ADD TO FAVORITES l SUBMIT SOFTWARE     
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

erase nsf server securityeasy securitychange pdf security
Security Delegationbreak adobe pdf securityIIS security
internet security suiteWindows Event Loguser security
log offsecurity camexercise log
social security numberlog analyser

   

EventTracker 4.6.7

EventTracker manages event log of Windows NT/2000 workstations and server at central location. It displays all the events in real time and logs events into a database.It monitors event logs, security, processes and services, SNMP, Windows clusters. It supports Event notification. Remote viewers, Custom views, event filtering, powerful reporting, remote install, history viewer and many more features

See also: alerts and report, enterprise, syslog, event log monitoring, event log monitor, network monitoring, event management, Microsoft Exchange, content security, network monitoring software, SNMP devices, network security, port scanner, intrusion detection

Download EventTracker 4.6.7 (Size: 19364 KB)Buy EventTracker 4.6.7 (only $299.00)


DnsEye 1.1

DnsEye is monitoring network traffic by capturing Domain Name System DNS packets in network and displays the host names resolve information. The program allows to monitor requested URLs in network, to open it in browser and save captured DNS name list in the file. The tool is designed with a user-friendly interface and is easy to use.

See also: information security, enterprise security, computer security, event log, intrusion detection, port scanner, network security, network utils, port scan, network monitoring, net tools, network software, network tool, dns, internet scanner, internet security, network attack, security software, freeware

Download DnsEye 1.1 (Size: 396 KB)


Event Log Explorer 1.2.4

Windows event log analysis is a very important task for any system administrator. Event Log Explorer is an effective tool for viewing, monitoring and analyzing events recorded in the Security, System, Application and other logs of Microsoft Windows. It extends the standard Event Viewer functionality and offers new features. Download it now - it's absolutely free!

See also: system, security, application, events, event, log, monitoring, monitor, alalyzer, analysis, analyze, viewing, viewer, view, event log

Download Event Log Explorer 1.2.4 (Size: 829 KB)


User Time Administrator 3.0.3.3

User Time Administrator lets you specify when exactly and how long the computer can be used and define users which will be allowed to use the computer without any limits. You can schedule time intervals and the number of hours each child can use the computer per day a week. It automatically logs your child out of their computer when it's time for lights out. Also you can prevent the PC usage until the specified date and after the specified date.

See also: time, control, limit, restrict, restrictions, specify, allow, shedule, log, password, guard, security, time table

Download User Time Administrator 3.0.3.3 (Size: 2009 KB)Buy User Time Administrator 3.0.3.3 (only $24.95)


User Time Control 3.3.2.1

User Time Control Center lets you specify when exactly and how long the computer can be used and define users which will be allowed to use the computer without any limits. You can schedule time intervals and the number of hours each child can use the computer per day a week. It automatically logs your child out of their computer when it's time for lights out. Also you can prevent the PC usage until the specified date and after the specified date.

See also: time table, security, guard, password, shedule, log, allow, specify, restrictions, restrict, limit, control, time

Download User Time Control 3.3.2.1 (Size: 1855 KB)Buy User Time Control 3.3.2.1 (only $20.00)


Alpha Pocket Journal 1.0

Alpha Journal lets anyone keep a private journal, diary or log for personal or business use, but that's not all... Entries are stored in an encrypted file with optional password protection and can contain formatted text, pictures, sounds and even other documents. Entries can be added, deleted, edited, browsed by day, month, year or entry date, searched, printed, imported, exported and merged.

See also: notes, security, pim, log, journal, diary

Download Alpha Pocket Journal 1.0 (Size: 118 KB)Buy Alpha Pocket Journal 1.0 (only $14.95)


IeCacheExplorer 1.2

IeCacheExplorer displays the details of all cookies that Internet Explorer stores on your computer and reads all information from the history file on your computer, displays the list of all URLs that you have visited. It also allows you to clear history, delete cookies and temporary internet files. The tool is designed with a user-friendly interface and is easy to use.

See also: computer security, event log, intrusion detection, port scanner, network security, network utils, port scan, network monitoring, net tools, network software, explorer, network tool, enterprise security, information security, internet scanner, freeware

Download IeCacheExplorer 1.2 (Size: 384 KB)


AdventNet Firewall Analyzer 4.0

Firewall Analyzer is a web-based firewall log analysis tool that collects, correlates, and reports on most enterprise firewalls, proxy servers, and VPNs. It includes automatic threshold-based alerting, pre-defined traffic reports, historical trending and more.

See also: firewall analyzer, firewall log reporting, firewall log analysis, sonicwall reports, radius reports, pix reporting, checkpoint firewall, virus, vpn analysis, traffic monitor, web site traffic, bandwidth management, security, firewall logs, firewall, firewall logging, firewall log

Download AdventNet Firewall Analyzer 4.0 (Size: 33714 KB)Buy AdventNet Firewall Analyzer 4.0 (only $495.00)


ProxyInspector for ISA Server 2.6g

With information becoming the greatest value of modern era, finding a way to control data flow is essential step towards predictable business operation. ProxyInspector takes advantage of innovative data processing technology analyzing Microsoft ISA Server log files and generating visually-rich self explanatory reports on virtually every aspect of corporate Internet usage. Learn what's going on your network! Download FREE trial now!

See also: site, firewall, proxy, report, log, traffic, monitoring, Microsoft, security, Internet, ISA

Download ProxyInspector for ISA Server 2.6g (Size: 4659 KB)Buy ProxyInspector for ISA Server 2.6g (only $299.00)


FaceCode v - 2.0

Ideal for your home and office PC, FaceCode is a user friendly face recognition PC logon software. FaceCode is the only product using advance face recognition technology to control the access to your computer. Faceode verify the identity of the user and logs them on to their personal account. FaceCode support logon both to Windows and Domain accounts.

See also: user, security, biometrics, log on, access control, Logon, Face recognition, password, protection

Download FaceCode v - 2.0 (Size: 20775 KB)Buy FaceCode v - 2.0 (only $29.95)


MyOdd Desktop Application 2.10

MyOdd is a desktop application that allows you to take control of your desktop and processes currently running on your system. You can 'show' applications that are running on your system and decide if you want to stop them or at least see what they are doing. With MyOdd Desktop management software you can hide applications at the click of a button, or even hide groups of applications using a different set of keys. By http://www.myoddweb.com

See also: Security log, Hot key, Hotkey, Desktop management, Windows protection, Windows logs

Download MyOdd Desktop Application 2.10 (Size: 2537 KB)


Kids PC Time Administrator 3.4.2.2

If you are concerned your child may be spending too much time online or playing games this type of software will offer a solution. It allows you to set limits on how much time your child spends on the computer or online.

See also: time, security, password, log, shedule, allow, administrator, restrict, limit, control, time, kids, table

Download Kids PC Time Administrator 3.4.2.2 (Size: 1478 KB)Buy Kids PC Time Administrator 3.4.2.2 (only $20.00)


PC TIME LIMIT PRO 3.4.2.2

PC TIME LIMIT PRO lets you specify when exactly and how long the computer can be used and define users which will be allowed to use the computer without any limits. You can schedule time intervals and the number of hours each child can use the computer per day a week. It automatically logs your child out of their computer when it's time for lights out. Also you can prevent the PC usage until the specified date and after the specified date.

See also: time, control, limit, restrict, restrictions, specify, allow, shedule, log, password, guard, security, time table

Download PC TIME LIMIT PRO 3.4.2.2 (Size: 1954 KB)Buy PC TIME LIMIT PRO 3.4.2.2 (only $20.00)


IAS Reporting 3.41

FactotumNOW IAS Reporting imports IAS/RRAS (Microsoft VPN) log files through an engine that can be installed onto the VPN/IAS server. IAS (Microsoft® Internet Authentication Service) statistics are then updated automatically every two minutes. Reports can be viewed through a comfortable console and exported to Microsoft Excel (if installed). The report viewer can be run remotely from any desktop on the network or on the IAS/RRAS server directly.

See also: IAS, Log, Import, RRAS, Log, Analysis, Identity, Theft, Protection, VPN, Server, Protection, VPN, Monitoring, Security, Country, Resolution

Download IAS Reporting 3.41 (Size: 57925 KB)Buy IAS Reporting 3.41 (only $189.00)


EventConsolidator 1.0RC1

EventConsolidator is an agentless solution for monitoring multiple Windows machines. It provides a single powerful view of all event logs. Its advanced features help to find problems quickly and before they turn out to be a headache. Reports provide in-depth information about your systems - without the need to look at each event log manually.

See also: windows event log, event log, report, consolidation, security, troubleshooting

Download EventConsolidator 1.0RC1 (Size: 82695 KB)Buy EventConsolidator 1.0RC1 (only $29.00)


LAN USB Controller 2.0.1.5

USB drive activities surveillance application provides real time monitoring of multiple connected external USB storage devices at client machine in windows LAN. Pen drive monitoring software support all USB media including memory card and provide instantly sound alert notification when USB connect to system and create log details of USB manufactures name, hardware ID, client machine name, IP address and USB storage capacity in text file format.

See also: USB, device, data, monitor, analyze, file, folders, transfer, block, storage, permission, display, theft, information, leakage, traffic, steal, network, protection, protect, LAN, view, port, move, store, security, record, log

Download LAN USB Controller 2.0.1.5 (Size: 2908 KB)Buy LAN USB Controller 2.0.1.5 (only $120.00)


USB Drive Disabler Tool 2.0.1.5

USB data theft protection application automatically maintains log file in text or HTML format and provides USB device detailed information. Software also provides facility to user to enable or disable access permission of any USB drive storage media within LAN network. USB drive disabler tool monitors multiple computer system simultaneously within local area network. Pen drive blocker utility supports all windows operating system including VISTA.

See also: USB, drive, disabler, data, theft, protection, network, store, log, record, information, move, folders, manage, security, block, file, prevent, transfer, permission, detect, local, network, monitor, port, leakage, device

Download USB Drive Disabler Tool 2.0.1.5 (Size: 2908 KB)Buy USB Drive Disabler Tool 2.0.1.5 (only $120.00)


USB Data Leakage Protection Software 2.0.1.5

Data theft protection tool for USB drive prevent you from unofficial data transfer through USB mass storage media. Monitoring software alerts by playing sound when any pen / thumb drive is connected at any machine in local area network. Surveillance tool facilitate administrator to block or change different access permission of USB port and log connected USB disk information with machine domain name, IP, storage capacity, manufacture details etc.

See also: steal, LAN, network, leakage, analyze, theft, protect, USB, record, permission, security, device, block, log, folders, move, data, traffic, display, view, protection, file, monitor, port, transfer, store, information, storage

Download USB Data Leakage Protection Software 2.0.1.5 (Size: 2908 KB)Buy USB Data Leakage Protection Software 2.0.1.5 (only $120.00)


Adragon Firewall 7.5

Adragon Firewall provides a full access control of your files and registry keys. you can deny any program running,disable copy/open/modify/find any specified files.with Adragon Firewall,you can prevent any file from being run/opened/modified/copied/found; and any access to the controled files will be logged in details.furthermore,Adragon Firewall helps you to find what's going on in your PC, it can monitor all process' access to any files/regis

See also: deny copy, no run, access control, file monitor, registry monitor, file safe, system security, system log, no open, no modify, no print, no delete, no find any file, disable running of any program, deny copy of any documents.hide file, no modify file.

Download Adragon Firewall 7.5 (Size: 6440 KB)Buy Adragon Firewall 7.5 (only $35.00)


Hard Drive Powerwash FREE 2.00

Hard Drive Powerwash FREE is a Windows Utility that enables its users to remove file clutter from their systems quickly and easily. In simple terms, Windows maintains a list of all files on our hard drives, the longer the list, the longer it takes to access the files we need. This directly affects our computers speed.The PREMIUM edition additionally includes Registry cleaning options, wizards and much more, can be upgraded from the program.

See also: trail, temporary, files, privacy, security, cleaner, cleaning, washer, washing, deleting, user, data, history, installed, slow, speed, log, logfiles, bak, syd, tmp.folder, exception, exceptions, delete, unnecessary, hard, drive, disk, space, empty, path, paths, temp, nav, old, gid

Download Hard Drive Powerwash FREE 2.00 (Size: 2254 KB)






© 2005-2013 Downloadery. All rights reserved. Terms of Use and Privacy Policy. Contact Us