performance information from the operating system 334. Storage subsystem 332 also includes a file system 342 that contains system files 344 that are used by the operating system 334 to store data and a web browser 343 that may be used to browse web pages, as described in greater detail below.

Storage subsystem 332 also stores agent software 324, which is executed by the processor 332 to collect and transmit data. Agent software 324 occupies very little storage space on storage subsystem 332. Typically, agent software 324 occupies about 600KB of storage space. Processor 330 executes agent software 324 as a background process, known as a service or a daemon process. Very little memory and processing power is required to execute agent software 324. Typically, agent software 324 requires less than 1 % of the processing power of processor 330 and about 3.5 megabytes of memory to execute.

Agent software 324 includes a data retriever module 346 that retrieves the data, a timer module 348 which directs the data retriever module 346 to retrieve the data at certain time intervals, a data compressor module 350 to compress the collected data, a data encryptor 352 to encrypt the data, and an SMTP sender module 354 to send the data via email. The data retriever 46 includes a registry module 356 which retrieves data from the registry 342, a system call module 358 which uses the system call API 340 to retrieve data from the operating system 334, an IOCTL module 360 which retrieves data from device drivers 338, and a file system module 362 which retrieves data from system files 344 contained within file system 342.

Referring to FIG. 55A, the timer module 348 can be configured in a selected one of possible data collection modes, each of which is represented by a row 3202a, 3202b of FIG. 55 A. As will be described in greater detail below, the configuration mode is selected in a user interface screen of agent software 24. Although the timer module 48 has multiple configuration modes, only two of them 3202a, 3202b are shown in FIG.

55A. Each configuration mode is associated with a sampling period 3204a, 3204b, after which the data retriever 46 collects a new sample of the data from the local server 12. Each configuration mode is also associated with an entry period 3206a, 3206b. The data retriever 46 computes an average of the data samples collected over the duration of the same entry period 3206a, 3206b and writes the average in a current one of the data files 366. The timer module 48 causes the data to be written in a new data file after each upload period 3208a, 3208b of the selected configuration.

As shown in FIG. 55B, different versions of agent software 324 are available for different operating systems and each of the versions is tailored to acquire data from its corresponding operating system. Each column 3210a-3210e of FIG. 55B corresponds to a different operating system. As shown in the first column 3210a, the IBM AIX version of agent software acquires data from a virtual device file "/dev/kmem" 3212 within the file system 342 and from system calls 3214 from the system call API 340 (FIG. 54). The Solaris version acquires data from a "/proc" virtual file system, from system calls 3218, and from IOCTL calls 3219. The HP UX version acquires data from lOCTLs 3220 from the IOCTL API 39 (FIG. 54) and from system calls 3222. The Linux version acquires data from lOCTLs 3224, system calls 3226, and the "/proc" virtual file system 3228. The windows version acquires data from the registry 342, system calls 3232 and lOCTLs 3234.

Источник: [https://torrent-igruha.org/3551-portal.html]
.

What’s New in the UEStudio 05.10 serial key or number?

Screen Shot

System Requirements for UEStudio 05.10 serial key or number

Add a Comment

Your email address will not be published. Required fields are marked *