Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: M :: monitor
Advertising
Display: short descriptions | full descriptions
  • In the game Forgotten Space, crazy flights in spaceships of the future are in store for you. Many high-profile shootings and bombings take place. Don't want to miss out on all this fun? Then go ahead and play if you dare! You have to fight with three kinds of enemies, monitor the fuel and armor levels, and dodge the asteroids and ... crush them into powder! The choice is yours!
  • Advanced Contact Manager is a simple contact management solution for your sales and technical support teams to keep track of your customers, open issues and call and contact history. Advanced Contact Manager can help your team handle all incoming and outgoing calls, track the history of client contacts and monitor performance of everyone in the team.
  • Crazy Ball is simple in design, but a very difficult to master shooter (they insure their monitors are in danger). The game has about 34 missions. Different backgrounds keep your interest. In Crazy Ball you will encounter several different enemies, and several different options to block strength and colors. The goal of the game is to complete all missions to score maximum points, and get into the top 10. Enjoy the game!
  • Advanced Contact Manager is a simple contact management solution for your sales and technical support teams to keep track of your customers, open issues and call and contact history. Advanced Contact Manager can help your team handle all incoming and outgoing calls, track the history of client contacts and monitor performance of everyone in the team.
  • The invoice template for Excel is a customer invoicing system with the ability to store invoices, products and customers, monitor inventory levels and perform advanced invoice sales reporting. The structure of the invoice system allows the insertion, update and quick access to saved products, customers, and historical customer invoices. Product and customer lists can be imported and exported for integration with existing systems.
  • NET-SMART monitors the condition of hard drives of the computers within your network. You do not need to install any special programs (agents) on the computers in order to know in what condition their hard drives are. It is enough to install NET-Smart on one of them and you will know what is going on with the hard drives of other computers within the network.
  • The Portfolio Performance Monitoring template enables the ongoing monitoring and periodic valuation of a portfolio of financial investments. The model allows the entering of investment transactions during a reporting period to calculate performance. Furthermore, incremental investment transactions undertaken during a period are fully accounted for in the period's performance calculations.
  • The Project Planning and Management template is a generic solution to plan and manage any project. Building the budget as tasks are identified facilitates the processes of business case proposal, valuation and funding. Progress can be monitored from automatic creation and updating from remote participant workbooks. Project performance can be monitored with best practice Earned Value Analysis throughout the complete project life cycle.
  • Spyrix Keylogger is a Powerful Invisible Software for remote monitoring of user activity:keystrokes logger, screenshots, passwords, facebook, Skype, web, chats, emails, IMs. Collected data can be viewed via remote secure web-account and also be automatically sent to email, dropbox, google drive, FTP, Local Network. Spyrix Keylogger is very easy to configure and use.
  • SpyShelter Free is a free version of SpyShelter Premium. It is an effective and easy-to-use security application that helps you to protect your system against known and unknown custom compiled malware such as keystroke loggers. SpyShelter constantly monitors all vulnerable areas in your operating system to ensure that your personal data is being protected from information-stealing malware. SpyShelter free is compatible with 32 bit systems only.
  • Rankaware is an SEO tool that makes keyword rank checking and monitoring fast and easy. This keyword position checker software performs bulk SERP position checking for targeted keywords on Google, Yahoo, Bing and tracks keyword ranking performance over time. Using intelligent self-learning technology, Rankaware is able to provide accurate results in intuitive charts and tables and generate scheduled, customizable SERP report in different formats.
  • SpyShelter Premium is an effective and easy-to-use security application that helps you to protect your system against known and unknown custom compiled malware such as keystroke loggers. SpyShelter constantly monitors all vulnerable areas in your operating system to ensure that your personal data is being protected from information-stealing malware. Now with keystroke encryption!
