|
Internet utilities and tools for home and business. Programs for file sharing, download managers and e-mail software. Free download.
|
- Version: 7.6
- Date (dd/mm/yyyy): 1/12/2014
- Program System Requirements: Network (NetBios, ICMP, TCP, UDP must be enabled in your firewall)
- OS: WinXP, Windows2000, Windows2003, Windows Vista Ultimate, Windows Vista Ultimate x64, Win98, WinME, WinNT 4.x, Win95, Windows Media Center Edition 2005, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista En
- Primary Download: download link
- Company: 10-Strike Software
- Description:
Monitor hosts, services and servers, files, folders, free space, switches and UPS via SNMP with this network mapping and monitoring program. The network mapper will scan your LAN and create a map with devices being monitored and represented by icons.
UltraAdmin (tm)
UltraAdmin has provided the convenience and functionality of a centralized domain administration tool for networks across the globe since 1999. And, if UltraAdmin 2.0 left you eager to find what more could come next, your wait is over...
VK for Business%27s with under 450 works
Visual KIX allows you to simplify networking tasks by creating massive logon scripts in a point and click fashion. 1. Map Network Drives to workstations by group membership, I.P. Address, Domain, or Mac Address. 2. Set workstation wallpaper and d...
Mail Access Monitor for PostFix
Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|