Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: administrator
Display: short descriptions | full descriptions
  • The Computer Geek program is not a tool for ordinary computer users, rather for the more experienced users like system administrators etc. And obviously for all the geeks out there :-) That said, there are parts of this program that should fit most computer users, but also a few tools that requires knowledge. Like the ADS tool, and the Portscanner tool. ADS can be used for malicious purposes, and so can Portscanners. Use at your own risk.
  • Moyea PPT to DVD Burner Edu is a green E-learning app that creates fantastic Blu-ray/DVD and video copies from your PowerPoint content in a few mouse clicks. With catching GUI and dual conversion capacity, the presentation-based education tool makes it easy to build SCORM-compliant Blu-ray/DVD or video content that connects with and engages students, teachers, professors, IT professionals, and school administrators.
  • Blacklist monitor software lets e-mail system administrators know before users told them that there is a problem in outbound e-mail messages because DNS blacklist monitor software continuously checks if your public IP address is listed in any DNS blacklist and if public IP address of email server has been accidentally registered in any DNS blacklist zone, DNS blacklist monitor software will send a notification to the administrator to take action.
  • Professional Renamer is a useful and powerful tool that can rename multiple files. Its user friendly and intuitive interface allows you to rename files easily. Unique visual templates system will helpfully assist you in renaming. All changes on new name immediately shows in the file list. Is great for MP3 collectors, digital photographers, Web developers, system administrators and everyone who works with a large number of files.
  • No more telling, nagging or trying to educate your children to spend less time on the home computer. No siblings' arguments: 'it's my turn now', 'you have been on it for so long...', etc. Just relax and let Fred take control. AlaTimer lets you restrict each child (Windows user) to a daily number of minutes. Sixty (60) seconds prior to this period expiring a message will pop-up, asking the user to logoff. AlaTimer could be configured to either logoff, shutdown or restart the computer, at the end of this period. Mouse hover over Fred's icon and a short message pops-up showing how long you have spent using the computer and how many more minutes are left, for the day. Click the mouse left button and the computer and Internet schedule pops up. AlaFredy configures AlaTimer - using AlaFredy a computer Administrator can read, display and/or modify all AlaTimer settings, over a (home) network, from any of the network computers. So, with AlaTime ...
  • ApPHP Medical Appointment is online doctor, therapist appointment and medical clinic site PHP script. This Appointment System is an application for handling doctors appointments. It enables patients to book an appointment using web-based interface, and administrator of the clinic is able to approve/reject the appointment. Site visitors can perform search by doctor specialty and/or doctor name, view doctor availability and book appointments.
  • Netwrix Active Directory Change Reporter reports changes made to Active Directory and generates audit reports on a daily basis. The reports include Who, What, When, and Where of all changes and include "before" and "after" values for each setting. This report lists changes made to AD and Exchange configurations, mailboxes, AD schema, and more. The product has freeware and commercial editions.
  • Frozen Spam is the ULTIMATE ZERO SPAM solution for Smartermail users and / or administrators. It uses a proven technology with zero fault and has been designed specifically to fit the need of Smartermail server's administrators.
  • If you are concerned your child may be spending too much time online or playing games this type of software will offer a solution. It allows you to set limits on how much time your child spends on the computer or online.
  • USB Secure can password protect any portable media including USB drives, External drives and even memory cards. It supports plug and play and automatic execution. No administrator rights or install is required on the other computer. You can take your USB drive anywhere without a fear of data leak or theft in case of a stolen or lost USB drive. USB Secure is a great program for people keeping private data on portable devices when travelling.
  • WinINSTALL LE has been the most popular free MSI package builder for almost two decades. Featuring software packaging and application installer management, WinINSTALL has been a long-term favorite with administrators. Now, Scalable has significantly overhauled WinINSTALL LE and released a new, free MSI creator called Scalable Smart Packager CE. If you want to package Windows Installer Setups try Smart Packager Pro.
  • Recovery Toolbox for Lotus Notes is an indispensable data recovery tool intended for any system administrator in an organization that heavily relies on Lotus. The work of Recovery Toolbox for Lotus Notes is based on a convenient recovery wizard that guides the user through the process. Recovery Toolbox for Lotus Notes efficiently solves the problem of ad hoc data recovery from damaged .NSF files that can be performed literally by anyone.
