GFI Network Server Monitor automatically monitors the network & servers for failures. It allows you to identify issues and fix unexpected conditions before your users (or managers) report them to you! Alerts can be sent by email, pager or SMS, for instant problem notification. Actions, such as rebooting a machine, restarting a service or running a script can be done automatically. GFI Network Server Monitor is easy to set up and use, and is competitively priced.
Built-in monitoring rules include: Exchange Server 2000/2003, MS SQL, Oracle and ODBC databases, CPU usage, FTP & HTTP Servers Group Membership, Active Directory & NTDS, Disk Drive health, Disk Space, Event Log (with content checking), File Existence (with content checking), TCP, UDP, ICMP/Ping, SMTP & POP3 Mail Servers, Printers, Processes, Services, UNIX Shell Scripts (RSH), SNMP & Terminal Server. You can also write custom monitor functions in VBscript and leverage ADSI and WMI, allowing you to monitor virtually anything. ...
Super Utilities is a collection of tools to fix, speed up, maintain and protect your PC! These utilities include Disk Cleaner, Registry Cleaner, Spyware Removal, Uninstall Plus, StartUp Manager, Folder Guard, Tracks Washer, Super ExeLock, Super Undelete, Driver Backup, Auto shutdown, Windows Manager, Process Manager, Super Shell and Folder Size. You can get your system running at peak performance levels in few minutes with it.
Create,edit,extract,convert,compress,encrypt,mount CD image file. PowerISO is a powerful CD image file processing and file compression tool, which allows you to create, extract, compress, edit and convert ISO/BIN image files, and mount these files with internal virtual drive. And most of all, the compressed files can be used directly without decompressing.
PowerISO supports shell integration, such as context menu, Drag and Drop, clipboard...
With PowerISO, you can:
1. Process ISO / BIN image files, make bootable CD image file.
2. Mount image file with internal virtual drive, and then use the file without extracting it.
3. Compress files and folders to a compressed archive. PowerISO will scan and optimize the files during compression, and thus can have better compression ratio and faster compression speed.
4. Split the compressed archive into multiple volumes.
5. Protect the compressed archive with a password.
6. Use the compressed archive directly without decompressing. PowerISO virtual dri ...
SpywareKill is the first anti-spyware tool developed in Microsoft .NET technology. Its revolutionary multi-threaded engines detects and cleans all kind of malicious software including key loggers, browser hijackers, browser helper objects, adware, trojans, malicious shell extensions, malicious LSP and commercial surveillance software. Its advance alerting system runs in background and notifies you in real time when it detects any threat. Its updater engine downloads the latest signature periodically from our server to keep your PC up to date from the latest outbreaks. Version 2.5.2101 includes latest spyware signatures, functionality enhancements and minor bug fixes.
ABF Favorite Folders is an extremely useful compliment to the Windows Explorer shell. It allows you to easily store, manage and access a list of frequently used folders. These Favorite Folders are available in the Start Menu, Favorites, "Send To" menu (optional), and on the Desktop (optional). You can designate keyboard shortcuts and icons for any item in the Favorite Folders. The user friendly interface makes this product a must have item for your PC/Server. ABF Favorite Folders extends a context menu of folders with 2 new items. Using "Add to Favorite Folders" menu item you can add selected folders directly to a favorite list right from the context menu. You can use Start Menu, Favorites or associated keyboard shortcuts to access any of Favorite Folders. You can quickly copy any file, folder or shortcut into any of Favorite Folders using "Send To" shell menu.
VShell Secure Shell server for Windows and UNIX is a secure alternative to Telnet and FTP that gives you the strong encryption, trusted authentication, and data integrity you need to securely access network resources and transfer data. Precision control over privileges, the ability to fine-tune your Secure Shell environment, and strong authentication methods give you a flexible solution that grows with your evolving security policies.
Page 9 of 10
1 2 3 4 5 6 7 8 9 10