MegaPing is the ultimate must-have toolkit that provides all essential utilities for Information System specialists, system administrators, IT solution providers or individuals.
Scanners: Comprehensive Security Scanner, Port scanner (TCP and UDP ports), IP scanner, NetBIOS scanner, Share Scanner.
All Scanners can scan individual computers, any range of IP addresses, domains, and selected type of computers inside domains.
Security scanner provides the following information:
NetBIOS names, Configuration info, Missing Security Patchs,
Installed Service Packs, open TCP and UDP ports, Transports, Shares, Users, Groups, SNMP, Services, Drivers, Local Drives, Sessions, Remote Time of Date, Printers.
Monitors: Host and Port Monitor.
System Information: System Info Viewer, Advanced Process Viewer, Network Resources Viewer.
Network utilities: DNS list host, DNS lookup name, Network Time Synchronizer, Ping, Traceroute, Whois, and Finger. Ease of use, friendly user interface, and robust multithr ...
MetaLAN is an agentless systems management, remote administration, software audit / software license tracking and hardware inventory tool. Remote control, monitor, plan hardware and software upgrades using the included reports and health monitoring. Get to the bottom of technical issues faster than ever. Save time and get more done in the time you have. All this without needing to visit or install anything on the client computers!
There are many programs that relentlessly try to breach into your computer from the Internet. The surveys show that a new computer can be infected in less than half hour with spyware and trojan horses. Another increasingly alarming trend is the number of non-malicious programs that send information about you and your online habits to their authors without any consent from you.
Mil Firewall blocks all attempts to exploit a security problem in the programs that are running on your PC. Mil Firewall will also protect your computer from infection with many viruses, trojan horses and spyware programs. It will also block any attempts of legitimate or spyware program to send your private information over the internet or to download ads and other content to show in pop-up windows.
You can use specific network access rules for each program or use global rules for all programs. There are predefined rules for most frequently used programs but you can change them. All network access can be temporarily disabled with ...
MING Bandwidth Monitor PRO is a powerful bandwidth meter and monitor, which measures and displays all traffic to/from any process, your computer or your network. MING Bandwidth Monitor PRO shows you which processes in your machine are causing TCP/IP network traffic, how much traffic that is, and over which IP ports this traffic takes place. It can display bandwidth data in a real-time graphic display and record all network traffic.
MING Network Monitor is a simple and affordable software solution for users who want to control, monitor, and archive unlimited Internet traffic on the company or home network, including instant messages (AOL, MSN, Yahoo, ICQ, MySpaceIM, FacebookIM, WarcraftIM and QQ), emails sent and received, web sites visited, and files downloaded. The manager can view records in the database, search by key word, watch top users, monitor bandwidth and so on.
MING Network Spy can monitor, block and archive Internet usage on any computer in a network, including instant messages (AOL, MSN, Yahoo, ICQ, MySpaceIM, FacebookIM and QQ), emails sent and received, web sites visited, and files downloaded. It is able to record everything your employees or kids do online automatically in stealth mode.The manager can view records in the database, search by key word, watch top users, monitor bandwidth and so on.
MING Wireless Monitor is a simple and affordable software solution for users who want to control, monitor, and archive unlimited Internet traffic on the local wireless LAN, including instant messages (AOL, MSN, Yahoo, ICQ, MySpaceIM, FacebookIM, WarcraftIM and QQ), emails sent and received, web sites visited, and files downloaded. The manager can view records in the database, search by key word, watch top users, monitor bandwidth and so on.
MISPBO Network Monitor is a free, fast and powerful monitoring tool for users who want to control and monitor the Internet traffic on the company or home network.
MOAT detects rogue hardware on the Enterprise LAN. Rogue laptops, Employee home laptops, and Wireless Hijackers will all be detected by MOAT. Employees or contractors plugging in laptops or tablets without permission can be detected and stopped. MOAT is ideal for internal security, logging, and auditing. Also, now that WPA2 routers can be cracked, MOAT is the sure way to know that only approved devices are on your Wireless network.
Using Windows Mobile Data Viewer, you can download your personal data from your Windows Mobile-based Smartphone and Pocket PC with a single click. Data to be downloaded include: Call Log, Contact List, SMS (Short Messages) and E-Mail. Data can then be viewed and printed off-line from your desktop or laptop PC, or exported to CSV format for Excel. With Windows Mobile Data Viewer, you now store complete personal data from your phone on your PC.
MobileWitch Remote Control is one of the best software that can be used to control your computer from distance. The program is perfect for business as well as for your own enjoyment! Now you can make PowerPoint presentation and watch the actual slides on your phone. Tones of handy features available like being able to change tracks played on iTunes or Media Player, browse for artists, albums, adjust the volume and plus many other.
This monitor event logs tool makes the event log management process simple and flawless. Therefore, you need not move from one computer system to another for log management.
This monitor event logs tool offers instant troubleshooting for system performance issues.
This monitor event logs tool enables you to perform real time event monitoring as it enables you to create alerts.
Moreover, this monitor event logs tool gives the system administrators the power to filter Windows and W3C event logs based on different event log types.
Lepide Event Log Manager tool comes with an absolutely smashing, intuitive, self-descriptive, and easy-to-understand graphical user interface which does not require any special technical skills to work on it.
This monitor event logs tool also comes bundled with a free evaluation version. Using this free evaluation version, you can monitor the event logs on one hand and evaluate the various features, capabilities, as well as performance of the tool on the other hand. ...
Productivity of an organization is hampered due to misuse of office computers by the employees. With Employee Desktop Live Viewer, organizations can continuously watch various activities of their employees in the working hours. It is available in two setup files; one is installed on the administrator?s computer and another on the computers used by employees. All employee desktops of an organization can be added in the main setup of the Employee Desktop Live Viewer for monitoring. Employee Desktop Live Viewer can monitor network PC activities of selected or all employees of an organization. It monitor both offline and online activities of an employee through a remote location of a network. Employee Desktop Live Viewer allow administrator to monitor network PC in stealth as well as invisible modes so that employees are completely unaware of their system monitoring, It also schedule offline recording of employee activities when network manager is away from the seat. Moreover, Employee Desktop Live Viewer also al ...