Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: M :: monitoring
Advertising
Display: short descriptions | full descriptions
  • AggreGate Network Manager is an umbrella IT management platform. It provides out-of-the-box monitoring for IP networks, servers, routers, applications, services, traffic and performance. Product features include network discovery, L2/L3 mapping, alerting, event correlation, root cause analysis, charting, reporting, dashboards, network inventory and asset management, distributed monitoring, and more.
  • Classoft Sheduling Manager was developed for easing the organization work and monitoring the working teams in activities like: service, sales, surgeries, tourism, hotels,pensions and any other type of working unit that can use the application for organizating the work.
  • oMega is more than a file manager. oMega supports all standard operations, typical for file managers or Windows Explorer, such as copy, move, delete. In addition oMega offers unusual features and operations, such as built-in powerful editor / viewer, secure deletion, fast splitting / joining of files, free space monitoring system. Archive function automates and adds new features that are not available in Windows Explorer and other programs. The search function allows you to remove the unwanted results on the go, search in encrypted archives and much more. Another special feature of the program is the handy and convenient interface, allowing easy customization to suit individual user preferences on what to display, choose comfortable font sizes, or a color scheme for files highlighting. oMega is primarily intended for those who own from many to lots of programs, and have to manage extensive directory structures. oMega has been designed specifically to serve as a control center for your computers, help ...
  • Finally, for anyone looking for monitoring and tracking all Skype chats and activities Skype Spy USB Edition software was designed. You don't need to install Skype Spy into the PC you are going to track. Just insert the USB flash stick with the Skype Spy and run the program. In this way the app stays completely undetectable. It is a great option for anyone looking for an effective parental control solution or employee monitoring software.
  • Activity Monitor Pro offers effective security on computers and provides the equivalent of the security camera! Activity Monitor Pro runs hidden in the background to secretly record keystrokes typed, passwords entered, websites visited, applications/files used and takes screenshots of the activities. Recorded data will be sent to you by email or FTP/Email address automatically and secretly. Find out more on www.activity-monitor.com
  • NetBull is the best and most undetectable keylogger you can find on the Internet. By using the latest in computer monitoring techniques, NetBull keylogger tracks all activities that occur on the monitored computer (Internet browsing, keyboard usage, user names and passwords, messenger conversations, programs used, Facebook activity, emails etc. etc.). The official website for NetBull keylogger: www.netbull.com
  • Ax3soft Sax2 is a professional intrusion detection and prevention software (NIDS) used to detect intrusion and attacks, analyze and manage your network which excels at real-time packet capture, 24/7 network monitor, advanced protocol analysis and automatic expert detection. With insight into all operations in your network, Sax2 makes it easy to isolate and solve your network security problems - detect network vulnerabilities, identify network security threats, catch actions against of security strategy and signs of been attacked. Finally, intercept and stop these connections. Sax2 offers many kinds of intrusion analysis reports, such as events, type, source address and destination address of attacks, and many crossover reports and compositive reports. Furthermore, sax2 allows customize the time range which administrator will flexible monitor and evaluate the network security. Sax2, enhanced detection, analysis, response and management features, supports almost all common used protocols, self-conta ...
  • Ax3soft Scout process activity monitor is a professional monitoring tool for Windows, it can monitor a process all-sidedly in real time, including process/thread, file system, Registry and network activity whit its powerful features. To create a detail report for process, Ax3soft Scout makes it easy to find and solve your computer problems, e.g. malware, troubleshooting. Key Features Real-time monitor and analyze Ax3soft Scout can monitor process/thread, file system, Registry and network activity (includes: IP, ICMP, TCP and UDP conversations, HTTP visit, Email transfer and FTP transfer) real-time and analyze these activities to identify security threats with different colors. Detail reports Ax3soft Scout can analyze numerous activities to create a detail report for process, the report?s content is very clear, it includes all the threats found and some key activities events. You can find and solve computer problems quickly and easily with the report, even if you don?t have extensive computer knowled ...
  • Unicorn network analyzer is an Ethernet network analyzer (aka. packet sniffer or protocol analyzer) for network monitoring and troubleshooting purposes. It performs real-time packet capturing, 24/7 network monitoring, advanced protocol analyzing, in-depth packet decoding, and automatic expert diagnosing. Unicorn network analyzer offers a summary-to-detail, intuitive, easy-to-use graphical interface that network engineers can use to rapidly analyze and troubleshoot enterprise networks, Officers of a company can use to monitor user activity on network. it can also be used for debugging protocol implementations by aficionados that want to learn more about how network protocols work. Key Features 1. Real-Time packet capture and analyze 2. Rapidly troubleshoot enterprise networks 3. A variety of alarms notice 4. A variety of logs
  • AVSbackup is a multi-thread application for reserve data copying. AVSbackup has a built-in system for automatic reserve copying of files and folders from their initial locations to the other folders and discs of the same computer or other computer of a local network. The application supports reserve copying of FTP and cloud storages (Dropbox, Box, Google Drive, SkyDrive) in both directions (download and upload) and reserve copying of databases to the file(s). Full, incremental and differentiated reserve copying is supported. Data can be restored both in the initial location and in the location selected by the user. AVSbackup maintains a log of events, which can be automatically e-mailed. The application supports program monitoring and manual task initiation via Web interface (the Internet connection is necessary). AVSbackup supports Zip compression of the reserved data, which is maintained optionally, with 256-bit AES encryption.
  • AVSbackup is a multi-thread application for reserve data copying. AVSbackup has a built-in system for automatic reserve copying of files and folders from their initial locations to the other folders and discs of the same computer or other computer of a local network. The application supports reserve copying of FTP and cloud storages (Dropbox, Box, Google Drive, SkyDrive) in both directions (download and upload) and reserve copying of databases to the file(s). Full, incremental and differentiated reserve copying is supported. Data can be restored both in the initial location and in the location selected by the user. AVSbackup maintains a log of events, which can be automatically e-mailed. The application supports program monitoring and manual task initiation via Web interface (the Internet connection is necessary). AVSbackup supports Zip compression of the reserved data, which is maintained optionally, with 256-bit AES encryption.
  • Logstatic is an easy-to-use, yet powerful Log Analyzer. Designed for a convenient Amazon S3/CloudFront and Rackspace CloudFiles (Akamai CDN) service analytics and monitoring, it offers an automatic log fetching and analysis straight from your Amazon and Rackspace accounts.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • Power Spy software secrectly logs Facebook use, keystrokes, website visits, emails, chats and IMs: Skype, Yahoo Messenger and more. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp. Perfect for monitoring kids, spouse and employees.
  • Zone Trigger is the first multi-purpose motion detection software. This means that motion detection isn't just for security anymore. Specify zones to monitor on the live image, set different actions for each zone. Create complex custom motion detection systems for your project's needs. Useful in such sectors as Art, Marketing, Quality control, automated inventory, security and monitoring, motion detection has never hit so close to home.
  • GlassWire free firewall software helps protect your computer, privacy, and data by monitoring your network activity. Block unknown network connections with GlassWire's built in firewall tool. GlassWire also helps you monitor and protect remote servers. Are you always worried about going over your ISP bandwidth limit? GlassWire can warn you before you hit your limit and also show you what applications are hogging all your bandwidth.
  • Control employees and monitor activities of advanced computer users with REFOG Personal Monitor. The PC monitoring tool monitors and logs keystrokes, clipboard, records started software and Web pages opened by your employees or room mates. Immediate alerts by email when somebody enters any pre-defined keyword ensure fully involved, real-time operation.
  • PCBooster Free Keylogger provides you the ability to secretly capture all keystrokes to keep your employees, kids & spouse in check. Just launch it in the computer you have access to and it will, in real-time, record the words typed, the webpage visited and even the program used. With the detailed report, you won't miss any keystroke happened. Most of all, it can work silently in hidden mode, making your monitoring invisible.
  • AVSbackup is a multi-thread application for reserve data copying. AVSbackup has a built-in system for automatic reserve copying of files and folders from their initial locations to the other folders and discs of the same computer or other computer of a local network. The application supports reserve copying of FTP and cloud storages (Dropbox, Box, Google Drive, SkyDrive) in both directions (download and upload) and reserve copying of databases to the file(s). Full, incremental and differentiated reserve copying is supported. Data can be restored both in the initial location and in the location selected by the user. AVSbackup maintains a log of events, which can be automatically e-mailed. The application supports program monitoring and manual task initiation via Web interface (the Internet connection is necessary). AVSbackup supports Zip compression of the reserved data, which is maintained optionally, with 256-bit AES encryption.
  • Power Spy for Home secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Now, you can see for yourself what your employees do on their desktops during office hours and that too without being physically present in front of them. Yes, it is possible with the help of computer monitoring software. It facilitates the administrator to restrict the misuse of organization?s resources by employees, unnecessary chatting, internet surfing, access to social networking sites during working hours. Administrator comes to know about the possible security breaches if any, while invisibly monitoring varied computers at the same time. Also, this advanced utility enables the user to execute commands like Shut down, Restart, Lock, remove wallpaper, start screensaver, etc. on the monitored computers. Also, administrator can schedule online as well as offline recording of the monitored computers. Offline recording of the software is helpful when admin or manager is not available on desk. This recording is saved in AVI format and can be checked later or saved for future references as a proof. For calcula ...
  • RecoveryFix Employee Activity Monitor is an invisible software tool that is highly useful for business managers, organizations and home users with which you can easily monitor the activities of employees, children and spouse. Employee Monitor Software helps the network administrators to review and monitor the activities of the employees around a network in real time. Using this tool, you can view the live desktop activities of a network. It also enables you to keep a close look on the employees activities by recording all the events occurred in the PCs. It records all the activities including the system processes, keystrokes, opening/closing of windows, FTP activities, website visits, internet activities, downloading etc., creating desktop screenshots and chat logs. Using this tool; you can monitor several PCs of your organization from a remote place also. This eminent Employee Monitor Software also facilitates the users to create offline logs of the monitored computer activities to view them later. Th ...
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Wise Care 365 will bring you better user experience and more functions on cleaning and optimizing your PC. It includes PC Checkup, System Cleaner, System Tune-up, Privacy Protector, and System Monitoring. Meanwhile, it is popular by its fast speed and professional design. In addition, it can also find out more hidden issues and protect the privacy. Wise Care 365 is really an amazing masterpiece!
  • The all-in-one spy program which intercepts everything that is typed on keyboard, monitors visited websites, scans Windows clipboard for changes, makes screenshots every few minutes. It can also monitor both sides of IM chats and activity in social networks. And this program is absolutely invisible for everyone except you. You just have to press a speical hotkey, and enter your password to show the keylogger. You can easily read spy reports.
Advertising

Page 6 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware