ADD TO FAVORITES l SUBMIT SOFTWARE     
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

security centerevent log monitorsecurity alert
web logsecurity suiteLog Parser
remove nsf securitychat/game logsecurity toolset
log emailremove adobe pdf securityLog file viewing
Complete Laptop Securitycall log

   

EventTracker 4.6.7

EventTracker manages event log of Windows NT/2000 workstations and server at central location. It displays all the events in real time and logs events into a database.It monitors event logs, security, processes and services, SNMP, Windows clusters. It supports Event notification. Remote viewers, Custom views, event filtering, powerful reporting, remote install, history viewer and many more features

See also: alerts and report, enterprise, syslog, event log monitoring, event log monitor, network monitoring, event management, Microsoft Exchange, content security, network monitoring software, SNMP devices, network security, port scanner, intrusion detection

Download EventTracker 4.6.7 (Size: 19364 KB)Buy EventTracker 4.6.7 (only $299.00)


Event Log Explorer 1.2.4

Windows event log analysis is a very important task for any system administrator. Event Log Explorer is an effective tool for viewing, monitoring and analyzing events recorded in the Security, System, Application and other logs of Microsoft Windows. It extends the standard Event Viewer functionality and offers new features. Download it now - it's absolutely free!

See also: system, security, application, events, event, log, monitoring, monitor, alalyzer, analysis, analyze, viewing, viewer, view, event log

Download Event Log Explorer 1.2.4 (Size: 829 KB)


ShareAlarmPro 1.7.2

ShareAlarmPro is a network tool that allows network administrators and users easily perform a shared folders and resources monitoring. Using ShareAlarmPro you can monitor users attempting to access secured shares and confidential files, detect and log network access to shared folders, monitor security events, monitor accessed files, disconnect users from open files or deny network users access, monitor sharing permission changes.

See also: security events, security software, computer security, event log, intrusion detection, network security, free network monitor, free monitor, network monitor, monitor, monitoring, system monitor, network monitoring, network protection, network access, alert, alerting

Download ShareAlarmPro 1.7.2 (Size: 1715 KB)Buy ShareAlarmPro 1.7.2 (only $19.50)


User Time Administrator 3.0.3.3

User Time Administrator lets you specify when exactly and how long the computer can be used and define users which will be allowed to use the computer without any limits. You can schedule time intervals and the number of hours each child can use the computer per day a week. It automatically logs your child out of their computer when it's time for lights out. Also you can prevent the PC usage until the specified date and after the specified date.

See also: time, control, limit, restrict, restrictions, specify, allow, shedule, log, password, guard, security, time table

Download User Time Administrator 3.0.3.3 (Size: 2009 KB)Buy User Time Administrator 3.0.3.3 (only $24.95)


BriefAudit 1.0c

Show me the last 3 dates when ThisFile has been updated and who did it: BriefAudit easily provides document changes history. Just right click on the file ThisFile and select Properties using Windows 2000 Explorer or Command when using Macintosh finder. BriefAudit audit software selects files changes events in NT4/NT2000 standard Log is written in comment file property field for future analysis or use by oher applications.

See also: add-ins, logiciel, utilitaire, download, properties, comment, Macintosh, system events, Administrative Tools, Security Log, audit, shareware, events, file modifications, BriefAudit, system maintenance, analysis utilities

Download BriefAudit 1.0c (Size: 2712 KB)Buy BriefAudit 1.0c (only $25.00)


Ip2CountryResolver 1.2

Ip2CountryResolver allows you to identify the country by given IP Address. If you are doing business on the Internet and you want to know where your users are from, you've found the right place! Ip2CountryResolver will help you to find and identify visitor's geographical location country and country code by its IP address. The tool is designed with a user-friendly interface and is easy to use.

See also: enterprise security, computer security, event log, intrusion detection, port scanner, network security, network utils, network monitoring, net tools, network software, network tool, find country by ip address, information security, freeware

Download Ip2CountryResolver 1.2 (Size: 680 KB)


Whois 2.2

Whois Tool is a client utility that communicates with WHOIS servers located around the world to obtain domain registration information. Whois supports IP address queries and automatically selects the appropriate whois server for IP addresses. This tool will lookup information on a domain, IP address, or a domain registration information .

