Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Geodata International - World-wide database of countries with georeferenced towns, municipalities, postal codes and administrative units with WGS84 and UTM coordinates and elevations for geocoding, proximity search, navigation, distance calculation. The database tables are present in the file format CSV (Comma Separated Values). The character set used is UTF8. This format is used often and in most cases you can import th data directly.
  • Malicious File Hunter, or MFH for short, is a security software that runs on Windows and allows IT Security Administrators to search for the presence of one or multiple files across their entire network of Windows systems. For example, if a known malicious file is found on one computer, an IT Administrator can use MFH to check if any other system on the network is infected with the same malware. Search query is based on full, partial or wild card
  • ASN Active Directory Reports is a simple desktop tool for Windows Active Directory Reporting. It Allows to produce reports for Active Directory objects (user, group, computer, contact, OU, fine grained password policy and gpo). This tool allows the administrator to configure advanced search settings on the reports. The generated Reports can be saved as XLS, PDF, CSV, HTML and MSWORD files.More or less attributes can be set for every report .
  • Netwrix Active Directory Change Reporter reports changes made to Active Directory and generates audit reports on a daily basis. The reports include Who, What, When, and Where of all changes and include "before" and "after" values for each setting. This report lists changes made to AD and Exchange configurations, mailboxes, AD schema, and more. The product has freeware and commercial editions.
  • Titan FTP Server is a powerful secure multi-threaded FTP/SFTP Server for Windows. Since Titan FTP is a fully multi-threaded Windows application, you can setup multiple servers all running simultaneously on different IP address/port combinations. Features secure file transfers using SSL; SFTP; Virtual Folders; user based access; file & directory permissions, disk quotas, UL/DL ratios, bandwidth throttling, local and remote administration.
  • The Computer Geek program is not a tool for ordinary computer users, rather for the more experienced users like system administrators etc. And obviously for all the geeks out there :-) That said, there are parts of this program that should fit most computer users, but also a few tools that requires knowledge. Like the ADS tool, and the Portscanner tool. ADS can be used for malicious purposes, and so can Portscanners. Use at your own risk.
  • Axence NetTools is a FREE set of very handy and useful network administration tools: NetWatch - network monitoring with alerting, real-time & historical charts; WinTools lists exhaustive system information from Windows computers; port scanner; network scanner; NetStat lists local inbound & outbound connections; TCP/IP workshop for low level service testing; ping; fast traceroute; DNS lookup; bandwidth test tool; SNMP browser and more.
  • Blacklist monitor software lets e-mail system administrators know before users told them that there is a problem in outbound e-mail messages because DNS blacklist monitor software continuously checks if your public IP address is listed in any DNS blacklist and if public IP address of email server has been accidentally registered in any DNS blacklist zone, DNS blacklist monitor software will send a notification to the administrator to take action.
  • No more telling, nagging or trying to educate your children to spend less time on the home computer. No siblings' arguments: 'it's my turn now', 'you have been on it for so long...', etc. Just relax and let Fred take control. AlaTimer lets you restrict each child (Windows user) to a daily number of minutes. Sixty (60) seconds prior to this period expiring a message will pop-up, asking the user to logoff. AlaTimer could be configured to either logoff, shutdown or restart the computer, at the end of this period. Mouse hover over Fred's icon and a short message pops-up showing how long you have spent using the computer and how many more minutes are left, for the day. Click the mouse left button and the computer and Internet schedule pops up. AlaFredy configures AlaTimer - using AlaFredy a computer Administrator can read, display and/or modify all AlaTimer settings, over a (home) network, from any of the network computers. So, with AlaTime ...
  • Power management in a single click for several computers or computer groups on a domain or workgroups. Remote Shutdown significantly simplifies network administration tasks by enabling you to shutdown or reboot for all machines on your LAN from your desk.
  • ApPHP Medical Appointment is online doctor, therapist appointment and medical clinic site PHP script. This Appointment System is an application for handling doctors appointments. It enables patients to book an appointment using web-based interface, and administrator of the clinic is able to approve/reject the appointment. Site visitors can perform search by doctor specialty and/or doctor name, view doctor availability and book appointments.
  • Frozen Spam is the ULTIMATE ZERO SPAM solution for Smartermail users and / or administrators. It uses a proven technology with zero fault and has been designed specifically to fit the need of Smartermail server's administrators.
  • The software abylon UAC-GRABBER extends the security concept introduced in Windows Vista, called “User Account Control (UAC)”. The program enables the administrative start of trusted applications without prompting the confirmation dialog box each time. In order for this the UAC security dialog will show only, if programs are executed without the knowledge of the user. An alternative start menu is available for Windows 8.
