Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: M :: monitoring
Display: short descriptions | full descriptions
  • Proxy Log Explorer is the fastest and most powerful analysis application for monitoring the efficiency corporate Internet usage of your Proxy server. This application creates dynamic reports on-the-fly. Also, you can easily get virtually any subreport by just right-clicking the item you need and selecting the subreport you need. Needless to say, it can recognize log file formats automatically and extract compressed log files.
  • IPHost Network Monitor is a free network and server monitoring software for tracking of performance and availability of network equipment, web/intranet sites/applications via SNMP (UNIX/Linux/Mac) and WMI, HTTP, Oracle, MySQL, MS SQL, ODBC, FTP, SMTP, POP3, IMAP, PING & more. Custom scripts or programs as monitors, including Nagios plugins. SNMP MIB. Admin tools. Regular reports by email. The free version can be used with up to 50 monitors.
  • MailDetective is an effective tool for corporate mail flow monitoring. MailDetective analyzes Microsoft Exchange Server or MDaemon logs and creates comprehensive reports on sent and received mail, traffic distribution, and amount of mail for particular e-mail addresses. Reports are delivered in the form of easy to read charts and can include information on the whole corporation or on individual mail accounts.
  • MobaSSH is a free SSH server for Windows, compatible with any ssh client (OpenSSH client, Putty, ...). MobaSSH comes with an easy to use installer and some useful GNU utilities for monitoring and managing a remote computer silently. It also allows you to transfer files securely with scp/sftp. MobaSSH is packaged in a small single executable that registers as a Windows service so that it can be monitored like other normal Windows services.
  • NetCrunch Tools is a completely free toolkit for network professionals, featuring Ping, Traceroute, Wake OnLAN, DNS Info, Who Is, Ping Scanner, Service Scanner, Open TCP Port Scanner, SNMP Scanner, DNS Audit and Mac Resolver in one. It can work standalone, or in conjunction with the NetCrunch network monitoring system, an all-in-one, agentless network monitoring and management suite. It is free to use, with no usage limitations of any kind
  • PureVPN maintains over 450+ servers in 89+ countries. It offers over 77,000 IPs to access all restricted content with full anonymity and security. The Windows VPN software features include: 1. Web Protection: Provide security against hackers, cyber spies etc. so users are able to browse, communicate or shop safely. 2. One Click Easy to Connect: Simply put user and password and hit the Quick Connect button. 3. Multiple Security Protocols: Windows VPN software offers PPTP, L2TP, & SSTP Encryption to ensure that the user critical information like credit card numbers, social media accounts etc. is unreadable for a spy. 4. Usage Purpose Selection: Purpose Selection feature lets you quickly & easily choose your desired purpose from a drop-down to get going. 5. Automatic Protocol Selection: PureVPN automatically chooses the most appropriate protocol as soon you select the purpose. You can, however, choose between 128 & 256 bit encryption from the Settings tab. 6. P2P In ...
  • Security Task Manager is a computer utility designed to offer full access to Windows processes. Security Task Manager's main focus is on your computer's currently running processes, and offers a great deal of information on them: process name, CPU usage, memory usage, file name and location, security rating and more. Protector will catch any mouse movement monitoring software, and will alert you if the Windows Registry has been tampered with.
  • Classoft Sheduling Manager was developed for easing the organization work and monitoring the working teams in activities like: service, sales, surgeries, tourism, hotels,pensions and any other type of working unit that can use the application for organizating the work.
  • oMega is more than a file manager. oMega supports all standard operations, typical for file managers or Windows Explorer, such as copy, move, delete. In addition oMega offers unusual features and operations, such as built-in powerful editor / viewer, secure deletion, fast splitting / joining of files, free space monitoring system. Archive function automates and adds new features that are not available in Windows Explorer and other programs. The search function allows you to remove the unwanted results on the go, search in encrypted archives and much more. Another special feature of the program is the handy and convenient interface, allowing easy customization to suit individual user preferences on what to display, choose comfortable font sizes, or a color scheme for files highlighting. oMega is primarily intended for those who own from many to lots of programs, and have to manage extensive directory structures. oMega has been designed specifically to serve as a control center for your computers, help ...
  • Heroix introduces its Longitude Hyper-V application to monitor Microsoft Hyper-V hypervisor. Longitude is a feature-rich, easy-to-use, affordable monitoring solution that companies use to track the health of their entire IT infrastructure: multiple operating systems, web servers, databases, messaging and networks. Longitude helps keep IT budgets in check by helping to locate and reduce virtual sprawl, over provisioning, and excess resource use.
  • KSnetManager is a revolutionary parental control tool that is distinct from other internet monitoring software: 1) Instead of being a hidden monitoring program, it is interactive. 2) Instead of passive monitoring, it actively controls and blocks unexpected activities. 3) It controls and monitors not only websites, but also all programs on your computer. 4) The program has a fully encrypted key logger; and much more.
  • Finally, for anyone looking for monitoring and tracking all Skype chats and activities Skype Spy USB Edition software was designed. You don't need to install Skype Spy into the PC you are going to track. Just insert the USB flash stick with the Skype Spy and run the program. In this way the app stays completely undetectable. It is a great option for anyone looking for an effective parental control solution or employee monitoring software.
  • Axence nVision gives you everything you need to manage your network in an efficient and effective manner. The application consists of 5 modules (centrally managed): proactive network monitoring and visualization; hardware and software inventory (license audit); intelligent user monitoring (blocking websites); data leak protection (port blocking), helpdesk (remote access, trouble ticket database, chat) - all with a wide range of alerts & reports.
  • Activity Monitor Pro offers effective security on computers and provides the equivalent of the security camera! Activity Monitor Pro runs hidden in the background to secretly record keystrokes typed, passwords entered, websites visited, applications/files used and takes screenshots of the activities. Recorded data will be sent to you by email or FTP/Email address automatically and secretly. Find out more on www.activity-monitor.com
  • NetBull is the best and most undetectable keylogger you can find on the Internet. By using the latest in computer monitoring techniques, NetBull keylogger tracks all activities that occur on the monitored computer (Internet browsing, keyboard usage, user names and passwords, messenger conversations, programs used, Facebook activity, emails etc. etc.). The official website for NetBull keylogger: www.netbull.com
  • Ax3soft Sax2 is a professional intrusion detection and prevention software (NIDS) used to detect intrusion and attacks, analyze and manage your network which excels at real-time packet capture, 24/7 network monitor, advanced protocol analysis and automatic expert detection. With insight into all operations in your network, Sax2 makes it easy to isolate and solve your network security problems - detect network vulnerabilities, identify network security threats, catch actions against of security strategy and signs of been attacked. Finally, intercept and stop these connections. Sax2 offers many kinds of intrusion analysis reports, such as events, type, source address and destination address of attacks, and many crossover reports and compositive reports. Furthermore, sax2 allows customize the time range which administrator will flexible monitor and evaluate the network security. Sax2, enhanced detection, analysis, response and management features, supports almost all common used protocols, self-conta ...
  • Ax3soft Scout process activity monitor is a professional monitoring tool for Windows, it can monitor a process all-sidedly in real time, including process/thread, file system, Registry and network activity whit its powerful features. To create a detail report for process, Ax3soft Scout makes it easy to find and solve your computer problems, e.g. malware, troubleshooting. Key Features Real-time monitor and analyze Ax3soft Scout can monitor process/thread, file system, Registry and network activity (includes: IP, ICMP, TCP and UDP conversations, HTTP visit, Email transfer and FTP transfer) real-time and analyze these activities to identify security threats with different colors. Detail reports Ax3soft Scout can analyze numerous activities to create a detail report for process, the report?s content is very clear, it includes all the threats found and some key activities events. You can find and solve computer problems quickly and easily with the report, even if you don?t have extensive computer knowled ...
  • Unicorn network analyzer is an Ethernet network analyzer (aka. packet sniffer or protocol analyzer) for network monitoring and troubleshooting purposes. It performs real-time packet capturing, 24/7 network monitoring, advanced protocol analyzing, in-depth packet decoding, and automatic expert diagnosing. Unicorn network analyzer offers a summary-to-detail, intuitive, easy-to-use graphical interface that network engineers can use to rapidly analyze and troubleshoot enterprise networks, Officers of a company can use to monitor user activity on network. it can also be used for debugging protocol implementations by aficionados that want to learn more about how network protocols work. Key Features 1. Real-Time packet capture and analyze 2. Rapidly troubleshoot enterprise networks 3. A variety of alarms notice 4. A variety of logs
  • AVSbackup is a multi-thread application for reserve data copying. AVSbackup has a built-in system for automatic reserve copying of files and folders from their initial locations to the other folders and discs of the same computer or other computer of a local network. The application supports reserve copying of FTP and cloud storages (Dropbox, Box, Google Drive, SkyDrive) in both directions (download and upload) and reserve copying of databases to the file(s). Full, incremental and differentiated reserve copying is supported. Data can be restored both in the initial location and in the location selected by the user. AVSbackup maintains a log of events, which can be automatically e-mailed. The application supports program monitoring and manual task initiation via Web interface (the Internet connection is necessary). AVSbackup supports Zip compression of the reserved data, which is maintained optionally, with 256-bit AES encryption.
  • AVSbackup is a multi-thread application for reserve data copying. AVSbackup has a built-in system for automatic reserve copying of files and folders from their initial locations to the other folders and discs of the same computer or other computer of a local network. The application supports reserve copying of FTP and cloud storages (Dropbox, Box, Google Drive, SkyDrive) in both directions (download and upload) and reserve copying of databases to the file(s). Full, incremental and differentiated reserve copying is supported. Data can be restored both in the initial location and in the location selected by the user. AVSbackup maintains a log of events, which can be automatically e-mailed. The application supports program monitoring and manual task initiation via Web interface (the Internet connection is necessary). AVSbackup supports Zip compression of the reserved data, which is maintained optionally, with 256-bit AES encryption.
  • Logstatic is an easy-to-use, yet powerful Log Analyzer. Designed for a convenient Amazon S3/CloudFront and Rackspace CloudFiles (Akamai CDN) service analytics and monitoring, it offers an automatic log fetching and analysis straight from your Amazon and Rackspace accounts.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • Power Spy software secrectly logs Facebook use, keystrokes, website visits, emails, chats and IMs: Skype, Yahoo Messenger and more. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp. Perfect for monitoring kids, spouse and employees.
  • Zone Trigger is the first multi-purpose motion detection software. This means that motion detection isn't just for security anymore. Specify zones to monitor on the live image, set different actions for each zone. Create complex custom motion detection systems for your project's needs. Useful in such sectors as Art, Marketing, Quality control, automated inventory, security and monitoring, motion detection has never hit so close to home.
  • GlassWire helps protect your computer, privacy, and data by monitoring your network activity. Block unknown network connections with GlassWire's built in firewall tool. GlassWire also helps you monitor and protect remote servers. Are you always worried about going over your ISP bandwidth limit? GlassWire can warn you before you hit your limit and also show you what applications are hogging all your bandwidth.

Page 3 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware