Access Monitor


Advertisement

Internet Access Monitor for Novell BorderManager

With Internet Access Monitor, you can easily find out which employees use the most bandwidth, when and what exactly they download and how much time they spend online.

Mail Access Monitor for Exim Mail Server

Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.





Advertisement

Mail Access Monitor for Novell GroupWise

Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.

Internet Access Monitor  v.3.9

Internet Access Monitor is a utility product for monitoring the efficiency of the internet bandwidth usage by your company's employees. With Internet Access Monitor you can easily find out which employees load up the bandwidth most heavily, when and what ...

Mail Access Monitor  v.3.9

Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if Email abuse takes place in your office. The software ...

SoftPerfect File Access Monitor  v.1.0.2

SoftPerfect File Access Monitor is a multipurpose tool that monitors access to your files and keeps detailed history of who read, wrote and manipulated them. SoftPerfect File Access Monitor can be used on a file server to track network users activity, ...

Access Monitor  v.1.0

Access Monitor is a User Access Log utility designed for the Windows XP Operating Systems.

Main features:

- Records the date/time and username of users logging in/out of the computer
- Administrator can set the user access log ...

Remote Access Monitor  v.1.1

Remote Access Monitor monitors your machine and alerts you when a remote process is detected. This means you can keep an eye on people accessing your machine using applications such as Remote Desktop, Terminal Services or a management console. Alerts ...

Mail Access Monitor for Novell GroupWise 3.9c  v.1.0

Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. The program ...

Crawler Email Notifier

Access your email account fast & efficiently with email plugin. Get 1-click webmail access, monitor multiple accounts, get notified & preview incoming emails. Compose new messages thru shortcut, upload attachments with simple right-click. Comes with a ...

RegWork  v.1. 3. 2004

RegWorks is a comprehensive registry management software solution that includes registry viewer, editor, access monitor and tweaker features. The tool is absolutely essential for any system administrator who needs a fast and hassle free solution that ...

RegWorks  v.1. 3. 2002

RegWorks is a comprehensive registry management software solution that includes registry viewer, editor, access monitor and tweaker features. The tool is absolutely essential for any system administrator who needs a fast and hassle free solution that ...

10-Strike Connection Monitor  v.4.3

Monitor network connections to your shares, find out who opens your files shared over the local network. Protect your computer or file server, be notified when an intruder opens secure folders and files. When a connection attempt is detected, the program ...

Cyclope Internet Filtering Proxy

Cyclope Internet Filtering Proxy monitors the entire Internet traffic and blocks the access to websites and files according to the chosen filter. The requested web pages are displayed only if they comply with the specified filters.
The Internet Filter ...

ShareAlarmPro

Using ShareAlarmPro you can monitor users attempting to access secured shares and confidential files, detect and log network access to shared folders, monitor security events, monitor accessed files, disconnect users from open files or deny network users ...

Pages : < 1 | 2
Newest Reviews