  • Lepide Event Log Manager is a sophisticated tool that empowers the user to avail the information about a site which includes accessed files, activity status, traversed paths, referring pages, search engines, browser related information, etc. The software archives the event logs of the entire network in a central repository which makes it extremely simple and easy to maintain them. Also, it generates timely notifications and alerts to inform the administrator whenever any critical event related to event logs takes place. Using this efficacious utility, event browsing for all the systems within the entire network can be simplified. Moreover, it facilitates you to view the specific or all windows and W3C event logs from a centralized platform. Also, it provides compliance reports for HIPAA, PCI, SOX, FISMA and GLBA and thus sustains compliance and also help in avoiding the legal hassles. The software has two editions- A Freeware edition and Enterprise edition. The users can choose any one as per their need and u ...
  • Remote Utilities is remote desktop software for network administration in a Windows domain network. It is closely integrated with Active Directory and provides remote installation across multiple PCs as well as AD authentication support. Remote Utilities can run as a service and grant full control over the remote PC to the administrator in 15 different connection modes, including the view remote screen and power control modes.
  • Hide, lock and protect your local, network, Floppy and USB drives, and disable the AutoRun feature for them. Control access to your drives by clicking on the checkboxes located within the group boxes representing them. Disable the AutoRun feature based on drive types to disable, for instance, only all USB drives, regardless of the drive letters that can be associated with them. The program lets you protect itself from an unauthorized access.
  • Best Network Security is the best solution for corporations, universities, schools, public libraries, internet cafes and other applications where administrator has to secure and maintain a lot of network PC workstations located in different places. Best Network Security is intended for securing, protecting, and maintaining PC workstations within a corporate network. Supports over 600 different security restrictions.
  • Protect your computer and restrict access to Internet with Security Administrator. This nice password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, Printers, System and Internet Options. You can disable your boot keys, cont
  • Comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to every corner of PC workstation, apply executable patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer connected to a TCP/IP-based network or Internet. In total, 1st Network Admin supports over 600 different security restrictions, options and tweaks.
  • Access Administrator Pro is intended for controlling access to files and folders situated on local media of Windows win98/ME/NT/2000/XP/vista at Windows kernel level. It alows to allocate access to files and folders between users according to predefined schedules, and protects system files and folders such as the Windows System, Registry and Swap files.
  • Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and..
  • Web-based school calendar software. Easily publish calendars online, share your calendars with others and much more. Teachers or administrators can post events that appear on targeted calendars, the school website, and on homepages of each student and parent. You can quickly create color-coded online calendars for different types of events, for example: class schedules, tests, sports events, performances, meetings, etc.
  • Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, individual drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.
  • Manage calendars, contacts and tasks. Synchronize with internet calendars and contacts. Subscribe to internet calendars. Access your data through any third-party cloud network, or share the data in your home/office network. Use groups, subgroups, drag & drop options for keeping records. Print labels and envelopes, calendars and address books with customizable templates. Advanced installer does not require administrator access.
  • SQL Server Restore Toolbox is powerful and efficient way of database recovery in MS SQL Server format. This program provides small size of its binaries, friendly interface and powerful engine of data restoration, suitable in all instances of SQL analysis. Sure it is designed for database administrators, but the ease of interface allows other users to execute the same processes on their computers when it is necessary.
  • Kernel Computer Activity monitor is the software to trust when it is important to track all computer activities of employees. It captures snapshot of the target computer screen at specific intervals. One can specify maximum size of snapshots and also if snapshot should be of the active window. Every key that is pressed by user gets recorded. Administrator can check what all keys were typed after analyzing the keystrokes. Kernel Computer Activity Monitor records every internet activity ranging from browsers used, pages visited, visit time or user name. The tool enabled admin to look at the history of accessed application. Details such as name, launched time, executable path and launched by information are recorded about the application. The admin can save clipboard activities as well that can let you know everything that was copy-pasted including text and images. Kernel Computer Activity Monitor reports every email activity that is accessed without using SSL connection. The reports include date and time ...

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware