Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Internet :: Servers
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Active Directory Change Auditing provides tracking, auditing, reporting, scheduling, live monitoring and change alerting unauthorized Active Directory vital changes in real time without the overhead of native Auditing. It also provides the detailed information like Who, What, When, Where, Which and Why for every changes.
  • KernSafe iStorage Server is an advanced and powerful, full-featured software-only iSCSI Target Server for Microsoft Windows (both commercial and free versions). iStorage Server is IP SAN solution and allows you quickly export an existing storage such physical disk, partition, CD/DVD-ROM to all the clients, that delivers immediate benefits allowing storage to be consolidated, virtualized and centrally managed...
  • Active Directory Change Auditing provides tracking, auditing, reporting, scheduling, live monitoring and change alerting unauthorized Active Directory vital changes in real time without the overhead of native Auditing. It also provides the detailed information like Who, What, When, Where, Which and Why for every changes.
  • AD Reports and Reporting Tool enables Active Directory computer Reports Active Directory OU Reports Active Directory User Reports Active Directory Group Reports Active Directory NTFS Reports Active Directory Passwords Reports Active Directory user logon Reports Active Directory GPO Reports Active Directory users Active Directory Reports for account lockout policy AD Reports for Last log on
  • Now no need to manage user accounts manually, as Chily User Management is there to help you out. It is a free enterprise level tool for Active Directory that helps to manage user accounts remotely. This local user management tool enables the administrator to change the status of any user account. The admin can remotely enable or disable any user account just through few mouse clicks. Software displays user account information for the selected computer from where the admin can change the status for available user accounts. Password for any selected user account can also be changed very easily with this local user management tool. Software helps the admin to save efforts and time he used to spent in managing user accounts locally. This local user management tool is a freeware utility and can be availed for simplifying user management task within a domain.
  • Active Directory Change Auditing provides tracking, auditing, reporting, scheduling, live monitoring and change alerting unauthorized Active Directory vital changes in real time without the overhead of native Auditing. It also provides the detailed information like Who, What, When, Where, Which and Why for every changes.
  • JiJi web based Active Directory Sharepoint Auditing Reporting Tool provides tracking, auditing, reporting, scheduling, live monitoring and change alerting unauthorized Active Directory vital changes in real time without the overhead of native Auditing. It also provides the detailed information like Who, What, When, Where, Which and Why for every changes. It enables forensics activity to ensure Enterprise Security and prevent Security Breach.
  • JiJi AD Bulk Manager - AD Bulk User Export is a secured client server model which helps administrator/a delegated user to make AD management process simple. You can create / modify / delete users, computers and contacts attributes in bulk (General Attributes, Exchange Attributes, Terminal Service Attributes etc).
  • AD Admin and Reporting Tool enables Active Directory computer Reports Active Directory OU Reports Active Directory User Reports Active Directory Group Reports Active Directory NTFS Reports Active Directory Passwords Reports Active Directory user logon Reports Active Directory GPO Reports Active Directory users Active Directory Reports for account lockout policy AD Reports for Last log on
  • Active Directory Last Logon enables Active Directory computer Reports Active Directory OU Reports Active Directory User Reports Active Directory Group Reports Active Directory NTFS Reports Active Directory Passwords Reports Active Directory user logon Reports Active Directory GPO Reports Active Directory users Active Directory Reports for account lockout policy AD Reports for Last log on
  • Create a secure and stable instant messaging system with BigAnt IM Server. The administrative level of BigAnt IM Server is particular designed for business use. Easy for maintenance and with advanced features. Key Features 1. Simple installation and configuration. 2. Integrate with Windows Active Directory. 3. Configure roles and permissions. 4. History message logging and archiving. 5. Everything is under IT administrator's control.
  • JiJi web based Active Directory Change Auditing Reporting Tool provides tracking, auditing, reporting, scheduling, live monitoring and change alerting unauthorized Active Directory vital changes in real time without the overhead of native Auditing. It also provides the detailed information like Who, What, When, Where, Which and Why for every changes.
  • Super Network Tunnel = SocksCap+Bidirectional Http Tunnel +Remote Control. Normally used in building a network tunnel between the home and office computer,it's alias name is home2office. It creates a real privately owned bidirectional virtual data connection tunnelled in HTTP requests or Tcp connection,and easy bypass firewall and NAT.Genuine two-way tunnel, can start connection by any party tunnel.
  • JiJi web based Active Directory Change Auditing Reporting Tool provides tracking, auditing, reporting, scheduling, live monitoring and change alerting unauthorized Active Directory vital changes in real time without the overhead of native Auditing. It also provides the detailed information like Who, What, When, Where, Which and Why for every changes. It enables forensics activity to ensure Enterprise Security and prevent Security Breach.
  • Provides reports about the state of enterprise IT-infrastructure, security audit, inventory of hardware and software, and preparation for migration and upgrade. The product's historical and statistical reports allow changes in infrastructure to be clearly presented and evaluated, so that accurate prognoses and relevant development plans can be made. Agentless data collection. Reports on Active Directory, Exchange Server, local computer resources.
  • This tool enables the Terminal Services (TSE) or Citrix administrator to hide the server disk drives when users open a remote session. Hide Server Drives program does more than just hiding the TS server drives! It also hides all of the root folders and the user profils folders of the 2003/2008 TSE server or TS Gateway. Doing so, a user that would broswe files within a session will see nothing.
  • Active Directory Change Auditing provides tracking, auditing, reporting, scheduling, live monitoring and change alerting unauthorized Active Directory vital changes in real time without the overhead of native Auditing. It also provides the detailed information like Who, What, When, Where, Which and Why for every changes.
  • JiJi web based Active Directory Change Auditing Reporting Tool provides tracking, auditing, reporting, scheduling, live monitoring and change alerting unauthorized Active Directory vital changes in real time without the overhead of native Auditing. It also provides the detailed information like Who, What, When, Where, Which and Why for every changes. It enables forensics activity to ensure Enterprise Security and prevent Security Breach.
  • Robust and secure reverse proxy server solution. A securing and accelerating reverse proxy with the best price-to-performance ratio, IQProxy offers fast RAM/DISK cache, URL rewrite, GZip compression and SSL offloading as well as load-balancing with smart failover and sticky sessions. Downloadable for Win32/64, IQProxy comes 30-day trial and moneyback guarantee.
  • It is essential for every organisations to report their internal audit structure to Securities and Exchange Commission(SEC). The scandal made by the organisations is the major cause for the development of SOX. It improves the reliability of financial reporting and increases public awareness about the importance of audits.
  • JiJi web based Active Directory Change Auditing Reporting Tool provides tracking, auditing, reporting, scheduling, live monitoring and change alerting unauthorized Active Directory vital changes in real time without the overhead of native Auditing. It also provides the detailed information like Who, What, When, Where, Which and Why for every changes. It enables forensics activity to ensure Enterprise Security and prevent Security Breach.
  • HarePoint Workflow Monitor is a solution for monitoring workflow states in the SharePoint 2010 environment. The product displays all active workflow instances or workflow associations at any scope, e.g. the whole farm, specific web application, site collection, site, or list. The product provides essential features for workflow management: workflow state control, full details about workflow execution, bottleneck and errors detection.
  • "MiniWebSrv" is an HTTP Web server. It's small and fast, has a dynamic IP updater, shows local and external IP, a download counter, IP server, folder list ... If what you want is to have your own personal web server at home, this is your choice.
  • For debugging and publishing HTML sites. It is a very simple web server and when a HTTP query is received it simply gives files from the chosen directory without indicating any MIME-types
  • KernSafe iStorage Server is an advanced and powerful, full-featured software-only iSCSI Target Server for Microsoft Windows (both commercial and free versions). iStorage Server is IP SAN solution and allows you quickly export an existing storage such physical disk, partition, CD/DVD-ROM to all the clients, that delivers immediate benefits allowing storage to be consolidated, virtualized and centrally managed...

Page 2 of 12
1 2 3 4 5 6 7 8 9 10 11 12


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware