|
||||||
|
||
|
Home > Hacks software |
|
|
111. | Link Logger - Zywall 3.52 2.1.0.47 (linklogger.com) | ||
internal and external abuses. Watch as LINK LOGGER tracks worms and hackers as they try to attack your network. LINK LOGGER can show you what attacks are targeting and if your firewall successfully blocked their attempts. Monitor systems on your network for problems and internet abuses as LINK LOGGER allows you to track where and when your users are going on the internet. With LINK | |||
Updated: 9, 2005 | Rating: 0 | Author: Blake McNeill | Size: 3053 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
112. | Link Logger - Zywall 3.62 2.1.0.52 (linklogger.com) | ||
internal and external abuses. Watch as LINK LOGGER tracks worms and hackers as they try to attack your network. LINK LOGGER can show you what attacks are targeting and if your firewall successfully blocked their attempts. Monitor systems on your network for problems and internet abuses as LINK LOGGER allows you to track where and when your users are going on the internet. With LINK | |||
Updated: 9, 2005 | Rating: 0 | Author: Blake McNeill | Size: 3092 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
113. | Link Protect 1.2 (artistscope.com) | ||
in your protected folder are undetectable and safe from searches and hack visits. You can specify domains from which you will accept links such as your other sites or those of authorised associates. Any type of file can be protected with Link Protect - gif, jpg, zip, html, exe. Link Protect can manage | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 30 kb | Commercial Go to category: Web Development > Site Administration Similar programs | |||
114. | Logan Pro Log Analyzer 1.6 (loganpro.com) | ||
Logan Pro is an advanced multithreaded job oriented log analysis tool. It is intended for both the novice webmaster as well as the veteran webmaster who manages many websites. Logan Pro reads log files created by popular web servers (apache, MS IIS, etc). Extensive reports are created in html format and may | |||
Updated: 9, 2005 | Rating: 0 | Author: Scott Baker | Size: 1595 kb | Shareware Go to category: Web Development > Other Similar programs | |||
115. | MailMonitor 1.6.3 (digiarch.org) | ||
or receiving e-mail. Watch for unsolicited mail forwarding, SMTP hacking (spammers that use your server to send their messages) and a host of other e-mail server related problems. Features: • View SMTP and POP3 sessions with complete session trace • Track all e-mails passing your server • Monitor SMTP authentication with IP, username and password • Monitor POP | |||
Updated: 9, 2005 | Rating: 37 | Author: Tijn Hoekstra | Size: 1577 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
116. | MSN Color Selector 2.5.0.2601 (freeasphost.co.uk) | ||
the process of selecting a different color without having to hack into the registry every single time. With MSN Color Selector, all you have to do is choose the desired color from the hexagonal color palette, or, alternatively choose from a popup dialog of more than 16 million colors. When you have finished selecting your color, click the "Save Changes" button to save the | |||
Updated: 9, 2005 | Rating: 11915 | Author: Aaron Chan | Size: 637 kb | Freeware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
117. | MUNAX Search Engine 2003-10-23 Ser:18 (munax.com) | ||
This way, your data is secured and can never be accessed by hackers. With the Twin Server system, you can setup two machines at two different locations and with the Twin System, i.e. two parallel systems with N machines in each, you can even spread your system over multiple machines at multiple locations over the internet. A terrorist may bomb away several of your machines but | |||
Updated: 9, 2005 | Rating: 0 | Size: 2000 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
118. | MyWebServer File Extractor 1.0.0 (mywebserver.org) | ||
file is saved in this format. This protects you from viruses and hackers. Uploaded MIME files are placed in the directory that is specified in the "File Upload Location:" field of the Server Properties Page. Uploaded files are given numeric names corresponding to the date and time they were uploaded | |||
Updated: 9, 2005 | Rating: 0 | Author: Seth Snyder | Size: 52 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
119. | NetManager Light 2.04 (netmanager.com.ru) | ||
NetManager Personal Firewall is simple, but very powerful firewall. The firewall continuously checks all your Internet traffic. If there is a suspicion that information sent to Internet or received from it may be dangerous for your computer or your confidentiality that transmission will blocked and you will | |||
Updated: 8, 2004 | Rating: 0 | Author: Telesoft | Size: 2120 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
120. | NetPeeker 2.83 (net-peeker.com) | ||
your network. The build-in personal firewall protect you from hackers' attack from outside. You can find those "Spyware" or "Trojan" and block them. You can kill connections you don't want without shutdown the application. You can trace back to the source to find who is the guy and report abuse. You can setup speed throttle to limit network bandwidth usage for every | |||
Updated: 9, 2005 | Rating: 158 | Author: Ming Jin | Size: 2116 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
|
Home > Hacks software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|