Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Network
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • MAC - IP Scanner for Win7 is the world leading tool for network management and network analysis. It provides IP scanner and MAC scanner to help you get the connection details freely. It also provides a ping tool for testing the access to network. The scanned IP or MAC can be analyzed by MAC - IP Scanner for Win7, to track the illegal users. Remote control functions enable you to wake up, shutdown and send messages to another computer on
  • MAC Scanner for Win7 is a collection of tools to provide you with information about the networks. It is very easy and user friendly design allows even for the inexperienced user to get a profound and understandable overview of his network and the running services. It includes IP Scanner, MAC Scanner, and Ping Tester. With the help of this Lan Scanner you can test and manage your local network easily. * Scan IP MAC Scanner for Win7 shows the devices connected to your local network, e. g. computer or router, along with their IP. You can also choose IP range for accurate scanning. * Scan MAC After scanning it shows the MAC address of the computers in your local network * Display hostname and workgroup The information helps to supervise the local network. * Add scanned computer and other devices to database All the data can be import and export from database * Analyze scanned computer To compare the scanning results to the database to find if there is unrecorded computer. You can also set a ...
  • MACMask is a powerful, yet an easy-to-use utility tool that changes (or masks) a MAC Address of network adapter for Windows NT, 2000, XP, and Server 2003 systems.
  • It is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.
  • It is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.
  • It is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.
  • It is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.
  • It is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office
  • MPB is not just limited to maintenance inventory. Create as many databases as you like and title each one what you will.Used for tracking Computer Parts,Automobiles,Etc. You can create new databases in MPB for different departments,projects etc. Edit field labels to suit your needs and give each database an individual title. Optional administrator password to keep anyone from deleting a database,editing field labels or creating a new database without the password. You can also select which database you would prefer MPB to load on startup.MPB allows you to change its appearance using skins.Imports & Exports Excel Spreadsheets.Scan and Print Bar Codes, print labels,Supports external docs
  • Just want to keep track of parts and cost? Try the Xtra Version of MPB. Create as many databases as you like and title each one what you will.Used for tracking Computer Parts,Automobiles,Etc. You can create new databases in MPB for different departments,projects etc. Edit field labels to suit your needs and give each database an individual title. You can also select which database you would prefer MPB to load on startup.MPB allows you to change its appearance using skins. Exports Excel Spreadsheets.Print Labels
  • MaxPatrol is a professional network security scanner distinguished by its uncompromisingly high quality of scanning, optimized for effective use by companies of any size (serving from a few to tens of thousands of nodes). It supports vulnerability testing for servers with non-standard configurations, intelligent recognition of vulnerabilities in known (and custom) web-server scripts, full identification of RPC services and more.
  • MC3 Cyber Cafe Software has been developed by Mouse Click for internet cafe operators. Light and easy internet cafe with adequate features to operate a cyber cafe. Able to perform remote PC monitoring and cyber cafe billing. Record other internet cafe activities such as photostat, printing, food and beverage, snacks and drinks and other services rendered by the cyber cafe. Monitor the cyber cafe expense such as electricity bill, utility, telephone, wages etc. Reports on internet usage and other cafe activities such as printing, photostat, fB and others. Record collection report into the system for effective and efficient monitoring. Download free MC3 cyber cafe software home edition from Mouse Click. It can monitor up to 4 PCs without any limitations. Control remote PCs via the network to lock screen, logoff, restart, shutdown or send warning message to client PCs via the network. Monitoring is updated every second based on chosen currency. User account control and reports for monitoring purpose.
  • MegaPing is the ultimate must-have toolkit that provides all essential utilities for Information System specialists, system administrators, IT solution providers or individuals. It includes: Scanners: Comprehensive Security Scanner, Port scanner (TCP and UDP ports), IP scanner, NetBIOS scanner, Share Scanner. All Scanners can scan individual computers, any range of IP addresses, domains, and selected type of computers inside domains. Security scanner provides the following information: NetBIOS names, Configuration info, Missing Security Patchs, Installed Service Packs, open TCP and UDP ports, Transports, Shares, Users, Groups, SNMP, Services, Drivers, Local Drives, Sessions, Remote Time of Date, Printers. Monitors: Host and Port Monitor. System Information: System Info Viewer, Advanced Process Viewer, Network Resources Viewer. Network utilities: DNS list host, DNS lookup name, Network Time Synchronizer, Ping, Traceroute, Whois, and Finger. Ease of use, friendly user interface, and robust multithr ...
  • MetaLAN is an agentless systems management, remote administration, software audit / software license tracking and hardware inventory tool. Remote control, monitor, plan hardware and software upgrades using the included reports and health monitoring. Get to the bottom of technical issues faster than ever. Save time and get more done in the time you have. All this without needing to visit or install anything on the client computers!
  • There are many programs that relentlessly try to breach into your computer from the Internet. The surveys show that a new computer can be infected in less than half hour with spyware and trojan horses. Another increasingly alarming trend is the number of non-malicious programs that send information about you and your online habits to their authors without any consent from you. Mil Firewall blocks all attempts to exploit a security problem in the programs that are running on your PC. Mil Firewall will also protect your computer from infection with many viruses, trojan horses and spyware programs. It will also block any attempts of legitimate or spyware program to send your private information over the internet or to download ads and other content to show in pop-up windows. You can use specific network access rules for each program or use global rules for all programs. There are predefined rules for most frequently used programs but you can change them. All network access can be temporarily disabled with ...
  • MING Bandwidth Monitor PRO is a powerful bandwidth meter and monitor, which measures and displays all traffic to/from any process, your computer or your network. MING Bandwidth Monitor PRO shows you which processes in your machine are causing TCP/IP network traffic, how much traffic that is, and over which IP ports this traffic takes place. It can display bandwidth data in a real-time graphic display and record all network traffic.
  • MING Network Monitor is a simple and affordable software solution for users who want to control, monitor, and archive unlimited Internet traffic on the company or home network, including instant messages (AOL, MSN, Yahoo, ICQ, MySpaceIM, FacebookIM, WarcraftIM and QQ), emails sent and received, web sites visited, and files downloaded. The manager can view records in the database, search by key word, watch top users, monitor bandwidth and so on.
  • MING Network Spy can monitor, block and archive Internet usage on any computer in a network, including instant messages (AOL, MSN, Yahoo, ICQ, MySpaceIM, FacebookIM and QQ), emails sent and received, web sites visited, and files downloaded. It is able to record everything your employees or kids do online automatically in stealth mode.The manager can view records in the database, search by key word, watch top users, monitor bandwidth and so on.
  • MING Wireless Monitor is a simple and affordable software solution for users who want to control, monitor, and archive unlimited Internet traffic on the local wireless LAN, including instant messages (AOL, MSN, Yahoo, ICQ, MySpaceIM, FacebookIM, WarcraftIM and QQ), emails sent and received, web sites visited, and files downloaded. The manager can view records in the database, search by key word, watch top users, monitor bandwidth and so on.
  • MISPBO Network Monitor is a free, fast and powerful monitoring tool for users who want to control and monitor the Internet traffic on the company or home network.
  • MOAT detects rogue hardware on the Enterprise LAN. Rogue laptops, Employee home laptops, and Wireless Hijackers will all be detected by MOAT. Employees or contractors plugging in laptops or tablets without permission can be detected and stopped. MOAT is ideal for internal security, logging, and auditing. Also, now that WPA2 routers can be cracked, MOAT is the sure way to know that only approved devices are on your Wireless network.
  • Using Windows Mobile Data Viewer, you can download your personal data from your Windows Mobile-based Smartphone and Pocket PC with a single click. Data to be downloaded include: Call Log, Contact List, SMS (Short Messages) and E-Mail. Data can then be viewed and printed off-line from your desktop or laptop PC, or exported to CSV format for Excel. With Windows Mobile Data Viewer, you now store complete personal data from your phone on your PC.
  • MobileWitch Remote Control is one of the best software that can be used to control your computer from distance. The program is perfect for business as well as for your own enjoyment! Now you can make PowerPoint presentation and watch the actual slides on your phone. Tones of handy features available like being able to change tracks played on iTunes or Media Player, browse for artists, albums, adjust the volume and plus many other.
  • This monitor event logs tool makes the event log management process simple and flawless. Therefore, you need not move from one computer system to another for log management. This monitor event logs tool offers instant troubleshooting for system performance issues. This monitor event logs tool enables you to perform real time event monitoring as it enables you to create alerts. Moreover, this monitor event logs tool gives the system administrators the power to filter Windows and W3C event logs based on different event log types. Lepide Event Log Manager tool comes with an absolutely smashing, intuitive, self-descriptive, and easy-to-understand graphical user interface which does not require any special technical skills to work on it. This monitor event logs tool also comes bundled with a free evaluation version. Using this free evaluation version, you can monitor the event logs on one hand and evaluate the various features, capabilities, as well as performance of the tool on the other hand. ...
  • Productivity of an organization is hampered due to misuse of office computers by the employees. With Employee Desktop Live Viewer, organizations can continuously watch various activities of their employees in the working hours. It is available in two setup files; one is installed on the administrator?s computer and another on the computers used by employees. All employee desktops of an organization can be added in the main setup of the Employee Desktop Live Viewer for monitoring. Employee Desktop Live Viewer can monitor network PC activities of selected or all employees of an organization. It monitor both offline and online activities of an employee through a remote location of a network. Employee Desktop Live Viewer allow administrator to monitor network PC in stealth as well as invisible modes so that employees are completely unaware of their system monitoring, It also schedule offline recording of employee activities when network manager is away from the seat. Moreover, Employee Desktop Live Viewer also al ...

Page 14 of 28
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware