Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: M :: monitoring
Display: short descriptions | full descriptions
  • Visual monitoring (control) of availability of a host (network resource) in the local computer network, the Internet, etc. to its IPv4-address, by periodic sending to it inquiries under the ICMP protocol. In the course of work the LOG file containing detailed information on change of the status of availability of a controlled host is constantly kept
  • Spyrix Employee Monitoring - cloud-based platform for tracking your employee computer activities. Spyrix allows remote (via web account) control of employees activity in the Internet including chats, messengers , Skype, social networks Facebook, LinkedIn, Twitter, search engines Google, Yahoo, Bing, apps activity, include games. Spyrix will also make screenshots of active windows, snapshots and video from webcamera, records from microphone.
  • Control and testing of IPv4-networks, fast obtaining various information on knots of system. Will help to define network safety of the chosen knot or it is simple to receive necessary data on a network and its knots. Includes the scanner of a network (subnet), the set range, for the purpose of identification of available working IP addresses (knots) with fast definition of their MAC addresses, allows to hold testing of the chosen knot to the know
  • UserGate Proxy & Firewall is a UTM (Unified Threat Management) class solution for sharing and monitoring employees' access to the local and Internet resources, for filtering FTP and HTTP traffic, as well as for administrating the network in your company. The product can be used in small- and mid-sized companies instead of relying on large and expensive hardware or software alternatives.
  • LANVisor allows you to see the screens of multiple computers connected to the local area network. You can use the software to see what users do on remote computers and automatically take screenshots. At the office, this system will help a manager catch employees suspected of violating the daily routine and thus improve productivity.
  • GSM Guard allows you to control remote sites and objects equipped with security alarms, controllers, or surveillance systems that send alerts about specific events or issues via GSM, SMS, or GPRS. When installed on a server, GSM Guard receives and saves all incoming messages. If necessary, it can notify an administrator, operator, or business owner by various means. The application can monitor both stationary and mobile objects.
  • Motion detection and webcam monitoring. Video surveillance with multiple IP cams and video capture devices. When an alarm condition is detected, the program can sound an audible alarm, or send you an email with a photo. Automatically capture photos, or record video in compressed files. All settings, such as alerts, photos, and video recordings can be turned on(off) using the built-in scheduler. You can adjust the sensitivity of the detection.
  • Simulate the game of Blackjack. Set Game Rules, Play Strategy and Bet Strategy. Load Basic Play Strategy automatically for any combination of game rules. Set Bet Strategy by using formulas to calculate bet amounts after a loss or win, based on the initial bet on the previous hand. Practice your system by monitoring the simulation as bets are wagered, cards are displayed, decisions are made and results are shown according to your strategy setup.
  • Develop, test, optimize and practice Blackjack Bet and Play strategies by simulating the game based on Game Rules, Play Strategy and Bet Strategy set by you. See a graph of Bankroll Balance vs. Hand Number generated, and view key game statistics as the simulator progresses. Or, practice your system by monitoring the simulation as bets are wagered, cards are displayed, decisions are made, results are shown, and statistics are generated.
  • Win Spy Software Pro is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC or any Android (cell Phone or Tablet) device. WinSpy Software will capture anything the user sees or types on the keyboard. Win-spy will also capture WebCam shots and record surrounding sounds. Now Works behind Firewalls and Routers. New build includes JPG and PDF Remote File and Advanced Android Monitoring.
  • Silent Keylogger Free Edition is powerful free PC and Internet activity monitoring software that records everything on your PC. It secretly records all typed keystrokes, emails conversations, chats, visited websites, passwords, used applications and captures screenshots. Silent Keylogger allows you to find out what other users do on your computer in your absence. Monitor how your children use their computer online.
  • AggreGate SCADA/HMI is a system for visualizing and operating processes, production flows, machines and plants. It is a highly reliable multi-user distributed solution that provides supervisory control and monitoring for many sectors, such as Process Control, Industrial Automation, Building Automation, Telemetry, Remote Control and Monitoring, Test and Measurement, and Machine-To-Machine Communications (M2M).
  • Freeware Keylogger is a completely free award winning monitoring application. It runs in the background and allows you to monitor all keyboard activities performed on your PC, visited websites, e-mail, chat, openned application and files. Freeware Keylogger helps you to find out, what exactly took place in the system. You will find out what your employee or children search in the internet, and to check them.
  • Ultimate Keylogger Free Edition is a free popular all-round monitoring solution. It runs in the background and monitors all typed keystrikes, applications, passwords, clipboard, email, and visited websites' URLs. You can view the reports as HTML files. Ultimate Keylogger will help you to find out, what exactly took place in the system. You will be able to find out what your children search in the internet, and to check them.
  • Ultimate Keylogger is advanced all-round monitoring solution. It monitors all activities on computer systems including applications, keyboard, passwords, clipboard, chat, email, and visited websites. Ultimate Keylogger is completely undetectable. Process is hidden from task manager. Files are not visible. Ultimate Keylogger displays reports in web format or sends zip-compressed and encrypted activity reports invisibly via Email, FTP or LAN.
  • AggreGate Network Manager is an umbrella IT management platform. It provides out-of-the-box monitoring for IP networks, servers, routers, applications, services, traffic and performance. Product features include network discovery, L2/L3 mapping, alerting, event correlation, root cause analysis, charting, reporting, dashboards, network inventory and asset management, distributed monitoring, and more.
  • Proxy Log Explorer is the fastest and most powerful analysis application for monitoring the efficiency corporate Internet usage of your Proxy server. This application creates dynamic reports on-the-fly. Also, you can easily get virtually any subreport by just right-clicking the item you need and selecting the subreport you need. Needless to say, it can recognize log file formats automatically and extract compressed log files.
  • IPHost Network Monitor is a free network and server monitoring software for tracking of performance and availability of network equipment, web/intranet sites/applications via SNMP (UNIX/Linux/Mac) and WMI, HTTP, Oracle, MySQL, MS SQL, ODBC, FTP, SMTP, POP3, IMAP, PING & more. Custom scripts or programs as monitors, including Nagios plugins. SNMP MIB. Admin tools. Regular reports by email. The free version can be used with up to 50 monitors.
  • MobaSSH is a free SSH server for Windows, compatible with any ssh client (OpenSSH client, Putty, ...). MobaSSH comes with an easy to use installer and some useful GNU utilities for monitoring and managing a remote computer silently. It also allows you to transfer files securely with scp/sftp. MobaSSH is packaged in a small single executable that registers as a Windows service so that it can be monitored like other normal Windows services.
  • PureVPN maintains over 450+ servers in 89+ countries. It offers over 77,000 IPs to access all restricted content with full anonymity and security. The Windows VPN software features include: 1. Web Protection: Provide security against hackers, cyber spies etc. so users are able to browse, communicate or shop safely. 2. One Click Easy to Connect: Simply put user and password and hit the Quick Connect button. 3. Multiple Security Protocols: Windows VPN software offers PPTP, L2TP, & SSTP Encryption to ensure that the user critical information like credit card numbers, social media accounts etc. is unreadable for a spy. 4. Usage Purpose Selection: Purpose Selection feature lets you quickly & easily choose your desired purpose from a drop-down to get going. 5. Automatic Protocol Selection: PureVPN automatically chooses the most appropriate protocol as soon you select the purpose. You can, however, choose between 128 & 256 bit encryption from the Settings tab. 6. P2P In ...
  • Security Task Manager is a computer utility designed to offer full access to Windows processes. Security Task Manager's main focus is on your computer's currently running processes, and offers a great deal of information on them: process name, CPU usage, memory usage, file name and location, security rating and more. Protector will catch any mouse movement monitoring software, and will alert you if the Windows Registry has been tampered with.
  • Classoft Sheduling Manager was developed for easing the organization work and monitoring the working teams in activities like: service, sales, surgeries, tourism, hotels,pensions and any other type of working unit that can use the application for organizating the work.
  • oMega is more than a file manager. oMega supports all standard operations, typical for file managers or Windows Explorer, such as copy, move, delete. In addition oMega offers unusual features and operations, such as built-in powerful editor / viewer, secure deletion, fast splitting / joining of files, free space monitoring system. Archive function automates and adds new features that are not available in Windows Explorer and other programs. The search function allows you to remove the unwanted results on the go, search in encrypted archives and much more. Another special feature of the program is the handy and convenient interface, allowing easy customization to suit individual user preferences on what to display, choose comfortable font sizes, or a color scheme for files highlighting. oMega is primarily intended for those who own from many to lots of programs, and have to manage extensive directory structures. oMega has been designed specifically to serve as a control center for your computers, help ...
  • Heroix introduces its Longitude Hyper-V application to monitor Microsoft Hyper-V hypervisor. Longitude is a feature-rich, easy-to-use, affordable monitoring solution that companies use to track the health of their entire IT infrastructure: multiple operating systems, web servers, databases, messaging and networks. Longitude helps keep IT budgets in check by helping to locate and reduce virtual sprawl, over provisioning, and excess resource use.
  • KSnetManager is a revolutionary parental control tool that is distinct from other internet monitoring software: 1) Instead of being a hidden monitoring program, it is interactive. 2) Instead of passive monitoring, it actively controls and blocks unexpected activities. 3) It controls and monitors not only websites, but also all programs on your computer. 4) The program has a fully encrypted key logger; and much more.

Page 3 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware