|
||||||
|
||
|
Home > Security audit software |
Related keywords: security, Security, audit, computer security, internet security, security software, information security, SECURITY, file security, windows security |
|
|
41. | ShyFile - File and Email Security 6.24 (shyfile.net) | ||
ShyFile encodes your text and packs it into an extra file that is to be attached to an outgoing email or uploaded to a website. The recipient thereof does not need to have ShyFile installed to be able to decode since any regular Internet browser is able to take care of it, i.e. opening it and prompting the | |||
Updated: 9, 2005 | Rating: 16 | Author: John Bettels | Size: 4419 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
42. | System Shield 2.1c (iolo.com) | ||
access to your computer. Obviously, this poses a very significant security problem, and individual PC users who do not wish their data to be accessible after deletion are not the only ones that are subject to this predicament. Businesses, schools, government agencies, and military institutions that | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
43. | Visual Audit Trail 2.0 (visual-audit.homeip.net) | ||
Audit Trail allows you to automatically identify changes made to data in your databases. It will record changes regardless of the application used to change the data. Visual Audit Trail will show you who changed what data, and when they did it. You can save just enough data to identify the record, or save the entire records data before and after a update. It's up to you | |||
Updated: 3, 2005 | Rating: 42 | Author: Ben Rosato | Size: 4992 kb | Commercial Go to category: Business > Databases & Tools Similar programs | |||
44. | WDumpEvt 2.2 (eventlog.com) | ||
all the informations from Windows NT/2000 logs: Ask for system, security, application log or file information. View, print or dump the list of events, user, failure or ras sessions, or print jobs. Dump the data to a file in ASCII-delimited, CSV or html format. You can study the log from any remote computer by browsing a tree who describes all the eventlog of your network The | |||
Updated: 9, 2005 | Rating: 0 | Author: Isabelle Vollant | Size: 395 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
45. | Winalysis 3.1 (winalysis.com) | ||
for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP traps, email, scripts, the event log... Create user-defined audit reports | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Fullerton | Size: 3122 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
46. | xSharez scanner 3.0 (tools-for.net) | ||
for both network administrators and users interested in the network security issues. This software will help you to solve one of the most serious problems of all modern computer networks - unauthorized data access using NetBIOS/SMB protocol. What xSharez Scanner can do for you: - Audit B and | |||
Updated: 9, 2005 | Rating: 2634 | Author: Vadim Markov | Size: 1087 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
47. | Engineers Edition 3.3 (solarwinds.net) | ||
months or years. You can use the SNMP BURTE FORCE ATTACK to test security on your community strings. With the WATCH IT tool and the NETWORK MONITOR application you will be able to keep you thumb on the pulse of your network. It will even email you when a server or router fails. The Complete set includes: Advanced Subnet Calculator, Bandwidth Monitor, Config Viewer, Config | |||
Updated: 9, 2005 | Rating: 0 | Author: Doug Rogers | Size: 61138 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
48. | Engineers Edition 5.2 (solarwinds.net) | ||
months or years. You can use the SNMP BRUTE FORCE ATTACK to test security on your community strings. With the NETWORK MONITOR application you can to keep you thumb on the pulse of your network and receive immediate alerts to your digital phone if a server or router fails. The Complete set includes: Advanced Subnet Calculator, Bandwidth Monitor, Bandwidth Gauge, Brute Force Attack | |||
Updated: 9, 2005 | Rating: 16 | Author: Doug Rogers | Size: 75498 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
49. | SignGen 1 (gjsmith.com) | ||
There is a growing need for the validation of electronic documents, particularly now with legislation processes requiring that many electronically generated documents are now certified and are classified as legally binding correspondence. The need to insert into documents a proof of originator is now | |||
Updated: 9, 2005 | Rating: 0 | Author: Garry Smith | Size: 2490 kb | Demo Go to category: Business > Office Suites & Tools Similar programs | |||
50. | Professional Edition 5.2 (solarwinds.net) | ||
Server, Config Viewer, Config Uploader, DHCP Scope Monitor, DNS Audit, DNS / Whois Resolver, Enhanced Ping , IP Network Browser, MIB Walk, Network Address Recovery, Network Monitor, Network Sonar, PING, Ping Sweep, Proxy Ping, Router CPU Load, Router Password Decrypter, SNMP Sweep, Subnet List, Watch it!, TCP Reset, Trace Route, TFTP Server, and Update System MIBs. This toolsets can | |||
Updated: 9, 2005 | Rating: 0 | Author: Doug Rogers | Size: 73410 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Security audit software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|