|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
DnsEye is monitoring network traffic by capturing Domain Name System DNS packets in network and displays the host names resolve information. The program allows to monitor requested URLs in network, to open it in browser and save captured DNS name list in the file. The tool is designed with a user-friendly interface and is easy to use.
See also: information security, enterprise security, computer security, event log, intrusion detection, port scanner, network security, network utils, port scan, network monitoring, net tools, network software, network tool, dns, internet scanner, internet security, network attack, security software, freeware
Event Log Explorer 1.2.4
Windows event log analysis is a very important task for any system administrator. Event Log
Explorer is an effective tool for viewing, monitoring and analyzing events recorded in the
Security, System, Application and other logs of Microsoft Windows. It extends the standard Event
Viewer functionality and offers new features. Download it now - it's absolutely free!
See also: system, security, application, events, event, log, monitoring, monitor, alalyzer, analysis, analyze, viewing, viewer, view, event log
ShareAlarmPro is a network tool that allows network administrators and users easily perform a shared folders and resources monitoring. Using ShareAlarmPro you can monitor users attempting to access secured shares and confidential files, detect and log network access to shared folders, monitor security events, monitor accessed files, disconnect users from open files or deny network users access, monitor sharing permission changes.
See also: security events, security software, computer security, event log, intrusion detection, network security, free network monitor, free monitor, network monitor, monitor, monitoring, system monitor, network monitoring, network protection, network access, alert, alerting
Show me the last 3 dates when ThisFile has been updated and who did it:
BriefAudit easily provides document changes history.
Just right click on the file ThisFile and select Properties using Windows 2000 Explorer or Command when using Macintosh finder.
BriefAudit audit software selects files changes events in NT4/NT2000 standard Log is written in comment file property field for future analysis or use by oher applications.
See also: add-ins, logiciel, utilitaire, download, properties, comment, Macintosh, system events, Administrative Tools, Security Log, audit, shareware, events, file modifications, BriefAudit, system maintenance, analysis utilities
Alpha Pocket Journal 1.0
Alpha Journal lets anyone keep a private journal, diary or log for personal or business use, but that's not all... Entries are stored in an encrypted file with optional password protection and can contain formatted text, pictures, sounds and even other documents. Entries can be added, deleted, edited, browsed by day, month, year or entry date, searched, printed, imported, exported and merged.
See also: notes, security, pim, log, journal, diary
IeCacheExplorer displays the details of all cookies that Internet Explorer stores on your computer and reads all information from the history file on your computer, displays the list of all URLs that you have visited. It also allows you to clear history, delete cookies and temporary internet files. The tool is designed with a user-friendly interface and is easy to use.
See also: computer security, event log, intrusion detection, port scanner, network security, network utils, port scan, network monitoring, net tools, network software, explorer, network tool, enterprise security, information security, internet scanner, freeware
AdventNet Firewall Analyzer 4.0
Firewall Analyzer is a web-based firewall log analysis tool that collects, correlates, and reports on most enterprise firewalls, proxy servers, and VPNs. It includes automatic threshold-based alerting, pre-defined traffic reports, historical trending and more.
See also: firewall analyzer, firewall log reporting, firewall log analysis, sonicwall reports, radius reports, pix reporting, checkpoint firewall, virus, vpn analysis, traffic monitor, web site traffic, bandwidth management, security, firewall logs, firewall, firewall logging, firewall log
Ip2CountryResolver allows you to identify the country by given IP Address. If you are doing business on the Internet and you want to know where your users are from, you've found the right place! Ip2CountryResolver will help you to find and identify visitor's geographical location country and country code by its IP address. The tool is designed with a user-friendly interface and is easy to use.
See also: enterprise security, computer security, event log, intrusion detection, port scanner, network security, network utils, network monitoring, net tools, network software, network tool, find country by ip address, information security, freeware
Whois Tool is a client utility that communicates with WHOIS servers located around the world to obtain domain registration information. Whois supports IP address queries and automatically selects the appropriate whois server for IP addresses. This tool will lookup information on a domain, IP address, or a domain registration information .
See also: information security, enterprise security, computer security, event log, intrusion detection, port scanner, network security, network utils, port scan, network monitoring, net tools, network software, network tool, whois, internet scanner, internet security, security software, freeware
ProxyInspector for ISA Server 2.6g
With information becoming the greatest value of modern era, finding a way to control data flow is essential step towards predictable business operation. ProxyInspector takes advantage of innovative data processing technology analyzing Microsoft ISA Server log files and generating visually-rich self explanatory reports on virtually every aspect of corporate Internet usage. Learn what's going on your network! Download FREE trial now!
See also: site, firewall, proxy, report, log, traffic, monitoring, Microsoft, security, Internet, ISA
FaceCode v - 2.0
Ideal for your home and office PC, FaceCode is a user friendly face recognition PC logon software. FaceCode is the only product using advance face recognition technology to control the access to your computer. Faceode verify the identity of the user and logs them on to their personal account. FaceCode support logon both to Windows and Domain accounts.
See also: user, security, biometrics, log on, access control, Logon, Face recognition, password, protection
User Manager Pro 6.02.050712
Rapid mass management of security on servers/workstations. Allows system administrators to report on and make global changes to local user credentials, groups, rights, registry settings, and more across an entire network in a single operation.
See also: 2003, 2000, UMP, LANICU, SMS, Password Recovery, Random Password, Terminal Server, Viruses, VNC, Registry, Common Password, Password, Global Groups, Local Groups, Administrator, WUS, SUS, event log, Shares, WMI, HIPAA, SOX, Security, Management, Microsoft
Kids PC Time Administrator 18.104.22.168
If you are concerned your child may be spending too much time online or playing games this type of software will offer a solution. It allows you to set limits on how much time your child spends on the computer or online.
See also: time, security, password, log, shedule, allow, administrator, restrict, limit, control, time, kids, table
IAS Reporting 3.41
FactotumNOW IAS Reporting imports IAS/RRAS (Microsoft VPN) log files through an engine that can be installed onto the VPN/IAS server. IAS (Microsoft® Internet Authentication Service) statistics are then updated automatically every two minutes. Reports can be viewed through a comfortable console and exported to Microsoft Excel (if installed). The report viewer can be run remotely from any desktop on the network or on the IAS/RRAS server directly.
See also: IAS, Log, Import, RRAS, Log, Analysis, Identity, Theft, Protection, VPN, Server, Protection, VPN, Monitoring, Security, Country, Resolution
EventConsolidator is an agentless solution for monitoring multiple Windows machines. It provides a single powerful view of all event logs. Its advanced features help to find problems quickly and before they turn out to be a headache. Reports provide in-depth information about your systems - without the need to look at each event log manually.
See also: windows event log, event log, report, consolidation, security, troubleshooting
LAN USB Controller 22.214.171.124
USB drive activities surveillance application provides real time monitoring of multiple connected external USB storage devices at client machine in windows LAN. Pen drive monitoring software support all USB media including memory card and provide instantly sound alert notification when USB connect to system and create log details of USB manufactures name, hardware ID, client machine name, IP address and USB storage capacity in text file format.
See also: USB, device, data, monitor, analyze, file, folders, transfer, block, storage, permission, display, theft, information, leakage, traffic, steal, network, protection, protect, LAN, view, port, move, store, security, record, log
USB Drive Disabler Tool 126.96.36.199
USB data theft protection application automatically maintains log file in text or HTML format and provides USB device detailed information. Software also provides facility to user to enable or disable access permission of any USB drive storage media within LAN network. USB drive disabler tool monitors multiple computer system simultaneously within local area network. Pen drive blocker utility supports all windows operating system including VISTA.
See also: USB, drive, disabler, data, theft, protection, network, store, log, record, information, move, folders, manage, security, block, file, prevent, transfer, permission, detect, local, network, monitor, port, leakage, device
USB Data Leakage Protection Software 188.8.131.52
Data theft protection tool for USB drive prevent you from unofficial data transfer through USB mass storage media. Monitoring software alerts by playing sound when any pen / thumb drive is connected at any machine in local area network. Surveillance tool facilitate administrator to block or change different access permission of USB port and log connected USB disk information with machine domain name, IP, storage capacity, manufacture details etc.
See also: steal, LAN, network, leakage, analyze, theft, protect, USB, record, permission, security, device, block, log, folders, move, data, traffic, display, view, protection, file, monitor, port, transfer, store, information, storage
1-abc.net Utility Box 6.00
This product combines 16 Windows cleaning and optimization tools to keep your system running fast and secure. Hard Drive Washer deletes unnecessary data, Surf Trail Washer deletes your internet trail, Registry Washer cleans up your Registry. Startup Booster allows you to configure your Windows startup, File Washer erases data completely and File Encrypter can hide it. With Settings Organizer you configure or tune up your system ... and much more!
See also: cleaning, washing, clean, wash, security, privacy, speed, secure, private, unnecessary, orphaned, entry, entries, data, file, files, keys, help, value, logs, trail, temporary, history, installed, speed, log, logfiles, bak, tmp, cookies, typed, urls, address, bar, backup, analyze
Hard Drive Powerwash FREE 2.00
Hard Drive Powerwash FREE is a Windows Utility that enables its users to remove file clutter from their systems quickly and easily. In simple terms, Windows maintains a list of all files on our hard drives, the longer the list, the longer it takes to access the files we need. This directly affects our computers speed.The PREMIUM edition additionally includes Registry cleaning options, wizards and much more, can be upgraded from the program.
See also: trail, temporary, files, privacy, security, cleaner, cleaning, washer, washing, deleting, user, data, history, installed, slow, speed, log, logfiles, bak, syd, tmp.folder, exception, exceptions, delete, unnecessary, hard, drive, disk, space, empty, path, paths, temp, nav, old, gid