|
||||||
|
||
|
Home > Network security software |
Related keywords: security, network, Security, Network, network monitor, computer security, internet security, security software, network monitoring, network management |
|
|
281. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
ID or anti-theft labels simplifies checks and affords increased security. Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including: - Hard disk manufacturer and size - Hard disk free space - Processor type and clock speed - RAM size | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
282. | VisNetic Firewall 2.3 (deerfield.com) | ||
peace-of-mind through comprehensive intrusion protection. Security-conscious professionals running software and/or hardware Internet sharing solutions are as concerned about internal threats as they are about external threats. There is currently not a hardware firewall solution that protects companies against these threats and existing software firewall solutions are priced | |||
Updated: 2, 2006 | Rating: 0 | Author: Deerfield Com | Size: 4601 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
283. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
Hindsight is professional-grade network camera surveillance and recording software. It supports cameras and video servers manufactured by Axis, D-Link, ELMO, Flexwatch, Hunt, IDView, IQinVision, JVC, Mobotix, Orite, Panasonic, PDuke, Pixord, Sony, Toshiba, Vivotek and others. Visual Hindsight allows viewing up to 20 live video streams while simultaneously recording up to 4 streams | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
284. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
285. | WDumpEvt 2.2 (eventlog.com) | ||
all the informations from Windows NT/2000 logs: Ask for system, security, application log or file information. View, print or dump the list of events, user, failure or ras sessions, or print jobs. Dump the data to a file in ASCII-delimited, CSV or html format. You can study the log from any | |||
Updated: 9, 2005 | Rating: 0 | Author: Isabelle Vollant | Size: 395 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
286. | WhatChanged for Windows 2.0 (prismMicroSys.com) | ||
Now get detailed data on changes to the file and registry of the networked PC with one mouse click. Restore and Undo Restore changes to the registry. WhatChanged for Windows captures detailed information (called snapshots) on the file and registry. A friendly graphical Explorer-like Change Browser allows easy traversal of directory or registry tree highlighting changes. Unlike first | |||
Updated: 9, 2005 | Rating: 0 | Author: Prism Microsystems | Size: 4783 kb | Demo Go to category: System Utilities > System Maintenance Similar programs | |||
287. | WIDO Logbook 1.3 (home.t-online.de) | ||
excluded of check. More-computers report. (of interest for big network administrators) Registers number of working hours on your computer. Stores the time of boot up, shut down, standby and user change.It is resistant to manipulations and recognises the time manipulations. Makes reports group by day, week, month, quarter and | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 1519 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
288. | Winalysis 3.1 (winalysis.com) | ||
for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP traps, email, scripts, the event log... Create user-defined audit reports | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Fullerton | Size: 3122 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
289. | Window Security Toolkit 5.0 (dmisoftware.com) | ||
over 51 Advanced Security Settings for Windows with this power tool ! Window Security Toolkit helps you make windows totally secured by Providing access restrictions on the control panel, display settings, network, passwords, users, dos, games, internet, memory, printers, desktop, system | |||
Updated: 9, 2005 | Rating: 0 | Author: Dr.Salman Zafar | Size: 1710 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
290. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Network security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|