Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Network
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Reliable Subnet Calculator is a security solution that allows one to quickly calculate subnet mask for a given IP address range. Necessity to accurately calculate subnet mask can be a very tedious task for individuals lacking thorough understanding of IP addressing, subnetting and other networking concepts. Reliable Subnet Calculator is extremely useful in situations when one needs to quickly block entire IP address range from accessing specific
  • When the Wi-Fi Scanner begins to run, you will immediately see all wireless networks located nearby and its signal level. You can work out the optimal position for their access point at home, so that the signal is accessible throughout their home.
  • The software is designed for monitoring the availability of hosts connected to the LAN or Internet (computers, servers, routers, switches), and alerting administrators in case of failures. Key features of AgataSoft PingMaster Pro: ICMP checks. SNMP checks. HTTP checks websites or web-servers. Inboard SNMP utility. ICMP latency monitoring. Traffic monitoring. E-mail, ICQ, Sound and visual alert. SysLog server connected with the program data.
  • This tool is used to query a server running the network time protocol service and is compatible with all current versions of the NTP protocol. The following information can be queried mode, leap indicator, stratum, version number, poll interval, precision, root delay, root dispersion, reference ID, reference timestamp, transmit timestamp, round trip delay, local clock offset.
  • SysAdminAssist from Osirium is a free application which allows Security and System Administrators to quickly identify and access infrastructure devices and applications through it's console launcher. It supports any infrastructure device or application that has an SSH, HTTP, HTTPs, Telnet, RDP or VNC interface.
  • Free Wake-on-LAN utility with UI to wake up remote PCs in LAN. It's designed to work in networks of any size in order to perform centralized wake up of multiple remote PCs. It features an automatic MAC address detection mechanism, so you don't need to specify MAC addresses of remote PCs manually. Wake up command can be initiated with a single click - you only have to select target PCs.
  • The WhatsUp Gold PortScanner tool makes sure all the doors on your network are locked and secure, providing the visibility you need to ensure your hosts are secure. Close the door on unwanted intruders - download WhatsUp Gold PortScanner today!
  • Are you a network engineer who is looking for an always-on, service based tool to simplify and secure the transfer of system or configuration files across your network? The WhatsUp Gold TFTP Server allows you to save time and effort while uploading and downloading files. Use it to securely transfer operating system software or device configuration files across computers and devices in your network.
  • wwPCRemote lets you remotely control your PC using your iPhone. Things you can control include: - Devantech USB relays, which let you turn on and off lights in your house, open/close your garage door, etc., - Hardware and software that react to UDP messaging, - the restarting and shutting down of your PC and other PCs connected to yours over your network, and even - turning on other PCs connected to yours over your network.
  • With ThinRDP, users can access all of their Windows programs, documents, files, and network resources through their preferred device PC, iPhone, iPad, Android tablet, ChromeBook, or any other device that supports HTML5. ThinRDP enables secure access to any PC on the corporate LAN through a single, public IP address. This includes access to applications and desktops running Microsoft RDS/ Terminal Services and RDS/VDI platforms.
  • This network inventory tool allows you to collect hardware and software inventory data from Windows PCs in a local network into a centralized database. Inventory information can be collected from network PCs remotely in a silent mode. You don't need to install any client modules on remote PCs. The collected information includes detailed specifications of all hardware and software assets and is used to generate various inventory reports.
  • Using Computer activity monitoring software, the user can monitor and capture the activities of the computer desktop of employees within the entire LAN. It lets you to take the full control of the monitored computer. Record monitored activities with online and offline recording options. The tool fully supports Windows 8, 7, Vista, XP, 2000 and 2003 operating systems. The saved recordings are easy to view in movie format with Windows Media Player.
  • This basic software inventory tool allows you to collect data on installed applications and software updates from Windows PCs located in a LAN/WAN. The collected information includes the application name, vendor, version and other parameters available in the Windows Add/Remove Programs list. It is saved into a database and can be compared with previously extracted data to detect any software changes that may have taken place on every PC.
  • Lepide SOX compliance software is one such effective software license compliance tool that can boost up your IT infrastructure. Perhaps, it is one such effective software that facilitates user to create detailed reports regarding installed licenses, software location and software validity. Adding to that, the tool also facilitates user save these reports in CSV, RTF, HTML and PDF format to access them whenever needed for internal and external audits. The most remarkable attribute of this Lepide SOX Compliance software is it helps you protect information from unauthorized access. With this software, you can monitor and get to know about any possible security breaches by analyzing the information on the corporate network. Moreover, the most remarkable aspect of this tool is it enables organization to be prepared for license contract refusal by providing a complete view of enterprise wide software deployment. for more information please visit: www.softwarelicensecompliance.org
  • Many employees misuse office computers in unofficial activities that adversely affect the productivity of the organization. With Employee Desktop Live Viewer, organizations can effectively monitor and administer such employees who misuse office computers. It is a versatile network activity monitoring software to monitor user activities on the LAN or WAN network. Employee Desktop Live Viewer monitors every single desktop activity with complete secrecy in stealth and invisible modes. It record and save employee desktop activities in AVI video file format. Acting as ideal Network Activity Monitoring software, it enable network administrator to send notification messages on targeted employee desktops. It also enable administrator to perform multiple tasks on desktop screen of the employee such as removing screensaver, locking or unlocking screen and others. Moreover, this Network Activity monitoring tool can schedule both online and offline recordings of the desktop screen, that can be viewed by the administrator ...
  • HIPAA Compliance Software License Management is a one of the most common practices followed by most organizations these days to guarantee that the licensing process is completed without any legal violations. HIPAA compliance software enables organizations in discovering their networks and identifying unwanted applications. Today where meeting compliance standards and fulfilling all the policies presented in a software license agreement is essential before procuring software, with this license management software you can successfully have a clear and transparent picture about the used and available software licenses. Perhaps, it is one such HIPAA compliance software that allows you in enforcing license compliance. In addition with this license management tool, you can also perform Internal and external software audits. A proper usage of this HIPAA compliance software further permits you to generate accurate compliance reports about those applications which are yet to be purchased or are not licensed. For more ...
  • This monitor event logs tool makes the event log management process simple and flawless. Therefore, you need not move from one computer system to another for log management. This monitor event logs tool offers instant troubleshooting for system performance issues. This monitor event logs tool enables you to perform real time event monitoring as it enables you to create alerts. Moreover, this monitor event logs tool gives the system administrators the power to filter Windows and W3C event logs based on different event log types. Lepide Event Log Manager tool comes with an absolutely smashing, intuitive, self-descriptive, and easy-to-understand graphical user interface which does not require any special technical skills to work on it. This monitor event logs tool also comes bundled with a free evaluation version. Using this free evaluation version, you can monitor the event logs on one hand and evaluate the various features, capabilities, as well as performance of the tool on the other hand. ...
  • With ThinRDP, users can access all of their Windows programs, documents, files, and network resources through their preferred device PC, iPhone, iPad, Android tablet, ChromeBook, or any other device that supports HTML5. ThinRDP enables secure access to any PC on the corporate LAN through a single, public IP address. This includes access to applications and desktops running Microsoft RDS/ Terminal Services and RDS/VDI platforms.
  • SolarWinds storage management software is comprehensive, affordable & easy-to-use. Storage Manager couples real-time storage monitoring with historical trend analysis to help you manage the performance & growth of your storage network & avoid costly outages. Use it with Virtual & Server Profiler to keep an eye on your entire IT environment-from applications & logical connections to the actual physical infrastructure.
  • Ping Monitor is a simple gadget that was designed in order to provide you with a simple means of pinging a server and viewing the ping results in real-time. Up to 5 servers. Save settings to file. (File will be created - Path: %APPDATA% Filename: gadgetname_Settings.ini). Color changeable for all gadget's elements, including background.
  • Employee Desktop Live Viewer tracks employees of the IT organization from a centralized location. It is available in two setup files i.e., Viewer Setup for main computer and Agent Setup for client computers of the network. Agent computers are connected with main Server through Viewer Setup program.Employee Computer Monitoring tool works on domain as well as workgroup networks. It tracks every user activity on the network during specific time. Employee Activity Monitoring software monitor employee internet activities such as file download or upload, web browsing, online chatting, watching Live videos and many more. It also records employee desktop activities and saves results in AVI files.Employee internet Monitoring software can also schedule recordings of agent computers on daily, weekly and monthly basis. It schedule offline recordings of employee desktops when network administrator is not in the office. Internet monitoring software can also perform several remote tasks on employee desktops such as adding n ...
  • The main purpose of use is automatic routing when network link (in example VPN connection) is going up or down. However, executing commands can be anything - not routing related only. Just for an example, you may want to autostart MS Word when your VPN-connection link is goig up - it's also quite possible.
  • GuardBay Remote Employee Parenetal Monitoring Software is a surveillance software that allows you to monitor your employees or children from anywhere in the world using devices such as iPhone, Android mobiles. You can monitor and record employee's internet and program usage, keystrokes, emails, file transfers, instant message even when you are out of the office.
  • Suppose a computer is stolen or lost, using our services is possible know the history of every connection to the internet made with its IP address, DNS, connection start and end date time, connection duration. This information is vital at the time of rescue lost or stolen laptop computer, due to the fact that the majority of Internet Service Providers (ISP) know the locations of IP they assign. This information provided in time to local police or ISP managers will help to get back the laptop computer in most of the cases. Capture Computer Thief system, have the main goal of easy, cheap and without additional hardware equipment help to track Laptop computer location, based in the connections made from the computer to the internet. It works installing a simple and free software application in the computer and registering this computer with an account in our web system. All information stored in our web system preserve privacy and one computer data can be displayed for only one user, its owner. Software in ...
  • See the screens of other computers connected to your network. Employers can observe what their employees are doing in the work place, and parents can observe what their kids are doing at home! When you need their attention, send them an on-screen Instant Message to let them know you're watching. Application works through LAN, WLAN or VPN. When installing, use MANAGER SETUP for the administrator, and EMPLOYEE SETUP up for the others. 100% FREEWARE

Page 6 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware