Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Advertising
Display: short descriptions | full descriptions
  • Acronis Active Protection - advanced, active protection against data loss to ransomware. Acronis Notary ensures your backup data remains identical to the original data and delivers a unique certificate affirming the data was unaltered. Acronis ASign provides an audit trail for important documents by digitally capturing signatures and generating a unique certificate that contains images of the signatures, timestamps, and other information.
  • Secure File Sharing With Digital Rights Management.Safeguard file sharing without boundaries. AssureFiles Secure File Sharing combines AES 256 bit encryption with digital rights management to give businesses persistent control over all stages of its life,enable employees to share files safely. Dynamically control file access,grant or revoke the file access control at any time even files were shared. Keep tracking and auditing to the shared files.
  • NetCrunch Tools is a completely free toolkit for network professionals, featuring Ping, Traceroute, Wake OnLAN, DNS Info, Who Is, Ping Scanner, Service Scanner, Open TCP Port Scanner, SNMP Scanner, DNS Audit and Mac Resolver in one. It can work standalone, or in conjunction with the NetCrunch network monitoring system, an all-in-one, agentless network monitoring and management suite. It is free to use, with no usage limitations of any kind
  • Audit and recovery of Microsoft SQL Server passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.
  • Inventory and discover all computers using NEWT Professional network inventory. Get essential hardware and software information without ever having to visit a remote machine. We use advanced audit methods to retrieve the data you need into an easy-to-read spreadsheet-like view. Export all data to an MS Access database to generate detailed queries.
  • Audit and recovery of PostgreSQL passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.
  • Audit and recovery of MySQL passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Generation of reports on recovered passwords.
  • Audit and recovery of Oracle Database passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Generation of reports on recovered passwords.
  • Would you like to do more with your SEO software? Try WebSite Auditor a double-value on-page SEO tool that not only helps you get 100% search engine-friendly website structure, but ALSO fine-tune your content for your target keywords. Get in-software SEO suggestions based on the tactics used by your top-ranking competitors. Why pay more if you get the same value for less? Try WebSite Auditor for Free today, click Download.
  • Looking for a solid backlink checker? Try SEO SpyGlass! Use it to perform in-depth backlink audit OR to discover competitors' best-kept backlink secrets - SEO SpyGlass is fantastic at both! See which links come from the same domain or a deindexed site, what anchor texts are used, whether your links are dofollow or nofollow, learn what backlinks are from blogs/forums, etc. A Free trial is available!
  • WebSite Auditor is a highly effective and professional tool. With the help of it you can easily spot broken links, redirect chains, W3C validation errors. It allows you to carry out content optimization directly in the tool and find duplicate titles or empty description tags. On top of that, WebSite Auditor is now offering a Website Visualization feature which builds graphic representation of your website's structure.
  • SEO PowerSuite is an effective all-in-one solution for professional SEO service providers. 4 tools performing every task an SEO encounters on a daily basis: keyword research (20+ methods), rank tracking, on-page SEO audit, backlink analysis, link management, competition research and - last but not least - impressive, customizable SEO reports for your clients. Need a hand with SEO? Try SEO PowerSuite for Free today!
  • Recover and restore damaged or corrupted SharePoint database files. It is the best and professional tool for repairing and recovering SharePoint server files and it is worldwide popular tool and used by many users. It comes with Powerful algorithm which has the capability to fix all types of errors related to SharePoint files. It can fix SharePoint database file such as contents, corrupted sites or deleted sites and sub sites, tables, documents, metadata, constraints, search, view, indexes and many more files related to SharePoint. The tool is user friendly and comes with self description which helps you to understand how to use and operate it. It does not require any skilled person, a normal computer users can use this very easily. SharePoint server tool is specifically designed which completely scan your system and reports to you, reconstruct delegated access, provides security control and has auditing features. SharePoint server tool can fix and recover any types of error related to SharePoint Server fil ...
  • The Cisco Documentation Toolkit is designed to enable easier documentation of data center and branch office infrastructure. The documentation tools include PuTTY, Cisco Active Advisor, Configuration Audits, Angry IP Scanner, Lucid Chart Drawing and Box. The documentation tools are launched with easy point and click. In addition there are equipment forms and a network documentation roadmap guide.
  • QBW Password by Thegrideon Software is advanced QuickBooks security audit and cleanup tool as well as password recovery and replacement (reset) tool. QBW Password works with all editions (US, CA, UK) and version including QB 2016. QBW Password scans for mishandled (accessible without proper access) sensitive data and encryption keys and can cleanup records compromising data security. Lost passwords can be recovered or instantly replaced as well.
  • Handy Library Software for Windows. Library management software for small school, public, corporate libraries. Easily catalog all library collections from the web using ISBN number, manage serials, manage member information, keep track of the library check-in and check-out transactions, process inventory audit. Print library circulation reports. Print library inventory reports. Define circulation rules, and more.
  • Audit file access and change in Windows in Real-Time.Monitor the file activities on file system level, capture file open, create, overwrite, read, write, query file information, set file information, query security information, set security information, file rename, file delete, directory browsing and file close I/O requests.You can create the file access log, you will know who, when, what files were accessed.
  • ChequePRO a cheque writing/printing software enabling thousands of users all over the world to enjoy the simplicity and comfort of cheque writing. Ranging from a single owner company to Corporations, Banks, Auditing Firms, Embassies, etc. The ChequePRO (Cheque Printing writing Software) program helps you to print on any bank cheque, and manage your customer and bank information pro actively. ChequePRO does not only print on to a bank cheque but also maintains the information of cheque number the amount you paid, whom you paid, the reason why you made the payment. It also has bank wise reports, post dated cheque alerts and payment voucher printing facility. You have bank wise and customer wise reports which can be Exported to Excel, word, adobe, html, etc. BATCH PRINTING of multiple Cheques in one go. This software stores your clients and Cheques information to a secure database. You also have facilities like inserting , deleting, updating of customer records and Cheques information efficiently.
  • Axence nVision gives you everything you need to manage your network in an efficient and effective manner. The application consists of 5 modules (centrally managed): proactive network monitoring and visualization; hardware and software inventory (license audit); intelligent user monitoring (blocking websites); data leak protection (port blocking), helpdesk (remote access, trouble ticket database, chat) - all with a wide range of alerts & reports.
  • Auditing device configurations against a secure standard like the DISA STIGs is a critical defense against cyberattacks. The SecureVue STIG Profiler automates the profiling of devices on a network in preparation for a DISA STIG audit. Using the STIG Profiler, an IA Manager can quickly identify all of the nodes on the network, scan the devices for detailed asset information and generate a report.
  • CallbackRegistry is a Windows SDK (library) to track and control registry access and operations, perform audit and continuous data protection. CallbackRegistry provides a driver, which calls your application when some application performs a registry operation, such as key or value reading, writing or deletion. Your application can alter the data in the request, redirect the request or deny it altogether. Or you can just log the access, if needed.
  • DEKSI Network Suite is a set of award winning network software tools that allow you to monitor devices and servers on your network, obtain online data when the time a device becomes available and when it times out or goes out of service, and thus ensure a proactive response to any network problems your organization might encounter. The network software bundle also allows you to monitor the Internet and local traffic usage on your LAN, to manage network devices (switches, workstations, and servers), and to create a database of all the software and hardware that is installed on your network and help you monitor any changes that have occurred on your network and remote computers. DEKSI Network Inventory will allow you to have a comprehensive and detailed audit of your software License Keys and Serial Numbers and will enable you to enter valid serial numbers and license keys for your products and discover if unauthorized or illegal copies of those software products are installed on various computers on your n ...
  • Hidden faces is a vivid manifestation of the possibility to test and train visual memory. Visual memory is the special nature of memory, based mainly on visual impressions, capable of holding and replaying extremely vivid image of a previously observed object or phenomenon. This may, and often does also include saturated images on other channels of perception (auditory, tactile, movement, taste, smell, etc.).
  • Hidden faces is a vivid manifestation of the possibility to test and train visual memory. Visual memory is the special nature of memory, based mainly on visual impressions, capable of holding and replaying extremely vivid image of a previously observed object or phenomenon. This may, and often does also include saturated images on other channels of perception (auditory, tactile, movement, taste, smell, etc.).
  • dbForge Event Profiler for SQL Server is a free tool for capturing and analyzing SQL Server events and save data about each event t. The tool provides convenient GUI to SQL Trace for inspecting a Database Engine instance. For instance, user can audit a production environment to determine which stored procedures are affecting performance by executing too slowly.
Advertising

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware