|
||||||
|
||
|
Home > Computer network security software |
Related keywords: security, network, computer, Security, Network, network monitor, computer security, internet security, computer game, security software |
|
|
151. | Transparent Screen Lock PRO for WinNT/2000/XP/2003 4.50 (e-motional.com) | ||
and can initiate shutdown/logoff. Save log file locally, to network or to Event Log. Use quick-launch icon to run program immediately, run at a preset time interval or run as screensaver. Option to grant system access to Administrators, specified User Groups (local or global) and/or other authenticated users without closing current session. Supports dual-monitor system | |||
Updated: 2, 2006 | Rating: 16 | Author: Sandra Buckingham | Size: 992 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
152. | Tweaki...for Power Users 4.3.1 (jermar.com) | ||
dialog of Windows and MS Office Finely adjust Windows XP's ClearType technology Validate, fix or delete your Internet Explorer Favorites Force the Add and Remove applet to also add and remove integral Windows components -like Windows Messenger. Create shortcuts to open Windows Explorer in specific folders Delete or replace files in use by the system Prevent | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Rawdon | Size: 3596 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
153. | Universal Shield 4.0 (everstrike.com) | ||
4.0 by Everstrike Software is the ultimate protection tool for your computer - hide files, folders, and drives, and set access rules using flexible security combinations for your most precious data. A unique feature of Universal Shield is the perfect combination of data hiding and encrypting | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
154. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
that automatically generates a completed inventory card for each computer/client. Upon initial log-in, users are requested to provide the system with the following information: Your Name, Room or department, Computer Brand, ID-Number. Vidamic Netlog then reports any changes made on each client log-in to the inventory program. Other inventories, e.g. faxes, photocopiers and | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
155. | VisNetic Firewall 2.3 (deerfield.com) | ||
peace-of-mind through comprehensive intrusion protection. Security-conscious professionals running software and/or hardware Internet sharing solutions are as concerned about internal threats as they are about external threats. There is currently not a hardware firewall solution that protects companies against these threats and existing software firewall solutions are priced | |||
Updated: 2, 2006 | Rating: 0 | Author: Deerfield Com | Size: 4601 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
156. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
Hindsight is professional-grade network camera surveillance and recording software. It supports cameras and video servers manufactured by Axis, D-Link, ELMO, Flexwatch, Hunt, IDView, IQinVision, JVC, Mobotix, Orite, Panasonic, PDuke, Pixord, Sony, Toshiba, Vivotek and others. Visual Hindsight allows viewing up to 20 live video streams while simultaneously recording up to 4 streams | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
157. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
158. | WDumpEvt 2.2 (eventlog.com) | ||
all the informations from Windows NT/2000 logs: Ask for system, security, application log or file information. View, print or dump the list of events, user, failure or ras sessions, or print jobs. Dump the data to a file in ASCII-delimited, CSV or html format. You can study the log from any remote computer by browsing a tree who describes all the eventlog of your | |||
Updated: 9, 2005 | Rating: 0 | Author: Isabelle Vollant | Size: 395 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
159. | WIDO Logbook 1.3 (home.t-online.de) | ||
freely a month. Then it must be either registered (9 EUR charge per computer) or deinstalled. Otherwise, LogbookService starts no more. INSTALLATION. The downloaded file widologb.zip must be unzipped into a temporary directory. In order to install LogbookService you have to start | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 1519 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
160. | Winalysis 3.1 (winalysis.com) | ||
for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP traps, email, scripts, the event log... Create user-defined audit reports | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Fullerton | Size: 3122 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Computer network security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|