System administration
 » Asset management
 » » Service level management
Sections : System administration > Asset management > Service level management
Not rated by visitors
Click to RATE : OneTwoThreeFourFive
Buy Free Service Protector download

Service Protector 4.5

Service Protector - 100% Uptime for Windows Services

 

Advertisement

Service Protector 4.5 facilities

Vendor
7028-B Thornhill Drive
94611 Oakland
United States of America
Vendor`s Webhttp://www.CoreTechnologies.com
Core Technologies Consulting, LLC webshot
OSWindows XP, Windows Vista, Windows 7, 64-bit (x86_64)
LimitationsNag screen : Install and Uninstall
Actualizedmore than year ago
Downloads544
LocalizedEnglish
LicenseFree to try
SnapshotService Protector snapshot
Snapshot of Service Protector

Use this security logo:

100% SAFE logo

Service Protector manufacturer description

Service Protector 4.5 monitors your mission critical Windows Services and keeps them running 24/7.

Service Protector Service level management will automatically restart your service if it crashes, hangs, hogs the CPU, uses too much memory, or fails your own customized failure-detection procedure. And regular, detailed email from Service Protector download will let you know about crashes and other relevant events.

Service Protector is easy to use, affordable, and free to try, so why not see how it can help you to avoid those annoying 3 AM support calls?
free download Service Protector 4.5QUICK DOWNLOAD
Free download Service Protector 4.5

Advertisement

Service Protector video tutorials

Tutorial not found. Let know us about any useful video tutorial.

Service Protector categories

automatic restart, Monitor service, Restart service, Windows service

What is new in 4.5 changeinfo log

Various fixes and improvements.

Given stickers for Service Protector & download buttons

NOTE: move cursor over buttons to get html sources.
smarter
This award means that Service Protector is an Editor's pick.
Clean award
DownloadAtlas.com guarantees that Service Protector was tested by antivirus program and is absolutely clean, which means it does not contain any form of malware, including computer viruses, adware, trojans, spyware, rootkits, badware and other malicious and unwanted software.
Report view
ServiceProtector_Installer.exe - CLEAN
ServiceProtector_Installer.exe » INNO » setup.data - CLEAN
ServiceProtector_Installer.exe » INNO » files.info - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\ServiceProtector.exe - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\ServiceProtector.exe » PECompact v2.xx - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\ServiceProtectorAgent.exe - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\ServiceProtectorAgent.exe » PECompact v2.xx - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\EventMessageFile.dll - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\GHCrUtils.dll - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\GHCrUtils.dll » ASPack v2.11 - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\UninstallProtectors.exe - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\UninstallProtectors.exe » PECompact v2.xx - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\Readme.txt - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\License.txt - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\SanityCheck\ConnectToSocketSanityCheck.exe - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\SanityCheck\ConnectToSocketSanityCheck.cpp - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\SanityCheck\Readme.txt - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\Documentation\ServiceProtectorUserManual.pdf - CLEAN
ServiceProtector_Installer.exe » INNO » {app}\Documentation\VersionHistory.txt - CLEAN
ServiceProtector_Installer.exe » INNO » script_raw.data - CLEAN
ServiceProtector_Installer.exe » INNO » script.pas - CLEAN
ServiceProtector_Installer.exe » INNO » script_decompiled.pas - CLEAN
Get from DownaloadAtlas.com
Get from DownaloadAtlas.com
Do you like Service Protector ? Move mouse cursor over the buttons and just copy one of those links, paste the code you copied right where you want on your blog or website.

Service Protector permissions

The Service Protector unregistered (trial) version may be freely distributed, provided the distribution package is not modified. No person or company may charge a fee for the distribution of Service Protector without written permission from the copyright holder, Core Technologies Consulting, LLC.

End user agreement for Service Protector

SCROLL UP AND DOWN BY USING THE SCROLL BAR ON THE RIGHT OR PRESSING THE UP/DOWN
ARROWS AND/OR PageUp / PageDown KEYS TO VIEW THIS ENTIRE AGREEMENT.

Service Protector License Agreement (single computer)
=====================================================

Except where otherwise noted, all of the documentation and software included
in the Service Protector package is copyrighted by Core Technologies Consulting, LLC.

Copyright © 2010-2014 Core Technologies Consulting, LLC. All rights reserved.

Please read and understand this license agreement fully before using the Service Protector
software. This is an agreement between you, the end-user, and Core Technologies
Consulting, LLC, the publisher of the Service Protector software (also referred to in this
agreement as 'the software' or 'this software'). By installing and/or using this
software you are agreeing to be bound by the terms of this agreement. If you do
not agree with the terms of this license agreement, the software must be removed,
including any installation files and archival files.

We hereby grant you a nonexclusive license to use one copy of the Software on any
single computer, provided the Software is in use on only one computer at any time.
The Software is "in use" on a computer when it is loaded into temporary memory
(RAM) or installed into the permanent memory of a computer--for example, a hard
disk, CD-ROM or other storage device.

The software is protected by copyright and other intellectual property laws and by
international treaties. You acknowledge that no title to the intellectual property
in the software is transferred to you. You further acknowledge that title and full
ownership rights to the software will remain the exclusive property of Core
Technologies Consulting, LLC and you will not acquire any rights to the software
except as expressly set forth in this license. You agree that any copies of the
software will be completely unmodified and contain the same proprietary notices
which appear on and in the software.

You acknowledge that this software contains trade secrets. You may not decompile,
reverse engineer, tamper with, disassemble, modify or otherwise reduce the software
to a human-perceivable form.

THE END USER MAY NOT: (i) modify or create any derivative works of the software or
documentation, including translation or localization; (ii) decompile, disassemble,
reverse engineer, or otherwise attempt to derive the source code for the software;
(iii) redistribute, encumber, sell, rent, lease, sublicense, or otherwise transfer
rights to the software; (iv) remove or alter any trademark, logo, copyright or other
proprietary notices, legends, symbols or labels in the software; (v) use this software
with any derivative works based directly on this software; or (vi) use this software
with any third party products or applications that are directly and specifically
dependent on this software for any part of their functionality. THE END USER MAY
NOT DIRECTLY, INDIRECTLY OR INADVERTANTLY FACILITATE OR OTHERWISE AID OTHER INDIVIDUALS
OR ENTITIES IN ANY OF THE PREVIOUSLY LISTED ACTIVITIES, AND AGREES TO TAKE ALL
REASONABLE STEPS AND USE BEST EFFORTS TO ENSURE THAT NO UNAUTHORIZED DISCLOSURE OR
DISTRIBUTION OF THE SOFTWARE IN WHOLE OR IN PART IS MADE.

THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTY OF ANY KIND, INCLUDING
WARRANTIES THAT IT IS FREE OF DEFECTS, MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE OR
NON-INFRINGING. THE USER AGREES THAT ANY USE OF THIS SOFTWARE OR ANY FILES DOWNLOADED
WITH THIS SOFTWARE IS AT THE SOLE RISK OF THE USER.

This license will terminate immediately without notice from Core Technologies Consulting,
LLC if you fail to comply with any provision of this license. Upon termination you
must destroy the software, archival files, related documentation and all copies thereof.

This Agreement is governed by the laws of the State of California.

Service Protector, the Service Protector logo, and all trademarks, service marks and trade names of Core
Technologies Consulting, LLC appearing in the Service Protector software, on the CoreTechnologies.com
web site are owned by Core Technologies Consulting, LLC. Service Protector trademarks, logos,
service marks, and trade names may not be used in connection with any product or service
that is not Core Technologies Consulting, LLC's, in any manner that is likely to cause
confusion, or in any way that disparages or discredits Service Protector and/or Core Technologies
Consulting, LLC.


Core Technologies Consulting, LLC
7028-B Thornhill Drive,
Oakland, CA 94611, USA
Phone: +1 (510) 343-3565
Fax: +1 (208) 979-1109
info@CoreTechnologies.com