|
||||||
|
||
|
Home > Network administration software |
Related keywords: network, Network, administration, network monitor, Administration, network monitoring, network management, remote administration, NETWORK, entertainment network |
|
|
781. | Blaiz Enterprises - Snappy PhotoCard Creator - Professional 2.00.2181 (blaiz.net) | ||
Use your family photos, or use ours to create brilliant greeting cards. Musical MP3/WAV/MID/WMA, 3D framed, true color, ultra-compact, standalone (Windows .exe) PhotoCards with internet/email link, animated cursor, flashing custom message, Author details and password protection - Realtime WYSIWYG (What You | |||
Updated: 3, 2005 | Rating: 0 | Author: Blaiz Enterprises | Size: 840 kb | Shareware Go to category: Business > Other Similar programs | |||
782. | PaneCutter 1.3 (atlastelecom.ro) | ||
The PaneCutter program is used for automatic cutting plan design for manufacturers of furniture and other products made from sheet materials (wood, metal, glass, etc ..), whose product range is wide or permanently changing. Due to its sophisticated, recursive algorithm, PaneCutter finds the optimum cutting | |||
Updated: 3, 2005 | Rating: 1259 | Author: Kovacs Adam | Size: 120 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
783. | Brilliant Database Professional 3.6 (brilliantdatabase.com) | ||
This program allows you to create a database without having any special knowledge or skills. According to its actual users’ opinions and comments, Brilliant Database perfectly fits the purpose of maintaining a database, which can contain the information about the personnel, customers, goods, and important | |||
Updated: 3, 2005 | Rating: 42 | Author: Mikhail Lishin | Size: 4260 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
784. | iTrack Workgroup 2.1 (softopia.com) | ||
definable levels of security and access privileges, supporting any network supported by Windows 95 or Windows NT. Because the database is stored in Microsoft Access format, you can use any of the features available in Access to manipulate your data. Any query can be exported to Excel XLS, HTML, or a formatted text file. iTrack supports automatic e-mail of incident and fix changes via | |||
Updated: 3, 2005 | Rating: 48 | Author: Mark Chenault | Size: 13680 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
785. | Phoebus 1.0 (cobwebsoft.com) | ||
With file manager you can easily access files on your computer or network. Phoebus also supports powerful searching that can find files by filename or by information included in a file. ID3 tag editor & file rename | |||
Updated: 3, 2005 | Rating: 16 | Author: Ante Krstanovic | Size: 576 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
786. | PIPL 2.50 D (programmedintegration.com) | ||
MP3 player and playlist editor, it also has built in peer-to-peer networking and ID3 tag editing. New in this version is the ability to print your MP3 collection. You can evaluate PIPL for 14 days, after which peer-to-peer networking, ID3 tag editing and printing are disabled, but you can still use all the other features with no restriction. PIPL is not only a lean and quick | |||
Updated: 3, 2005 | Rating: 0 | Author: Colin Meeks | Size: 1025 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
787. | Network Investigation Suite 1.13 (microolap.com) | ||
Investigation Suite is intended to use for network packets capture and packets generation tasks without using of preinstalled packet drivers. Meanwhile, Net Investigation Suite contains its own packet driver, which is loaded and unloaded dynamically. So, Net Investigation Suite allows you to use all power of Delphi/C++Builder as RAD tools for creating network applications | |||
Updated: 8, 2004 | Rating: 0 | Author: microOLAP Technologies | Size: 1416 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
788. | Maxus SE 3.05 (neurobridge.com) | ||
connections, terminate the connection when it is not used or emulate network activity to prevent breaking the connection by your ISP. A traffic monitor is also included, which displays the real-time graph of bandwidth usage. The hotkeys manager lets you assign custom keyboard shortcuts to some of the | |||
Updated: 8, 2004 | Rating: 42 | Author: NeuroBridge | Size: 1383 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
789. | Mobile Navigator 3.0b (onekit.com) | ||
phone-PC data synchronization for comfort and advanced management.It's like your own contacts database that has handy R-RW device. You can operate as much information as your HDD provides- your mobile phone will keep only important information and collect updates every day with you. No data leaks from | |||
Updated: 8, 2004 | Rating: 90 | Author: Alejandro Harbunou | Size: 2494 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
790. | Italian Characters 4.51 (aidsoft.com) | ||
be inserted where your cursor was in your Italian document. That's all there is to it ! Version 4.51 includes the Eurodollar sign and the ability to build and store up to 12 phrases that may be inserted as easily as any single character. This software solution performs without having to change any Windows settings or use additional hardware or keyboards. This program will function in | |||
Updated: 8, 2004 | Rating: 0 | Author: Gary Greene | Size: 2163 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
791. | DRemote 1.0 (products.asynchrony.com) | ||
very minimal part of your computer resources - memory, processor and network bandwidth - thus allowing other applications to also work smoothly. Cool application ! DRemote comes with a very easy to use and intuitive user interface. Working with it will be a breeze even for first time users. You will | |||
Updated: 8, 2004 | Rating: 165 | Author: Shawn Roach | Size: 1057 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
792. | Info Park 1.0 (products.asynchrony.com) | ||
PC * Software installed on the PC * Users working on the PC * Shared network resources of the PC The application is implemented using the Client-Server architecture, which makes it possible to use in remote offices. It also cooperates with an InterBase Server - a free, functionally complete SQL-server | |||
Updated: 8, 2004 | Rating: 0 | Author: Shawn Roach | Size: 1410 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
793. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The program runs completely hidden in the background so | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
794. | RasDial Pro 1.3a (muconsulting.com) | ||
command-line remote access (dial-up networking) dialer for Windows 95 and above. It will allow you to dial and hangup a remote access phone entry from within a batch file or other application. It supports redialing and TCP/IP route additions for VPN access. This is the successor to RasDial95. A | |||
Updated: 8, 2004 | Rating: 233 | Author: Claudio Fahey | Size: 60 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
795. | ShixxNOTE 5.net (free-ri.hinet.hr) | ||
(LAN messanger) and a communications tool used across a local network (LAN), Internet and via e-mail. Easy to use personal info management application and powerful communication tool. It features an alarm, backup and restore function, and many other features. It is configurable and stable. It is multithread client/server network tool that lets you display notes on your | |||
Updated: 8, 2004 | Rating: 0 | Author: Ozren Sirola | Size: 585 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
796. | SupportMonkey 2002 v1.0 (nitrotech.co.uk) | ||
expansion should you wish to develop enhancements to the Monkey's fetching ability. All such plugins are attached directly to the Monkey executable - no need for cumbersome multi-file distributions. With the ability to save, re-use and combine Monkey templates, SupportMonkey will further reduce time spent gathering information and enhance your support desk's efficiency and | |||
Updated: 8, 2004 | Rating: 0 | Size: 358 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
797. | SecurDataStor 5.01 (encryptx.com) | ||
encryption program for Windows. Encrypt files, folders, local and networked hard drives, CD, DVD and email attachments using a simple, intuitive interface. Hide encrypted folders and share sensitive data with recipients who can view decrypted files without having the software installed. Protect your private personal and business files from spyware, snooping agents, and theft of | |||
Updated: 8, 2004 | Rating: 65 | Author: David Duncan | Size: 2673 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
798. | BPS Spyware and Adware Remover 8.2.0.0 (bulletproofsoft.h4host.com) | ||
Spyware Remover is an Adware, SpyWare, Key Loggers, Trojans, Dialers, Hijackers, Trackware, Thiefware, Big Brotherware removal utility with multi-language support. It scans your memory (for active memory ad components, which are not stored on your hard drive and last only as long as the computer is powered | |||
Updated: 8, 2004 | Rating: 1064 | Author: Naglaa Elbanhawy | Size: 7383 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
799. | Asterisk Password Recovery XP 1.89 (fadsoft.com) | ||
Many applications under Windows system allow a convenient storage of frequently used passwords, such as the password of your dial-in ISP, the password of your email client, or FTP tool. Once the password is stored, it is hidden under a row of asterisks (*****) and can not be read by you again. Asterisk | |||
Updated: 8, 2004 | Rating: 4736 | Author: Dart Zheng | Size: 368 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
800. | Bonzai System View 1.2.0.142 (bonzaitools.com) | ||
Have you ever wondered what type of CPU you have in your computer? Ever wonder how much memory is installed in your computer or how much memory is installed on your graphics card? Have you ever had to tell someone your IP address? Well, System View can answer all these questions and more! Bonzai System | |||
Updated: 8, 2004 | Rating: 0 | Author: Bonzai Builder | Size: 2839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
801. | CDLock 1.4 (protect-me.com) | ||
secure but user-friendly environment on every workstation in the network. CDLock enhances access control for Windows users and helps you to control the removable disks usage. It can protect your computers against viruses, trojans and other undesirable programs which removable disks may contain. CDLock lets you set up rules for the local computer, defining when any removable disks | |||
Updated: 8, 2004 | Rating: 16 | Author: Ashot Oganesyan | Size: 749 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
802. | Logbook 1.7 (home.t-online.de) | ||
--------------------------------------- 1.Username (or space if no network is installed) 2.Date and time (start of session) 3.Time (end of session) 4.Duration of session 5.How the session was finished - 'shut down' - 'user change' - 'standby' - space (system hang up) Comments: ---------- You cannot stop Logbook (you don't see Logbook in the task list). You can | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 34 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
803. | ProtectZ 1.60 (actualsecurity.com) | ||
all EXE or DLL files from rewriting. You may make all file's attributes unmodified. ProtectZ protects files and folders on local hard disk drive, network drive, character device and gives you possibility to view unauthorized access which is stored in the log file. ProtectZ enables you to permit access to protected files and folders by specified processes | |||
Updated: 8, 2004 | Rating: 723 | Author: Konstantin Evseenko | Size: 574 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
804. | WinTools.net Professional 4.1.1 (wintools.net) | ||
transfer and for greater stability of connection by changing hidden network settings. The Privacy - This is a kit of tools which ensure your privacy and keep sensitive information secure. It consists of three basic parts: "Objects to Erase", "Invisible Man" and "File Shredder". A suite of tools for | |||
Updated: 8, 2004 | Rating: 42 | Author: Ruslan Smekalov | Size: 954 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Network administration software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|