  • Visual monitoring (control) of availability of a host (network resource) in the local computer network, the Internet, etc. to its IPv4-address, by periodic sending to it inquiries under the ICMP protocol. In the course of work the LOG file containing detailed information on change of the status of availability of a controlled host is constantly kept
  • File system monitor filter can monitor the file system activities on the fly. With file system monitor filter you can monitor the file activities on file system level.File system control filter can control the file activities, which you can intercept the file system call, modify its content before or after the request goes down to the file system, allow/deny/cancel its execution based on the filter rule.
  • SpyShelter Firewall is an effective and easy-to-use security application that helps you to protect your system against known and unknown custom compiled malware such as keystroke loggers. SpyShelter Firewall constantly monitors all vulnerable areas in your operating system to ensure that your personal data is being protected from information-stealing malware.
  • Auto Kill Any Process is used to monitor and batch kill windows processes by simply launching the program. This can come in handy if you want to clean up a batch of related processes after working with any application, or if you want to clear a set of expendable processes before starting another RAM intensive application, or to automatically get rid of reincarnating processes, in just a few seconds, instead of using the tedious task manager.
  • Spyrix Employee Monitoring - cloud-based platform for tracking your employee computer activities. Spyrix allows remote (via web account) control of employees activity in the Internet including chats, messengers , Skype, social networks Facebook, LinkedIn, Twitter, search engines Google, Yahoo, Bing, apps activity, include games. Spyrix will also make screenshots of active windows, snapshots and video from webcamera, records from microphone.
  • Control and testing of IPv4-networks, fast obtaining various information on knots of system. Will help to define network safety of the chosen knot or it is simple to receive necessary data on a network and its knots. Includes the scanner of a network (subnet), the set range, for the purpose of identification of available working IP addresses (knots) with fast definition of their MAC addresses, allows to hold testing of the chosen knot to the know
  • Good Posture - this one of a kind program that monitors your posture. Requires no additional devices and accessories, only your computer and web camera. The Good Posture program is unique in its kind, developed by our experts of minidatatools.com, it is designed to help you keep track of your posture.
  • Netwrix Change Notifier for Windows Server is a free auditing tool to monitor server configurations and automatically document changes, including installed software and hardware, local security settings, and registry settings. The tool sends daily summary reports with all recent changes to your network servers.
  • PAS Multi Meter Bridge can be configured in a number of different ways, to accurately model the ballistics, responses and graphics of a wide range of standard peak programme meters. These meters currently include the following:IEC 268-10 Type I (Nordic N9 meter)IEC268-10 Type IIb (EBU PPM meter)IEC 268-10 Type IIa (BBC PPM meter)DIN 45406 You can monitor 8 input channels, 16 input channels or 24 input channels in realtime. Choose between 5ms, 10ms, 15ms, 20ms and 300ms integration time.Referenz Level Level America = -24 dBFS, England / Europe = -18 dBFS and Australia = -20 dBFS
  • Why use an audio spectrum analyzer? For those of you that have done video installations, would you install a camera and lens without a monitor to see what you are doing? Why would you do an audio installation without seeing what you are doing? The analyzer gives you an inexpensive method to install audio systems (microphones, amplifiers, equalizers, concealments, etc) using a laptop computer, internal or external sound card, and the software. For those that want to evaluate products in a general way, the software can tell you some of the characteristics such as bandwidth, dynamic range, and frequency response curve.
  • UserGate Proxy & Firewall is a UTM (Unified Threat Management) class solution for sharing and monitoring employees' access to the local and Internet resources, for filtering FTP and HTTP traffic, as well as for administrating the network in your company. The product can be used in small- and mid-sized companies instead of relying on large and expensive hardware or software alternatives.
  • LANVisor allows you to see the screens of multiple computers connected to the local area network. You can use the software to see what users do on remote computers and automatically take screenshots. At the office, this system will help a manager catch employees suspected of violating the daily routine and thus improve productivity.
  • USB Log & Lock allows you to control operations with USB devices on computers connected to the local area network of an organization or enterprise. With USB Log & Lock, you can forbid USB devices with the help of flexibly customizable rules both for separate devices and users and for groups of users.
Advertising

Page 10 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware