Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Network
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • The CAS BACnet Object Monitor is a software designed to run on a Windows computer for the purpose of testing a connection to a BACnet IP device, or to monitor a BACnet IP device. A user can configure BACnet data points either manually through a configuration screen or by importing a configuration file. The user can then view connection and status details of the configure points on the status screen.
  • Domain computers, users manager based on Active Directory, WMI. It is intended for use system administrators or other IT personnel to keep control of the local network with users' computers without moving from his workplace. Here are some key features of Foxy Admin: Reading the structure of the AD domain. Customizable inventory computers on a network. Customizable report to print. Quick ping all network computers. Manage folders, files, processes, services, shares on remote machines. Transfers files between any remote computers, as between folders on the local computer. Search by name of the process the list of computers on which it runs, and mass killing it if necessary. Mass execution of commands on the selected list of computers. Remote connection with automatic installation of Tight VNC server and further management of others computer. And much more.
  • MING Wireless Monitor is a simple and affordable software solution for users who want to control, monitor, and archive unlimited Internet traffic on the local wireless LAN, including instant messages (AOL, MSN, Yahoo, ICQ, MySpaceIM, FacebookIM, WarcraftIM and QQ), emails sent and received, web sites visited, and files downloaded. The manager can view records in the database, search by key word, watch top users, monitor bandwidth and so on.
  • SNMP Explorer (SE) is a tool that enables you to easily browse the Management Information Base (MIB) exposed by systems with SNMP agents. SNMP Explorer extracts or "walks" the MIB of a selected SNMP agent system and creates a structured view of the agent's MIB. A tree view of the MIB allows quick exploration of the MIB to locate objects of interest. The current value of MIB objects are displayed along with object descriptions.
  • eBLVD enables fast, easy and secure remote access over the cloud to a computer or server from any web browser. You can view desktops remotely from anywhere with a simple click of your mouse. Thousands of companies around the world use eBLVD remote access software as often as needed for one low, flat-rate price. It's as good as being there! Sign up now for a 14-day free trial and see why Master NewMedia describes eBLVD as "GoToMyPC on steroids".
  • The program is intended for the remote monitoring of events of ConSeal PC Firewall (CSPCFW) of versions 2.x in a real time, statistical analysis of connections and possible attacks at the defended system. CSPCFW not having even of elementary resources of remote access to outcomes of its operation, that creates definite disadvantages in usage. ConSeal Log View eliminates this disadvantage and adds a number of new useful possibilities.
  • This network inventory tool allows you to collect hardware and software inventory data from Windows PCs in a local network into a centralized database. Inventory information can be collected from network PCs remotely in a silent mode. You don't need to install any client modules on remote PCs. The collected information includes detailed specifications of all hardware and software assets and is used to generate various inventory reports.
  • With Syslog Watcher 4.0, those who administer or maintain networks can enjoy a useful utility that collects and processes syslog messages, sending you email alerts as required. It provides and efficient way of storing and displaying this important data. Data gathered can also be exported into a wide variety of other formats including XML, CSV and database formats. It is easy to use and makes the storage of large amounts of data possible.
  • Network activity monitoring software enables administrator to record both offline and online user activities on hourly, daily, weekly or monthly basis. It records various user activities such as visited websites, keystrokes pressed, files downloaded or uploaded and others in video files. Employee Desktop live viewer support MS Windows 98, ME, 2000, XP, Vista, 7 and 2008 servers
  • Employee Desktop Live Viewer caters the employee monitoring needs of large organizations. It helps in monitoring desktop activities of employees from the main system of the network. Moreover, this computer activity monitoring software also record user activities and save the activity details of employees in AVI file format. It also perform several functions on employee desktop remotely
  • LMC is a powerful Linux Server Administration Toolkit with features like Logfile Analysis, SSH Remote Access, File Management, X11 Remote Control, SysInfo HTML-Reports and Management Link Administration. The main linux logfile /var/log/messages includes general system alerts with hundreds of different sources. Almost all sources are logged with cryptical abbreviations. LMC explains the source name and gives you a detailed source description.
  • Looking for the best possible way to manage event logs then use this Lepide Event Log Management utility that can make windows event log management simple and easy task. Perhaps, this is one such proficient log management software that allows you manage event logs without facing any extra hassles. In fact, the software play a very vital role in enhancing network security by providing real-time alerts pertaining to Windows Event logs and W3C event logs. And, so in one way the log management software helps you stay compliant with different data security regulations including HIPAA, GLBA, SOX and PCI. The biggest advantage of using this log management software is it eliminates the need to move from one computer to another for log management. For an IT administrator, the log management software is very effective in decreasing their workload because it allows you to automate the secure collection of event logs. By making use of this Windows Event Log Manager, you can easily track file access activity or any proces ...
  • STOP purchasing or paying for software that you don?t need. Make use of Lepide Software Asset Management software and have an accurate and thorough system to discover, classify and inventory all network and software assets within the organization. In fact, it is one such software that empowers you with an automatic technique to audit software licenses over multiple computers connected within a network. The best aspect about this software is it facilitates you in having a more centralized software license compliance auditing. This IT asset management software further allows you see all software products installed on each and every computer in your organization and monitor the number of purchased software licenses. Acting as a software license manager, the tool helps you track the number of licenses you have purchased. And, therefore in one way helps you keep well informed about any instances when the number of installations exceeds the number of purchased license. In addition, the tool also allows in cr ...
  • With SolarWinds Virtualization Manager, our comprehensive virtualization management software that delivers integrated VMware capacity planning, VM sprawl control, performance monitoring, configuration management, and chargeback automation - all in one awesomely affordable product that's easy to download, deploy, and use. In fact it's so easy that you can be up and running in less than an hour!
  • SoftPI Flow Collector collects information about network flows from network equipment and stores it in database for future analysis. NetFlow v5 and rFlow protocols are supported. Built-in reporting engine and flexible database configuration are supported.
  • SoftPI Flow Collector collects information about network flows from network equipment and stores it in database for future analysis. NetFlow v5, v9, rFlow and IPFIX protocols are supported. Built-in reporting engine and flexible database configuration are supported.
  • Software Asset Management (SAM) is an important IT asset management strategy used by organizations to effectively manage their software assets. In this regard, Lepide Software Asset Management tool, which is an asset tracking software, helps enterprises in the overall management and optimization of software purchase, licensing, deployment, utilization and their maintenance. Asset management software is implemented for asset tracking along with performing other functions like compliance management, software audit execution and license management. Based on the IT infrastructure, resources and business goals of organizations, network inventory software facilitates accurate asset estimation and management. The elementary purpose of inventory management software is to control the software assets within an organization and limit legal and business risks which come along with software procurement. With the help of such IT asset management software organizations are able to manage the available infrastructure in a be ...
  • Did you know that thousands of domains expire every day? Now you can download lists of dropping domains, to get them before they get snapped up by big companies. Our software helps you analyze thousands of domains simultaneously! Our filters contain the most important criteria, which will help you pick up the most valuable domains.
  • A powerful and simple tool for changing the MAC address of a network adapter. You can spoof the MAC address, set the MAC address of another manufacturer or generate a random MAC address in just several mouse clicks. Your changes will be applied at once and they will be retained after you restart the system.
  • It's a free tool offered by tools4free.netr to keep your network's (including WI-FI) internet speed super fast and protect your PC from ARP spoofing attack , Anti NetCut 3 has the following features. 1- Automatic start with windows. 2- Working in system tray all the time. 3- display and log who is trying to cut your connection.
  • SurveilStar Any Web Protection is web protection software which can help you to monitor student online activity and record website visits, incoming and outgoing emails, MSN messages and files transferred. This web protection software can be also used as parental control tool and employee monitoring software to monitor children or employees' online activities.
  • ByteMon is a MRTG-like network monitoring solution (SNMP, WMI, Packet Filtering), giving administrators real-time information about the condition of networks and servers, while at the same time providing historical data and charts for reporting, resource planning and other administrative purposes.
  • PA Server Monitor is a Windows service that monitors the health and availability of Windows servers, network services (on Windows, Linux and other operating systems), and devices. No agents are needed to monitor remote servers. Also includes rich reporting on most monitored resources. PA Server Monitor can watch: Event logs, CPU, memory usage, free server disk space, changed files and directories, running Windows services, and much more.
  • What's an IT superhero like you supposed to do when faced with the unfathomable task of installing and enabling SNMP on Windows servers and workstations located 20,000 leagues across the sea? Well before you sink into the murky depths of despair, check out our FREE SNMP Enabler!
  • Packet analysis is so easy by using Packet Monitor. It can be setup with the hub on your network, and it will monitor all the traffic data on your network. It sniffs packets in the net communications and captures them when you need it to. It will warn you when something is happening on your network, even block them from access. It generates all the diagrams by the monitored data, and helps you to analyze the network.

Page 4 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2018 IT Shareware