Data Traffic Calculations


Advertisement

FlowCollector Lite  v.1.6.1

Flexible aggregation of collected data and storage support of the following types: * Microsoft SQL Server database, * MySQL database, * Comma separated text file. NetFlow versions 5 (Cisco Systems), RFlow are supported, so any compatible router, wireless ...

Avira AntiVir WebGate 3.0.14-2  v.2

Avira AntiVir UNIX WebGate is a dedicated security solution, that acts as a web proxy, scanning the entire HTTP and FTP traffic, and keeping you protected from malware and unwanted programs. Benefits: - Innovative AHeAD (Advanced Heuristic Analysis and ...





Advertisement

Certus Lateo  v.7.0

Certus Lateo is an integrated software-only solution for dealing with data loss (DLP) and network intrusion threats. It represents a novel approach to securing all interconnected and stand-alone computers of departments or whole companies by creating ...

AVIRA Antivirus for WebGate (Linux)

AVIRA Antivirus for WebGate reliably secures plain HTTP and FTP connections, being placed either between a client computer and the Internet or between a client computer, proxy and the Internet. The program also checks emails and email attachments which ...

AVIRA Antivirus for MailGate (Linux)

AVIRA Antivirus for MailGate is a comprehensive antivirus solution for Linux, mails ervers, functioning at high speed and filtering against malicious contents by checking both incoming and outgoing emails. MailGate may run as a plug-in for Postfix, Exim ...

AVIRA Antivirus for Sendmail-Milter (Linux)

AVIRA Antivirus for Sendmail-Milter checks all incoming and outgoing emails and, depending on the result of the scanning process, the emails are blocked or delivered. Email notifications can be issued for the message sender, the recipient and the administrator.

High Speed Verifier  v.1.42

Besides, HSV provides for optimal checking mode in terms of time and data traffic. More thorough checking (with which the rest 40% of dead emails could be detected) takes 10 times longer and requires 5 times greater traffic for each
address, hence ...

CoreFTP  v.2.1.1649

After a failed transfer detected, the program starts an auto retry operation to keep on transferring data in any direction.

The program controls the connection bandwidth for getting best performance. It includes a 'keep alive' function for staying ...

HTTPLook  v.1.25.1

HTTPLook captures (without any modification) data traffic of all Internet applications, including the encrypted ssl traffic of Internet Explorer. HTTPLook parses HTTP messages, separates headers and entities, decodes compressed entities, and saves entities ...

MODBUSTOOL  v.1.0



With the multiple document interface you can monitor several Modbus slaves and/or data areas at the same time.

For each window you simply specify the Modbus slave ID, function, address, size and poll rate.

You can ...

EConceal Pro for Windows  v.2.0.016.1

These rules function as filters by analyzing data packets to see if they fulfill the filtering criteria and then allow or block the access accordingly. It provides clear, concise graphical and non-graphical reporting on internal and external traffic.

PC Security  v.6.5


The whole Internet connection can also be locked altogether blocking all data traffic until unlocked again.
Downloading from the Internet can also be disabled based on the file extension, so disabling .exe and .zip would help protect against ...

IEController  v.3.2.0.0

Furthermore, you can prevent the insertion of advertisements in the browser and log the data traffic.The use of IEController is not on Microsoft's Internet Explorer 'is limited, it also can be useful to use other browsers or programs, such as your mail ...

Servoyant  v.2.5

Servoyant contains a built-in syslog server that automatically logs incoming data for the configured firewall to a database for further analysis.
Firewall log analysis is inherently tedious and complex. A typical firewall may have tens, if not hundreds, ...

NetOp Remote Control  v.10.50 Build 2011248


- Complete remote control of computers via network, Internet and PPs
- Remote management with full access to system control, services, registry, task manager, event logs, approvals and consoles
- Secure, easy to automate file transfer for copying, moving, synchronizing and cloning of data
- Hardware and program inventories of remote systems
- Full Intel vPro support for remote control of computers with no operating system or a corrupted operating system
- Centralized installation and deployment
- Unrivalled protocol and platform support, authentication and encryption
- Excellent performance, even on low bandwidth connections
- Simple, take control of all devices from one window
- Session recordings for audit
- Flexible connectivity via the Internet, without configuring firewalls, proxies or routers
- Reliable and secure
- Encryption of entire data traffic with 256-bit ...

Pages : < 1 | 2
Newest Reviews