Web Log Storming icon

Web Log Storming 2.4.1 build 561

Downloads :
Total: 40  |  Last 7 days: 1
Product Version :
2.4.1 build 561
Producer :
License type :
Shareware | Price : 189 USD
Size :
9.96 MB
Category :
November 25, 2010, 14:50
User Rating : (UNRATED)
OS Supported :
Windows 7
Windows Vista

Web Log Storming Information

Publisher's Description:

Web log analyzer which displays site statistics as interactive charts and reports.

Web Log Storming analyzer - the web analytics that differs

Web Log Storming does far more than just generate common reports. It displays detailed web site statistics with interactive graphs and reports. Complete and detailed log analytics of activity from every visitor to your web site is only a mouse-click away.
In other words, analyze your web logs like never before!

With this website analytics software, it's easy to track goals and conversions, sessions, hits, page views, downloads, or whatever metric is most important to each user. You can look at referring pages and see which search engines and keywords were used to bring visitors to the site. Web site behavior, from the top entry and exit pages, to the paths that users follow, can be analyzed. You can learn which countries your visitors come from, and which operating systems and browsers they use. You'll learn how your bandwidth is being used, and how much time users spend on your site. You can tell how popular your files, images, directories, and queries are.

Web Log Storming allows you to:

* Track individual visitors down to the smallest details - including their previous visits and their paths through your web site
* Easily improve your ROI - stop wasting money and bandwidth with low-quality traffic
* Extensive on-the-fly filtering and complete interactivity lets you to create new reports in seconds
* Check if visitors behave as you expect. Determine if your links are prominent enough
* Practically unlimited number of interactive reports and graphs
* Your web logs are kept in fast computer memory allowing you to view filtered results immediately
* Keep your log files compressed to save disk space - it uncomporesses zip, gz and tar file automatically
* Connect to FTP or HTTP server and download updated log files automatically
* Export reports to HTML files, send them by e-mail, or copy them to the clipboard

Examples of Web Log Storming usage
You can find a lot of articles about importance of web log analysis. It's especially true if you are making money with your website or spending it on advertising. Here are few examples on how you can use Web Log Storming to improve your website or find out about any of possible problems.

1. Rate referrers by effectiveness and stop wasting advertising money
Simple referrer report sorted by number of visits is hardly enough for serious analysis. First of all, with Web Log Storming you can easily identify referrers that link to images on your server. Other analyzers usually show those as regular referrers and you don't get a real picture. With Web Log Storming you can rule out those visits by typing a wildcard in the File parameters (for example: "*.html, *.php, *.exe").

Furthermore, you can sort referrers by goal conversions. With our software it's easy to answer the question which referrer is more effective: abc.com (with 1000 visits and 10 conversions) or xyz.com (with 100 visits, but 20 conversions). If you are paying for the traffic you really can't afford to ignore this information.

2. Get deeper understanding of paid traffic
Google AdWords goals detection simply isn't enough in most cases. Plain number of conversions is an important metric, but with Web Log Storming you can view any available report based on these visits and try to improve AdWords campaign so you don't throw your money away.

For example, you can see exact search phrase and tweak keyword settings, find out what visitors do and for how long they stay before they reach the goal, do they come back later or not, etc.

3. Detect bandwidth waste
Web Log Storming allows you to easily detect bandwidth wasting. Use the Domains report to find hosts that transfer too much data and configure your web server to deny traffic from them. But don't do this blindly, as you can easily see more information about domain. Proxies can use more bandwidth than it's usual, but you don't want to blacklist them if they bring legitimate visitors.

4. Investigate individual visitors
You can inspect a behavior of individual visitors (for example, new customers) to see their actions. You can track down their first visits, see how often they come back and what pages they were interested in. Use this information to improve your website so you other visitors can find same information more easily and convert more often.

5. Find "bottlenecks"
Identify pages that don't convert well. Find out why is that and improve the content: rephrase text or put more prominent links. It's even possible that some simple but nasty typo scares potential customers away.

6. Find errors on your website
Use the Status parameter to find if there are some missing pages or mistyped URLs (type "404" in Status field), identify if hackers are trying to access restricted areas ("403") or if internal server errors happen on you website ("500").

Supported log file formats

Currently Web Log Storming supports:
* IIS W3C Extended log file format
* Apache Combined log file format


Web Log Storming requires a PC with Microsoft Windows™ 98SE, 2000, XP or Vista. Amount of RAM and processor speed depends on how many traffic your website receives.

Version History

Software Versions

  Date added
  Nov 25, 2010
  9.96 MB
  Aug 31, 2009
  9.54 MB
  Jun 3, 2009
  8.88 MB

User reviews

User rating

Your rating:  
Users rating: (0 votes)

Add a Review

(It will not be displayed. Is only for contacting you)
(from the image)
Image Code

!!! Fields marked with * are required !

Web Log Storming 100% CLEAN Certification

100% Clean Award for Web Log Storming
RoSoftDownload.com team has tested Web Log Storming against viruses, spyware, adware, trojan, backdoors and was found to be 100% clean of any form of malware..
Our editors will test this application periodically to assure that it remains clean.
Click the link below to view the entire antivirus report.

Complete antivirus report

Latest Internet Tools

NoScript icon


Keeps the computer protected from Java vulnerabilities while
October 11, 2016, 12:10 | Size: 512 K
Mozilla Thunderbird 45.4.0 icon

Mozilla Thunderbird 45.4.0

Now is easier to organize, secure and customize your mail.
October 11, 2016, 12:07 | Size: 33.3 MB
NEWT Professional Network Inventory 2.5.304 icon

NEWT Professional Network Inventory 2.5.304

Network inventory and computer audit software giving IT professionals
October 2, 2016, 12:57 | Size: 4.53 MB
Hotspot Shield Elite 5.4.11 icon

Hotspot Shield Elite 5.4.11

Secure your internet connection.
September 16, 2016, 05:03 | Size: 12.13 MB
Octoparse 6.0 icon

Octoparse 6.0

Octoparse is a powerful, easy-to-use and free web data extractor
September 14, 2016, 14:38 | Size: 57.44 MB
Adobe Reader DC 2015.010.20056 / 11.0.10 icon

Adobe Reader DC 2015.010.20056 / 11.0.10

Easily view, print, and collaborate on PDF files with this free
February 6, 2016, 03:04 | Size: 72.34 MB
SterJo Fast IP Scanner 1.0 icon

SterJo Fast IP Scanner 1.0

Scan IP Range very fast.
September 17, 2015, 06:30 | Size: 706.56 K
MozillaHistoryView 1.53 icon

MozillaHistoryView 1.53

Displays the list of visited Web sites in Firefox/Mozilla/Netscape
January 26, 2015, 02:18 | Size: 51.2 K
UltraSurf 14.05 icon

UltraSurf 14.05

Tool that enables users inside countries with Internet censorship
January 7, 2015, 22:25 | Size: 1.95 MB
Captcha Breaker 2.65 icon

Captcha Breaker 2.65

Captcha Breaker captcha solver software
August 13, 2014, 02:07 | Size: 634.88 K

Most Downloaded
Internet Tools

UltraSurf icon


Tool that enables users inside countries with Internet censorship
Adobe Reader icon

Adobe Reader

Easily view, print, and collaborate on PDF files with this free
TeamViewer icon


Tool to set up connections to any PC in the world in a few seconds.in
FirePhoenix icon


Complex tool to protect your online activities.
CyberLink YouCam icon

CyberLink YouCam

CyberLink YouCam 4 Webcam Software with Augmented Reality Effects
SopCast icon


Broadcast video and audio, watch and listen them to radio on
Firebug icon


Firebug integrates with Firefox and lets you edit, debug, and
NoScript icon


Keeps the computer protected from Java vulnerabilities while
Xmanager icon


Bring remote Unix/Linux desktops to your Windows PC in a fast
Hotspot Shield Elite icon

Hotspot Shield Elite

Secure your internet connection.

Last week
Internet Tools
top downloads

Adobe Reader icon

Adobe Reader

Easily view, print, and collaborate on PDF files with this free
Popup Ad Stopper icon

Popup Ad Stopper

With this small application you browse the web without being
UltraSurf icon


Tool that enables users inside countries with Internet censorship
Simple Port Forwarding icon

Simple Port Forwarding

This handy program will aid you into forwarding ports on your
Contact | Privacy Policy
Copyright © 2008 - 2016 - All rights reserved.  
RoSoftDownload.com logo