|
||||||
|
||
|
Home > Network administration software |
Related keywords: network, Network, administration, network monitor, Administration, network monitoring, network management, remote administration, NETWORK, entertainment network |
|
|
61. | 7TOOLS VIRTUAL CD EMULATOR 3.0 (pad.paragon.ag) | ||
variety of other features: 1.Creates CD images on the hard drive (or network drive) and emulates "Virtual CD-ROM drives". 2. Supports copy protected CDs (SafeDisc 1.x, 2.x; SecuRom < 4.x; Laserlock) and CSS encoded DVDs. 3. Up to 23 virtual CD drives at the same time, allowing you to run several CD & | |||
Updated: 9, 2005 | Rating: 875 | Author: Kirill Podgorny | Size: 6052 kb | Demo Go to category: System Utilities > Other Similar programs | |||
62. | Active Network Monitor 2.01 (ntutility.com) | ||
Network Monitor is a tool for the day-to-day monitoring of computers in the network. Active Network Monitor runs under Windows NT/2000/XP and allows Systems Administrators to gather information from all the computers (even from the Windows 9x/Me computers) in the network without installing server-side applications on these computers. Active Network | |||
Updated: 9, 2005 | Rating: 0 | Author: Ashot Oganesyan | Size: 1947 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
63. | Anasil 3.2 (anasil.net) | ||
is a software network analyzer and protocol decoder for distributed Ethernet networks. System architecture is based on a remote Agent modules what enables IT managers to remotely monitor and manage a multi-segment networks from one central console. Anasil consists of three modules: network discovery and mapping, network traffic monitoring and frame | |||
Updated: 2, 2006 | Rating: 98 | Author: A plus C A plus C | Size: 39924 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
64. | Ascella Log Monitor Plus 1.5.1 (file-monitor.com) | ||
Allows users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about events via LAN, which can be received by the Windows NT4/2000 Messenger service, and using e-mail, SMS and ICQ (via e-mail gates). Works as Windows service. Allows users to monitor events | |||
Updated: 2, 2006 | Rating: 42 | Author: AAR Software Ltd. | Size: 799 kb | Demo Go to category: System Utilities > Automation Tools Similar programs | |||
65. | AssetDB 1.4.48 (compulsionsoftware.com) | ||
is an Asset Database that scans remote PC's, combined with networking and diagnostic tools. Keeping detailed information on your computers hardware and software, down to the serial number just became easier. Why should you choose AssetDB? Remote scanning of networked PC's. Administer Windows NT, 2000, XP machines remotely. No software required | |||
Updated: 8, 2004 | Rating: 26 | Author: Adrian Wallis | Size: 4616 kb | Demo Go to category: System Utilities > Other Similar programs | |||
66. | BackRex Easy Backup 2.5 (backsettings.com) | ||
BackRex Easy Backup on the computer, which settings and/or profile(s) you want to save, then choose Back up option in the program, and finally choose a folder to save all collected data in. When BackRex Easy Backup finishes its work, keep the results in a safe place - you'll need them to restore your settings, profile(s) and customizations. To restore your data, start BackRex | |||
Updated: 9, 2005 | Rating: 27 | Author: BackRex Software | Size: 655 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
67. | BackRex Expert Backup 2.5 (backsettings.com) | ||
face it! We all live in the age of Information Technologies. Day after day we become more and more dependent on information. Not only our financial data and job-related information moved from paper to computer, our day planners, diaries, address books and even calendars are now all-digital. The process of our life relies heavily on machines that are tireless and accurate in | |||
Updated: 9, 2005 | Rating: 16 | Author: BackRex Software | Size: 656 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
68. | CD Inspector 1.10 (kgysoft.com) | ||
administrator has absolute control of use of CD in the enterprise network since he checks the content of a CD and decides whether the disk should be used. It's also possible to schedule any OS command after the compact disk is inserted into the CD-ROM drive. It might be a notification command for the administrator or an execution of the special program for the work with this | |||
Updated: 9, 2005 | Rating: 0 | Author: Gleb Konnov | Size: 915 kb | Demo Go to category: System Utilities > Other Similar programs | |||
69. | Clone 2.1.0 (newtonsoftware.co.uk) | ||
disk altogether, your CR-RW drive, your floppy disk / zip disk or a network file server. Clone will copy files to any media that can be mapped as a windows directory. As well as making a backup copy you can specify clone keeps old versions of your files, allowing you to go back to a previous version of a file if required. Clone is incredible easy to run and configure. Clone keeps a | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Newton | Size: 3847 kb | Demo Go to category: System Utilities > Other Similar programs | |||
70. | DeviceLock 5.73 (ntutility.com) | ||
gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the week | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
71. | Diskeeper Professional 8.0 (execsoft.com) | ||
a known fact: Fragmentation kills workstation performance and hammers user productivity. Disk fragmentation can begin to degrade performance in just a few hours. Manually defragmenting even a modest-sized network would require a small army. Fortunately, there is an answer: Diskeeper 8.0 Professional Edition. Diskeeper improves your users' efficiency and productivity by | |||
Updated: 3, 2005 | Rating: 87 | Author: Colleen Toumayan | Size: 120000 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
72. | Excel Password 9.0.5351 (lastbit.com) | ||
Excel Password: recover ANY Excel password just within a few minutes regardless of the password length! Excel Password is a guaranteed password recovery tool, which comes in very handy if you forgot, lost, or misplaced your password for Excel documents. Such situation may also occur if someone who does not | |||
Updated: 3, 2006 | Rating: 685 | Author: Vitas Ramanchauskas | Size: 774 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
73. | fsMechanic 1.1 (freewebs.com) | ||
Server (FAT32). Recovered files can be saved on any (including network) disks visible by the host operating system. Allows save locked files (such as swap-file, Registry, $MFT, etc. ). Quick links to "My documents", "Shared documents", "My pictures", "My music". Recoverable files: That have been deleted bypassing Recycle Bin, or when Recycle Bin has been emptied | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexey Babenko | Size: 438 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
74. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
hot key access, Email logs, Monitoring and logging across your home network, LAN or the Internet in real-time with an optional add-on product HWIN, and much more. Logs may be sent to a decrypted comma delimited text file for importation into thousands of other applications for storage or further | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
75. | NetSupport DNA 1.01 (aidsoft.com) | ||
large & small depend upon a collection of hardware and software networks, systems and databases to remain competitive and efficient.With such a high level of investment, it therefore follows that these IT assets must be properly managed and maintained to ensure both their availability and that they | |||
Updated: 9, 2005 | Rating: 0 | Author: Jenni Hilton | Size: 48828 kb | Demo Go to category: System Utilities > Other Similar programs | |||
76. | NeuroSolutions for MATLAB 2.00 (nd.com) | ||
NeuroSolutions for MATLAB neural network toolbox is a valuable addition to MATLAB's technical computing capabilities allowing users to leverage the power of NeuroSolutions (www.neurosolutions.com) inside MATLAB and Simulink. The toolbox features 15 neural models, 5 learning algorithms and a host of useful utilities integrated in an easy-to-use interface, which requires “next | |||
Updated: 2, 2006 | Rating: 832 | Author: NeuroDimension Incorporated | Size: 9833 kb | Demo Go to category: System Utilities > Other Similar programs | |||
77. | OfficePopup 2.12 (officepopup.com) | ||
sending messages to entire departments or individual users on your network. By default, OfficePopup allows your employees to send and receive messages. However, in case you would like to use OfficePopup to broadcast messages only, you can specify that during the installation. This way, you can be | |||
Updated: 9, 2005 | Rating: 42 | Author: Smart Software Development | Size: 1196 kb | Demo Go to category: System Utilities > Other Similar programs | |||
78. | Paragon CD-ROM Emulator Personal 3.0 (pad.paragon.ag) | ||
CD title. You can also use virtual CDs and virtual drives via the network Exceed performance of physical CD/DVD-ROM - the reading speed of a virtual drive is 200x. CD-ROM Emulator supports normal CD, DVD, and CD RAW subchannel reading methods, ignoring bad blocks, for emulation any CDs. In this | |||
Updated: 9, 2005 | Rating: 0 | Author: Konstantin Komarov | Size: 6285 kb | Demo Go to category: System Utilities > Other Similar programs | |||
79. | PEERNET File Conversion Center 2.6 (peernet.com) | ||
ZSoft DCX (*.dcx), Graphics Interchange Format (*.gif), and Portable Network Graphics (*.png) raster image files. You can also create non-searchable Adobe PDF (*.pdf) files with full encryption support. The File Conversion Center is a Microsoft Windows application that enables you to quickly and easily convert office documents, spreadsheets, web pages, PostScript files, and more into | |||
Updated: 9, 2005 | Rating: 0 | Author: PEERNET Support | Size: 9364 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
80. | PestPatrol 3.0 (safersite.com) | ||
biggest threats to your network security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
