Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: administrator
Advertising
Display: short descriptions | full descriptions
  • Recovery Toolbox for Lotus Notes is an indispensable data recovery tool intended for any system administrator in an organization that heavily relies on Lotus. The work of Recovery Toolbox for Lotus Notes is based on a convenient recovery wizard that guides the user through the process. Recovery Toolbox for Lotus Notes efficiently solves the problem of ad hoc data recovery from damaged .NSF files that can be performed literally by anyone.
  • Private Shell is an easy to configure SSH client for Windows. With a useful autoconfiguration option, SSH tunneling and Secure FTP (SFTP) client, it is more than a simple SSH client. Major features include: SSH1, SSH2 support, SFTP, scripting, SOCK5, tunneling, X11 forwarding, and more. System administrators will find the silent installation feature useful to install Private Shell over a local network. Download a free evaluation version.
  • Now, you can see for yourself what your employees do on their desktops during office hours and that too without being physically present in front of them. Yes, it is possible with the help of computer monitoring software. It facilitates the administrator to restrict the misuse of organization?s resources by employees, unnecessary chatting, internet surfing, access to social networking sites during working hours. Administrator comes to know about the possible security breaches if any, while invisibly monitoring varied computers at the same time. Also, this advanced utility enables the user to execute commands like Shut down, Restart, Lock, remove wallpaper, start screensaver, etc. on the monitored computers. Also, administrator can schedule online as well as offline recording of the monitored computers. Offline recording of the software is helpful when admin or manager is not available on desk. This recording is saved in AVI format and can be checked later or saved for future references as a proof. For calcula ...
  • RecoveryFix Employee Activity Monitor is an invisible software tool that is highly useful for business managers, organizations and home users with which you can easily monitor the activities of employees, children and spouse. Employee Monitor Software helps the network administrators to review and monitor the activities of the employees around a network in real time. Using this tool, you can view the live desktop activities of a network. It also enables you to keep a close look on the employees activities by recording all the events occurred in the PCs. It records all the activities including the system processes, keystrokes, opening/closing of windows, FTP activities, website visits, internet activities, downloading etc., creating desktop screenshots and chat logs. Using this tool; you can monitor several PCs of your organization from a remote place also. This eminent Employee Monitor Software also facilitates the users to create offline logs of the monitored computer activities to view them later. Th ...
  • WinINSTALL LE has been the most popular free MSI package builder for almost two decades. Featuring software packaging and application installer management, WinINSTALL has been a long-term favorite with administrators. Now, Scalable has significantly overhauled WinINSTALL LE and released a new, free MSI creator called Scalable Smart Packager CE. If you want to package Windows Installer Setups try Smart Packager Pro.
  • AdSysNet Active Directory Reports is a simple and effective active directory reporting tool. Administrators are able to keep their active directory environment clean and secure. The report generation is very progressive. Security reports and NTFS reports sections provides the very important security information of the active directory objects and file server shares. The reports can be exported(CSV,HTML,DOC,XLS,PDF) and scheduled.
  • Malicious File Hunter, or MFH for short, is a security software that runs on Windows and allows IT Security Administrators to search for the presence of one or multiple files across their entire network of Windows systems. For example, if a known malicious file is found on one computer, an IT Administrator can use MFH to check if any other system on the network is infected with the same malware. Search query is based on full, partial or wild card
  • ASN Active Directory Reports is a simple desktop tool for Windows Active Directory Reporting. It Allows to produce reports for Active Directory objects (user, group, computer, contact, OU, fine grained password policy and gpo). This tool allows the administrator to configure advanced search settings on the reports. The generated Reports can be saved as XLS, PDF, CSV, HTML and MSWORD files.More or less attributes can be set for every report .
  • Netwrix Active Directory Change Reporter reports changes made to Active Directory and generates audit reports on a daily basis. The reports include Who, What, When, and Where of all changes and include "before" and "after" values for each setting. This report lists changes made to AD and Exchange configurations, mailboxes, AD schema, and more. The product has freeware and commercial editions.
  • The Computer Geek program is not a tool for ordinary computer users, rather for the more experienced users like system administrators etc. And obviously for all the geeks out there :-) That said, there are parts of this program that should fit most computer users, but also a few tools that requires knowledge. Like the ADS tool, and the Portscanner tool. ADS can be used for malicious purposes, and so can Portscanners. Use at your own risk.
  • Blacklist monitor software lets e-mail system administrators know before users told them that there is a problem in outbound e-mail messages because DNS blacklist monitor software continuously checks if your public IP address is listed in any DNS blacklist and if public IP address of email server has been accidentally registered in any DNS blacklist zone, DNS blacklist monitor software will send a notification to the administrator to take action.
  • No more telling, nagging or trying to educate your children to spend less time on the home computer. No siblings' arguments: 'it's my turn now', 'you have been on it for so long...', etc. Just relax and let Fred take control. AlaTimer lets you restrict each child (Windows user) to a daily number of minutes. Sixty (60) seconds prior to this period expiring a message will pop-up, asking the user to logoff. AlaTimer could be configured to either logoff, shutdown or restart the computer, at the end of this period. Mouse hover over Fred's icon and a short message pops-up showing how long you have spent using the computer and how many more minutes are left, for the day. Click the mouse left button and the computer and Internet schedule pops up. AlaFredy configures AlaTimer - using AlaFredy a computer Administrator can read, display and/or modify all AlaTimer settings, over a (home) network, from any of the network computers. So, with AlaTime ...
  • ApPHP Medical Appointment is online doctor, therapist appointment and medical clinic site PHP script. This Appointment System is an application for handling doctors appointments. It enables patients to book an appointment using web-based interface, and administrator of the clinic is able to approve/reject the appointment. Site visitors can perform search by doctor specialty and/or doctor name, view doctor availability and book appointments.
  • Frozen Spam is the ULTIMATE ZERO SPAM solution for Smartermail users and / or administrators. It uses a proven technology with zero fault and has been designed specifically to fit the need of Smartermail server's administrators.
  • Lepide Event Log Manager is a sophisticated tool that empowers the user to avail the information about a site which includes accessed files, activity status, traversed paths, referring pages, search engines, browser related information, etc. The software archives the event logs of the entire network in a central repository which makes it extremely simple and easy to maintain them. Also, it generates timely notifications and alerts to inform the administrator whenever any critical event related to event logs takes place. Using this efficacious utility, event browsing for all the systems within the entire network can be simplified. Moreover, it facilitates you to view the specific or all windows and W3C event logs from a centralized platform. Also, it provides compliance reports for HIPAA, PCI, SOX, FISMA and GLBA and thus sustains compliance and also help in avoiding the legal hassles. The software has two editions- A Freeware edition and Enterprise edition. The users can choose any one as per their need and u ...
  • Do you want to know how your employees are using their internet? Just try RecoveryFIX Employee Activity Monitor, a sophisticated tool for internet activity monitoring. The software is easy to install and requires no specific skill set to operate. With this tool, you can easily get details of website visited, and date and time of visiting. You also can have the screenshots and logs of all the activities.
  • Protect your computer and restrict access to Internet with Security Administrator. This nice password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, Printers, System and Internet Options. You can disable your boot keys, cont
  • Comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to every corner of PC workstation, apply executable patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer connected to a TCP/IP-based network or Internet. In total, 1st Network Admin supports over 600 different security restrictions, options and tweaks.
  • Access Administrator Pro is intended for controlling access to files and folders situated on local media of Windows win98/ME/NT/2000/XP/vista at Windows kernel level. It alows to allocate access to files and folders between users according to predefined schedules, and protects system files and folders such as the Windows System, Registry and Swap files.
  • Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and..
  • Manage calendars, contacts and tasks. Synchronize with internet calendars and contacts. Subscribe to internet calendars. Access your data through any third-party cloud network, or share the data in your home/office network. Use groups, subgroups, drag & drop options for keeping records. Print labels and envelopes, calendars and address books with customizable templates. Advanced installer does not require administrator access.
  • SQL Server Restore Toolbox is powerful and efficient way of database recovery in MS SQL Server format. This program provides small size of its binaries, friendly interface and powerful engine of data restoration, suitable in all instances of SQL analysis. Sure it is designed for database administrators, but the ease of interface allows other users to execute the same processes on their computers when it is necessary.
  • Kernel Computer Activity monitor is the software to trust when it is important to track all computer activities of employees. It captures snapshot of the target computer screen at specific intervals. One can specify maximum size of snapshots and also if snapshot should be of the active window. Every key that is pressed by user gets recorded. Administrator can check what all keys were typed after analyzing the keystrokes. Kernel Computer Activity Monitor records every internet activity ranging from browsers used, pages visited, visit time or user name. The tool enabled admin to look at the history of accessed application. Details such as name, launched time, executable path and launched by information are recorded about the application. The admin can save clipboard activities as well that can let you know everything that was copy-pasted including text and images. Kernel Computer Activity Monitor reports every email activity that is accessed without using SSL connection. The reports include date and time ...
  • SpotWin is Windows user accounts login and password recovery software. The software allows to recover forgotten Windows multiple login accounts passwords using one of the Admin accounts. For using SpotWin you should select a user account with administrator permissions that you can log on with its password. All the mentioned features are provided with a user friendly graphical interface.
Advertising

Page 3 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware