ShareAlarmPro 2.1.1

Software ID: 33141
ShareAlarmPro
ShareAlarmPro is a network tool that allows network administrators and users to easily perform network shares monitoring. Using ShareAlarmPro you can monitor users attempting to access secured shares and confidential files, detect and log network access to shared folders, monitor security events, monitor accessed files, disconnect users from open files or deny network users access, monitor sharing permission changes. ShareAlarmPro includes an intrusion detection system based on a security events log analyzer. Security Event Log Monitor monitors the security event logs of Windows NT/2000/XP servers or workstations and notifies the user about selected events detection. This software also provides you with the ability to manage and monitor all shares on your workstation, disable or enable default administrative shares, hide your workstation on the network, view the number of the users currently connected to each shared resource on your workstation. ShareAlarmPro also lets you easily browse your LAN and view all shared resources irrespective of whether they are hidden or not as well as view connections to shared resources on remote workstations. The program has a firewall system that blocks any unwanted connection to your shared resources. Besides, ShareAlarmPro monitors your shares permissions and alerts if Everyone, Domain Users or other selected broad access group is added to the permissions of a share. Apart from that, ShareAlarmPro includes folder watcher functions. You can perform folder monitoring and folder content change tracking. With ShareAlarmPro you can centralize all alarms, thus having the opportunity to monitor several shares on multiple servers from a single location. The program logs all detected events (access to shared folders, security events, folder watcher events) in an HTML format.

POPULAR DOWNLOADS IN THIS SECTION
Mail Password
Mar Password Generator
EasyHideIP.com Hide IP and Anonymously
ManageEngine ADSelfService Plus
Phone Calls Filter
FTP Password
Advanced Lotus Password Recovery
Advanced Office XP Password Recovery Pro
Atomic PST Password Recovery
Atomic PST Password Recovery allows you recovering lost passwords to personal folders in MS Outlook. The program is universal and does not depend on the version of Outlook. It will take less than a minute to recover passwords.
Download Now!
Excel Recovery
Excel Recovery is a guaranteed password recovery tool for Excel. Guaranteed Recovery recovers a document within a reasonable time frame regardless of the password.
Download Now!
Network Password Recovery Wizard
This program can easily recover the following types of Windows network passwords: dialup, vpn, domain and Internet connections, Passport and wireless network accounts, asterisk passwords, remote desktop, CardSpace PINs, mail, ftp, news accounts, etc.
Download Now!
ShadowSecurityScanner
Shadow Security Scanner (network vulnerability scanner) has earned the name of the fastest ?
Download Now!
N-Stalker Web Application Security Scanner
N-Stalker Web Application Security Scanner 2006 Free edition is state-of-art Web Application security assessment tool. Incorporates 35,000 web attack signature database, crawls website and search for backup files and XSS injection.
Download Now!
LCP
Password auditing and recovery tool for Windows NT/2000/XP/2003. Accounts information import. Passwords recovering by dictionary attack, brute force attack, hybrid of dictionary and brute force attacks. Brute force session distribution. Hashes...
Download Now!
Visual Zip Password Recovery Processor
This is an advanced ZIP password recovery utility. It features an easy GUI and a number of exclusive attacks to beat ZIP passwords. It is a real ZIP password cracker.
Download Now!
Cypherix LE Encryption Software
Encrypt any file or folder on any Windows PC. Any Media, any type of data. Cypherix LE Free Encryption Software. Password protect any file or folder with strong Encryption. Send secure e-mail. Protects data on USB Drives, CDs and HDDs. Freeware.
Download Now!
Advanced EFS Data Recovery
A program to recover/decrypt files encrypted on NTFS (EFS) partitions created in Windows 2000 and Windows XP. Files are being decrypted even in a case when the system is not bootable and so you cannot log on, and/or some encryption keys have been...
Download Now!
Windows Key
Gain access into any Windows Vista/XP/2000 system if the login password is lost.
Download Now!
FileMaker Key
FileMaker Key instantly recovers passwords for FileMaker databases (.fp3 - .fp8). All versions up to FileMaker 8.5 are supported.
Download Now!
Free Hide Folder
Free Hide Folder is a free computer security software to hide your private folders. Others will not know where your personal files exist. Free Hide Folder is protected by a password that you can change or remove at any time.
Download Now!
Size: 2.7 MB | License: Shareware | Price: US$35 | Category: Security and Encryption
CheckSpace With CheckSpace you can monitor the free space of harddisks and partitions. Also, you can monitor directories, so that it worked like a disk quota. The event log monitor informs you by mail if new entries are written in the log. The Dr. Watson monitor cachtes Watson errors and send you a detailed error report. The application monitor checks if a program is running. The http monitor check if your website is on or off error.

OS: Windows
Software Terms: Check, Disk, Space, Free, Control, Harddisk, Partition, Monitor, Drive, Directory
Size: 4.2 MB | License: Shareware | Price: US$99.95 | Category: Security and Encryption
Network Event Viewer Network Event Viewer is a network wide event log and syslog monitoring, consolidation, auditing and reporting tool enabling System Administrators to satisfy Sarbanes-Oxley auditing requirements while proactively managing their networks. The Windows operating system and many 3rd party Windows Services and applications use the Windows Event Log system to log informational, warning, and critical information used by Network Administrators to help...

OS: Windows
Software Terms: Event Log Management, Syslog Monitor, Disk Monitor, Disk Space Monitoring, Server Monitoring
Size: 548.8 KB | License: Freeware | Category: Security and Encryption
BhoScanner BHO Scanner gives you a quick look at the BHOs installed on Remote PC.It is known that the browser helper objects are loaded each time the browser is started up. Some BHOs are helpful, but there could be malicious ones that will harm your computer. It is known that the browser helper objects are loaded each time the browser is started up. Such objects run in the same memory context as the browser and can perform any action on the available windows and modules. For ex., a browser helper...

OS: Windows
Software Terms: Network Tool, Network Software, Net Tools, Network Monitoring, Hacking, Port Scan, Network Utils, Network Security, Port Scanner, Intrusion Detection
Size: 31.6 MB | License: Freeware | Category: Security and Encryption
Windows Server Event Log Monitor Windows server event log monitoring is very useful for effectively managing large volumes of system event logs generated within a network. Also, strengthen network security by analyzing the logged events and documenting the generated log reports. Event Log Management is a comprehensive process of collection of network-wide generated event logs in a central repository. Entire event logs are used to keep them readily available for future reference, event log filtration for...

OS: Windows
Software Terms: Windows Server Event Log Monitor, Event Log Manager, Event Manager, Event Viewer, Events Management, Event Management Software, Event Log, Windows Event Log
Size: 31.6 MB | License: Freeware | Category: Security and Encryption
Event Log Monitoring Windows event logs are a vital source of information within a network. Lepide Event Log Manager Software helps a network administrator to perform successful network audit and meet compliance standards like HIPAA, GLBA, SOX and PCI. Event log management is a comprehensive process of collection of event logs generated by network-wide systems in a central repository. Complete event logs are used to keep them readily available for future reference, event log filtration for...

OS: Windows
Software Terms: Event Log Monitoring, Event Log Management, Event Id, Event Log Manager, Event Manager, Event Viewer, Log Management, Events Management, Event Management Software