Monitoring File Access Via Network


Advertisement

Access File Recovery Software  v.3.3

Access File Recovery Software helps you for instant and quick data recovery of MDB and Accdb files from damaged and corrupted access database. Access File Recover tool scans damaged access database thoroughly created with MS access 97,2000,2002,2003, ...

Access MDB File Format Recovery  v.3 2

Access MDB File Format Recovery Tool recovery damaged and corrupted MS Access restores mdb file. Access Recovery Tool saves the recovered information in a new PST file or in a several files. SysTools Access recovery software, which is a Microsoft PST ...





Advertisement

DAFS, Direct Access File System  v.beta1.0

The DAFS protocol is a new file-access protocol designed to take advantage of emerging RDMA (remote direct memory access) interconnect technologies such as InfiniBand, VI and iWARP. See http://www.dafscollaborative.org/ for detailed DAFS information.

1-abc.net File Replacer  v.5.00

The Windows-integrated file manager called Windows Explorer offers multiple options to cut, to copy and to paste files. Anyway, whenever you try to overwrite single files that are located in many different folders you first have to find them by your own ...

File System Auditor  v.1.02

File System Auditor allows administrators to audit file access, generate easy-to-understand compliance reports, and create alerts tied to file system events all from a centralized management console. File System Auditor protects sensitive information ...

MS Access Export Multiple Tables To HTML Files Software

Convert MS Access tables to an HTML file. Access 2000 or higher required.

DomainScan Server Monitoring  v.7.1

DomainScan Server Monitoring is the perfect network monitoring solution for System administrators. It’s designed for small businesses, schools and universities. It’s easy to use, and will display a lot useful information that will help you, and it ...

EMCO Network Traffic Meter  v.1.3.5

New software developed at EMCO Software´s lab; with the objective to offer an exceptional network traffic monitoring service. So that, Network Administrators can easily analyzes the data transfer between different nodes of a network.
As a Network ...

Burn Rubber: File Search Accelerator

Do you ever find yourself searching for a file you know is on your hard drive somewhere? Or maybe you need to find a file on the network, and you don't know where it is? Tired using Windows file search and found it horribly slow? Well suffer no more! ...

CyD Network Utilities - Security tools

CyD Network Utilities is a set of network tools useful in diagnosing networks and monitoring your computer's network connections. This is an excellent collection of easy-to-use network utilities for any network administrator. CyD NET Utils offers many ...

Network Identity Manager  v.2.0

Network Identity Manager (NetIdMgr) is a graphical tool designed to simplify the management of network identities and their credentials which are used by network authentication protocols while providing secure access to network services.
Network ...

File Organiser  v.1.610

Replacement File Explorer. On restart returning to where you were. (AND MUCH MORE!)
2. More accessible 'find' or search function. Results can be saved to file.
3. Camera and USB pen detection. auto detects folder where your photos are.
4.

DomainScan Server Monitoring 7.11 Build  v.316

DomainScan Server Monitoring is the perfect network monitoring solution for System administrators. It's designed for small businesses, schools and universities. It's easy to use, and will display a lot useful information that will help you, and it can ...

Switch Center  v.1. 8. 2001

Switch Center is network management and monitoring software for managed network switches and hubs from any vendor supporting SNMP BRIDGE-MIB that helps to discover, monitor and analyze network connectivity and performance and provides real-time network ...

LaneCat Inside  v.1.6.4.1

LaneCat Inside version is an enterprise-level monitoring software, As a excellent solution for companies wanting to end the misuse of computer and prevent the leakage of important information, it can monitor, manage and control all the computers in the ...

Pages : < 1 | 2
Newest Reviews