  • Launch the Command Prompt with or without administrative rights directly at any folder from Windows Explorer.Open Command Prompt Here is a free shell extension to the right click menu of Windows Explorer that adds a menu item to the right click context menu that opens the command prompt at the selected folder with or without admin rights. Both Windows 32bit and Windows 64bit are supported.
  • Can you keep all passwords and access data in your mind? The abylon KEYSAFE is a simply password manager to administrate all your secret passwords. You need only one MASTER-password or alternatively a removable media, CD, chip card or certificate as key. The stored data can pull simply with the mouse into the input fields of your browsers or program window (Drag&Drop). With abylon KEYGENERATOR the software also offer a random password generator.
  • Lepide Event Log Manager is a sophisticated tool that empowers the user to avail the information about a site which includes accessed files, activity status, traversed paths, referring pages, search engines, browser related information, etc. The software archives the event logs of the entire network in a central repository which makes it extremely simple and easy to maintain them. Also, it generates timely notifications and alerts to inform the administrator whenever any critical event related to event logs takes place. Using this efficacious utility, event browsing for all the systems within the entire network can be simplified. Moreover, it facilitates you to view the specific or all windows and W3C event logs from a centralized platform. Also, it provides compliance reports for HIPAA, PCI, SOX, FISMA and GLBA and thus sustains compliance and also help in avoiding the legal hassles. The software has two editions- A Freeware edition and Enterprise edition. The users can choose any one as per their need and u ...
  • Today in the engineered world many users have major problems with the multitude of passwords. With the software abylon LOGON SSO Pro, the user only authenticate once at the windows logon and have additionally an automatic access to password protected applications. The program boasts with high flexibility, centralized administration and enhanced protection against keyloggers and phishing attacks.
  • FTPshell Server is a Secure FTP Server and SSH2 Secure Shell Server available in a single software package. It simultaneously supports file transfer and remote access using FTP, FTPS, SFTP, Telnet, and Secure Shell. FTPshell Server can be administered using the control panel from the local computer. Users can be authenticated using local windows system accounts, active directory, or FTPshell Server specific accounts. Many advanced features such as download and upload resuming and file integrity verification using CRC, MD5, and SHA are also supported. FTPshell Server has passed the rigorous testing program for running on Windows Vista and has officially been certified for Windows Vista and Windows Server 2012 by Microsoft. A complete list of features is available on the product website at www.ftpshell.com. FTPshell Server is the only windows software solution you will ever need to support multiple internet file transfer protocols. Download it now and evaluate it free for 30 days.
  • Sysax Multi Server is a Secure FTP Server and SSH2 Secure Shell Server combined into a single product. It simultaneously supports remote access and file transfer using FTP, FTPS, SFTP, Telnet, and Secure Shell. It also supports web based file transfer using HTTP and HTTPS. Sysax Multi Server can be administered using the control panel from the local computer or remotely through a browser based web adiministration interface. Users can be authenticated using local windows system accounts, active directory, or Sysax Server specific accounts. Sysax Multi Server enables the execution of server scripts based on the triggers generated by user actions. For example, a script can be executed whenever a user has successfully logged in or has downloaded a file. The script can be used to send email notifications, perform additional file transfers and local file processing, or even run other programs. Many advanced features such as download and upload resuming and file integrity verification using CRC, MD5, and SH ...
  • Do you want to know how your employees are using their internet? Just try RecoveryFIX Employee Activity Monitor, a sophisticated tool for internet activity monitoring. The software is easy to install and requires no specific skill set to operate. With this tool, you can easily get details of website visited, and date and time of visiting. You also can have the screenshots and logs of all the activities.
  • Protect your computer and restrict access to Internet with Security Administrator. This nice password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, Printers, System and Internet Options. You can disable your boot keys, cont
  • Comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to every corner of PC workstation, apply executable patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer connected to a TCP/IP-based network or Internet. In total, 1st Network Admin supports over 600 different security restrictions, options and tweaks.
  • Access Administrator Pro is intended for controlling access to files and folders situated on local media of Windows win98/ME/NT/2000/XP/vista at Windows kernel level. It alows to allocate access to files and folders between users according to predefined schedules, and protects system files and folders such as the Windows System, Registry and Swap files.
  • Password management with synchronization. SecuStar administrates your passwords safely and clearly. Furthermore SecuStar can synchronize between several PCs, so you have access to your passwords from all the devices you are working with. SecuStar stores your password data using the AES-256 algorithm, which is approved in the U.S. for state documents classified top secret.
  • Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and..

Page 6 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware