IPHost Network Monitor is a stable distributed network and server monitoring software. This tool allows monitoring of websites and intranet applications, mail, database (Oracle, MySQL, MS SQL, ODBC) servers, network bandwidth and equipment, other resources inside and outside your network (LAN or WAN). Remote Network Agents enables monitoring of resources in multiple separate networks. Performance and other counters on Windows PCs can be monitored via WMI; on UNIX/Linux systems via SNMP. Supported protocols: HTTP, HTTPS, FTP, SMTP, POP3, IMAP, ODBC, PING, and more. Web Transaction monitor for end-to-end web applications and e-commerce site monitoring. SNMP MIB browser with SNMP SET support. SNMP traps monitor for immediate alerts on event. You can also use any of 4,000 additional Nagios plugins v.2.0.3 to monitor what you've used to with IPHost Network Monitor. Alerts by email, SMS, Jabber, ICQ, AOL, SNMP SET, play a sound or by execution of a program. Administrator tools provided. Daily, weekly, mont ...
FirePlotter is a real-time firewall connection or session table monitor. It provides the ability to track usage of bandwidth and traffic for Cisco PIX ASA and FortiNet FortiGate firewalls. Installed and operational in less than a minute. FirePlotter provides tabular listings and summary of sessions by Service (HTTP, FTP etc), Destination IP, Source IP and more along with graphical bandwidth usage.
Leawo iPod touch 4 Transfer is powerful transfer software, it can be used for transferring files among iOS devices, iTunes and PCs. All the iPhone transfer, iPad transfer and iPod transfer go smoothly with this software. Leawo iPod touch 4 Transfer can also be used for backing up iPhone, iPad and iPod files, and using iPhone, iPad and iPod as flash disks. Leawo iPod touch 4 Transfer is helpful for keeping your iOS devices' files safe.
Secure Lockdown - Network Connection Manager Edition (NCM) conveniently combines the standard Windows WiFi and Ethernet network management tools into a single customizable interface - perfect for locked down systems such as limited purpose tablets, network secure computers, and Windows embedded environments. For schools, government agencies, and businesses looking to restrict network access on Windows desktop, laptop, and tablet computers.