See also: information security, enterprise security, computer security, event log, intrusion detection, port scanner, network security, network utils, port scan, network monitoring, net tools, network software, network tool, whois, internet scanner, internet security, security software, freeware

Download Whois 2.2 (Size: 420 KB)


MailDetective 2.0d

MailDetective is a monitoring tool to report on inbound and outbound email flow in corporate networks. Reports inform you of email traffic generated by particular employees in order to expose abusers who waste working hours and corporate bandwidth on sending and receiving private emails. Supports Microsoft Exchange Server 2000 and 2003, MDaemon, Kerio Mail Server, QMail, SendMail and many other servers.

See also: MDaemon, Exchange, Kerio, QMail, SendMail, Internet, security, mail, monitoring, traffic, log, report

Download MailDetective 2.0d (Size: 3835 KB)Buy MailDetective 2.0d (only $199.00)


ProxyInspector for ISA Server 2.6g

With information becoming the greatest value of modern era, finding a way to control data flow is essential step towards predictable business operation. ProxyInspector takes advantage of innovative data processing technology analyzing Microsoft ISA Server log files and generating visually-rich self explanatory reports on virtually every aspect of corporate Internet usage. Learn what's going on your network! Download FREE trial now!

See also: site, firewall, proxy, report, log, traffic, monitoring, Microsoft, security, Internet, ISA

Download ProxyInspector for ISA Server 2.6g (Size: 4659 KB)Buy ProxyInspector for ISA Server 2.6g (only $299.00)


FaceCode v - 2.0

Ideal for your home and office PC, FaceCode is a user friendly face recognition PC logon software. FaceCode is the only product using advance face recognition technology to control the access to your computer. Faceode verify the identity of the user and logs them on to their personal account. FaceCode support logon both to Windows and Domain accounts.

See also: user, security, biometrics, log on, access control, Logon, Face recognition, password, protection

Download FaceCode v - 2.0 (Size: 20775 KB)Buy FaceCode v - 2.0 (only $29.95)


User Manager Pro 6.02.050712

Rapid mass management of security on servers/workstations. Allows system administrators to report on and make global changes to local user credentials, groups, rights, registry settings, and more across an entire network in a single operation.

See also: 2003, 2000, UMP, LANICU, SMS, Password Recovery, Random Password, Terminal Server, Viruses, VNC, Registry, Common Password, Password, Global Groups, Local Groups, Administrator, WUS, SUS, event log, Shares, WMI, HIPAA, SOX, Security, Management, Microsoft

Download User Manager Pro 6.02.050712 (Size: 14506 KB)Buy User Manager Pro 6.02.050712 (only $499.00)


Directory Watch 4.0

You use the Directory Watch application to monitor a file system and react when a number of files in the directories exceed your threshold. This makes it possible for you to quickly and easily launch business processes. For example, you have a mail, fax, print, or web server that accepts request in forms of files. The server application then operates on these files. If something goes wrong or you have to many requests, you can react to them.

See also: Security, Workflow, Execute, Run, Log, Notify, Alert, EMail, Scan, Monitor, Queue, File, Directory, SMTP, MIMEsweeper, MAILsweeper

Download Directory Watch 4.0 (Size: 731 KB)Buy Directory Watch 4.0 (only $50.00)


EventConsolidator 1.0RC1

EventConsolidator is an agentless solution for monitoring multiple Windows machines. It provides a single powerful view of all event logs. Its advanced features help to find problems quickly and before they turn out to be a headache. Reports provide in-depth information about your systems - without the need to look at each event log manually.

See also: windows event log, event log, report, consolidation, security, troubleshooting

Download EventConsolidator 1.0RC1 (Size: 82695 KB)Buy EventConsolidator 1.0RC1 (only $29.00)


USB Drive Disabler Tool 2.0.1.5

USB data theft protection application automatically maintains log file in text or HTML format and provides USB device detailed information. Software also provides facility to user to enable or disable access permission of any USB drive storage media within LAN network. USB drive disabler tool monitors multiple computer system simultaneously within local area network. Pen drive blocker utility supports all windows operating system including VISTA.

See also: USB, drive, disabler, data, theft, protection, network, store, log, record, information, move, folders, manage, security, block, file, prevent, transfer, permission, detect, local, network, monitor, port, leakage, device

Download USB Drive Disabler Tool 2.0.1.5 (Size: 2908 KB)Buy USB Drive Disabler Tool 2.0.1.5 (only $120.00)


USB Data Leakage Protection Software 2.0.1.5

Data theft protection tool for USB drive prevent you from unofficial data transfer through USB mass storage media. Monitoring software alerts by playing sound when any pen / thumb drive is connected at any machine in local area network. Surveillance tool facilitate administrator to block or change different access permission of USB port and log connected USB disk information with machine domain name, IP, storage capacity, manufacture details etc.

See also: steal, LAN, network, leakage, analyze, theft, protect, USB, record, permission, security, device, block, log, folders, move, data, traffic, display, view, protection, file, monitor, port, transfer, store, information, storage

Download USB Data Leakage Protection Software 2.0.1.5 (Size: 2908 KB)Buy USB Data Leakage Protection Software 2.0.1.5 (only $120.00)


Pen Drive Blocking Software 2.0.1.5

Pen drive blocking software ensures full security to important data and files transfer, captures each and every performed operation (cut, copy, paste) on your system or client network using USB drive. Removable drive data leakage protection tool supports all USB media such as digital cameras, mp3 players, iPod, mobile phone, memory stick etc. Software facilitates with beep sound alert on system when unauthorized USB drive connected to network.

See also: USB, device, data, theft, protection, record, network, file, leakage, control, LAN, security, access, permission, pen, drive, blocking, log, unauthorized, removable, media, activity, monitor, information, transfer

Download Pen Drive Blocking Software 2.0.1.5 (Size: 2908 KB)Buy Pen Drive Blocking Software 2.0.1.5 (only $120.00)


Adragon Firewall 7.5

Adragon Firewall provides a full access control of your files and registry keys. you can deny any program running,disable copy/open/modify/find any specified files.with Adragon Firewall,you can prevent any file from being run/opened/modified/copied/found; and any access to the controled files will be logged in details.furthermore,Adragon Firewall helps you to find what's going on in your PC, it can monitor all process' access to any files/regis

See also: deny copy, no run, access control, file monitor, registry monitor, file safe, system security, system log, no open, no modify, no print, no delete, no find any file, disable running of any program, deny copy of any documents.hide file, no modify file.

Download Adragon Firewall 7.5 (Size: 6440 KB)Buy Adragon Firewall 7.5 (only $35.00)


1-abc.net Hard Drive Washer 6.00

Windows and nearly all other software that is installed on it produce temporary data. Unfortunately there are not many programs that really take care about consequences of saving temporary files to different places, with different extensions or without always deleting when possible or necessary. 1-abc.net Hard Drive Washer does what all these programs forget. It searches for these unnecessary files and offers you to delete them.

See also: trail, temporary, files, privacy, security, cleaner, cleaning, washer, washing, deleting, user, data, history, installed, slow, speed, log, logfiles, bak, syd, tmp.folder, exception, exceptions, delete, unnecessary, hard, drive, disk, space, empty, path, paths, temp, nav, old, gid

Download 1-abc.net Hard Drive Washer 6.00 (Size: 477 KB)Buy 1-abc.net Hard Drive Washer 6.00 (only $19.99)


1-abc.net Utility Box 6.00

This product combines 16 Windows cleaning and optimization tools to keep your system running fast and secure. Hard Drive Washer deletes unnecessary data, Surf Trail Washer deletes your internet trail, Registry Washer cleans up your Registry. Startup Booster allows you to configure your Windows startup, File Washer erases data completely and File Encrypter can hide it. With Settings Organizer you configure or tune up your system ... and much more!

See also: cleaning, washing, clean, wash, security, privacy, speed, secure, private, unnecessary, orphaned, entry, entries, data, file, files, keys, help, value, logs, trail, temporary, history, installed, speed, log, logfiles, bak, tmp, cookies, typed, urls, address, bar, backup, analyze

Download 1-abc.net Utility Box 6.00 (Size: 3436 KB)Buy 1-abc.net Utility Box 6.00 (only $44.99)


ARK for IIS 7 - (ARKIIS) 2.1

ARKIIS is a powerful reporting tool for Microsoft IIS Administrators. ARKIIS presents Microsoft Internet Information Services 7.x (IIS 7.5 / IIS 7.0 ) configuration information from the IIS 7.x configuration store in the form of Trees, Tables and Views.

See also: IIS Reporting, IIS Setup, IIS Reports, Windows Server IIS, IIS Administration, IIS Configuration, IIS Security, IIS Management, IIS Software, IIS tools, IIS Manager, Metabase IIS, IIS Virtual Directory, IIS Log Files, IIS Application Pool, IIS 6.0

Download ARK for IIS 7 - (ARKIIS) 2.1 (Size: 7302 KB)Buy ARK for IIS 7 - (ARKIIS) 2.1 (only $1038.00)






© 2005-2013 Downloadery. All rights reserved. Terms of Use and Privacy Policy. Contact Us