81. | RemoteExec 3.07 (isdecisions.com) | ||
a very powerful tool for remotely updating your Windows NT/2000/XP networks. It allows you to remotely execute the same program simultaneously on multiple computers, without requiring preinstalled agents on target machines. RemoteExec® will dramatically minimize, simplify and secure all software and operating system administration tasks (Application and upgrade deployment | |||
Updated: 9, 2005 | Rating: 0 | Author: Alastair Volrath | Size: 527 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
82. | STS Pinger 1.2.1 (softexsolutions.com) | ||
Network Neighborhood not working properly? Want to do some advanced network searching? If so, you need the STS Pinger. The STS Pinger is a useful network utility for finding computers on or off your network. Just set the IP value range you would like to search and put the STS | |||
Updated: 8, 2004 | Rating: 42 | Size: 173056 kb | Demo Go to category: System Utilities > Other Similar programs | |||
83. | Surf Spy 2.10 (bysoft.se) | ||
to a password protected encrypted file. For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal for parents who want to monitor their children while they are away. In the stealth mode, Surf Spy does not show up in the system tray, task bar | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
84. | TigerTerm 8.1e (tigerterm.com) | ||
with features yet simple to use. The high quality of TigerTerm's emulations together with its easy configuration and comprehensive user tools, make TigerTerm the ideal way for Windows users to connect to legacy and other host applications. TigerTerm provides accurate support for the following terminal types: VT420, VT320, VT220, VT100, VT52, SCO ANSI, Colour ANSI, Wyse 60 | |||
Updated: 9, 2005 | Rating: 42 | Author: Graeme Youngs | Size: 6260 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
85. | Undelete 3.0 (execsoft.com) | ||
a cost-effective, instant-recovery solution that completes a company’s overall data-protection strategy and eliminates the high cost of going to backups to recover deleted files. The recycle bin does not capture deletions made over a network or even many deletions made on a workstation. Undelete will permanently solve this problem by filling in a critical gap in your data | |||
Updated: 9, 2005 | Rating: 0 | Author: Colleen Toumayan | Size: 5000 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
86. | Undelete Server and Professional 4.0 (execsoft.com) | ||
doesn't catch every deleted file - including files deleted over a network. If a file is accidentally or maliciously deleted, it could be gone forever! There are many files that bypass the recycle bin when deleted, including server files deleted by network users. Undelete replaces the recycle bin with a Recovery Bin that captures all deleted files, allowing them to be | |||
Updated: 9, 2005 | Rating: 0 | Author: Colleen Toumayan | Size: 122000 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
87. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including: - Hard disk manufacturer and size - Hard disk free space - Processor type and clock speed - RAM size (MB) - Graphics card manufacturer, type/performance - CD-ROM drive manufacturer | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
88. | WhatChanged for Windows 2.0 (prismMicroSys.com) | ||
Now get detailed data on changes to the file and registry of the networked PC with one mouse click. Restore and Undo Restore changes to the registry. WhatChanged for Windows captures detailed information (called snapshots) on the file and registry. A friendly graphical Explorer-like Change Browser allows easy traversal of directory or registry tree highlighting changes. Unlike first | |||
Updated: 9, 2005 | Rating: 0 | Author: Prism Microsystems | Size: 4783 kb | Demo Go to category: System Utilities > System Maintenance Similar programs | |||
89. | Word Password 9.0.5351 (lastbit.com) | ||
Word Password: recover ANY Word password just within a few minutes regardless of the password length! Word Password is a guaranteed password recovery tool, which comes in very handy if you forgot, lost, or misplaced your password for Word documents. Such situation may also occur if someone who does not work | |||
Updated: 3, 2006 | Rating: 431 | Author: Vitas Ramanchauskas | Size: 773 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
90. | xSharez scanner 3.0 (tools-for.net) | ||
scanner is a multithreaded NetBIOS/SMB scanner designed for both network administrators and users interested in the network security issues. This software will help you to solve one of the most serious problems of all modern computer networks - unauthorized data access using NetBIOS/SMB protocol. What xSharez Scanner can do for you: - Audit B and C classes | |||
Updated: 9, 2005 | Rating: 2634 | Author: Vadim Markov | Size: 1087 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
|
Home > Network administration software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|