Control File Access


Advertisement

DAFS, Direct Access File System  v.beta1.0

The DAFS protocol is a new file-access protocol designed to take advantage of emerging RDMA (remote direct memory access) interconnect technologies such as InfiniBand, VI and iWARP. See http://www.dafscollaborative.org/ for detailed DAFS information.

Remote Access

Remote Access 1.0 is a cheap , powerfull , simple remote administration/monitoring tool with many advanced features like 128-bit encryption ,Desktop, IP Filtering , NT Security , Full control , file transfers , telnetting , remote shutdown , remote log-in/;log-off ...





Advertisement

Remote Administrator Control Client

With RAC (Remote Administrator Control) you can work without any limits
on a remote computer with operation system Windows,
as if working on your local computer.
RAC Client is free, Security, Real Rate, ...
15 In One (Full Control, File ...

Remote Administrator Control Client Lite

With RAC (Remote Administrator Control) you can work without any limits
on a remote computer with operation system Windows,
as if working on your local computer.
RAC Client Lite is free, Security, Real Rate, ...
15 In One (Full Control, ...

MS Access Export Multiple Tables To HTML Files Software

Convert MS Access tables to an HTML file. Access 2000 or higher required.

1-abc.net File Replacer  v.5.00

The Windows-integrated file manager called Windows Explorer offers multiple options to cut, to copy and to paste files. Anyway, whenever you try to overwrite single files that are located in many different folders you first have to find them by your own ...

Acronis Access Connect  v.10.0.4

Got Mac users in the office? Because they have different communication protocols, integrating Macs into your Windows IT infrastructure can create application, file access, and network incompatibilities. Acronis Access Connect (formerly ExtremeZ-IP) is ...

File System Auditor  v.1.02

File System Auditor allows administrators to audit file access, generate easy-to-understand compliance reports, and create alerts tied to file system events all from a centralized management console. File System Auditor protects sensitive information ...

SupportWindow Console  v.1.0

SupportWindow Console accepts incoming connections from multiple SupportWindow Hosts and SupportWindow Services to allow complete remote desktop control, file sharing and Chat. Optional registration of Presentation Mode allows the console operator to ...

BeAnywhere Support Express  v.1. 2. 2000


Remote control, File transfer and Chat.
No software installation required. Provide immediate support to customers and colleagues without pre-installing software.
Generate reports about your support activity over a defined period of time.

EBLVD Remote Desktop  v.7.6

eBLVD enables fast, easy and secure remote access over the cloud to a computer or server from any web browser. You can view and control desktops remotely from anywhere within a few seconds with a simple click of your mouse. How it works: You or your designate ...

IObit Unlocker  v.1.2.1.26

Often when we try to delete a file or folder in Windows, we see annoying messages like 'Cannot delete file: Access is denied;' or 'Cannot delete folder: It is being used by another person or program' or 'There has been a sharing violation;' or 'The source ...

PC Security  v.6.5

This software offers Explorer control, file lock, folder lock, system lock, Internet lock, shortcut and software Lock, restricted system, Window lock, intruder detection with alarm, flexible and complete password protection and drag-and-drop support.Lock ...

Im InTouch  v.8.2

I`m InTouch provides browser based remote control and access of your desktop PC using any wireless device or computer with an Internet connection. By using any web browser, and logging in to the password protected interface, you can read and respond to ...

PPPoE Monitor Portable  v.1.0.4

PPPoE Monitor is a computer tool designed to monitor and control PPPoE access concentrators connected to your network. The tool checks the availability of concentrators, evaluates the workload of each concentrator and channels and ensures your security ...

Pages : < 1 | 2
Newest Reviews