ePrivacy and GPDR Cookie Consent by Cookie Consent

Monitoring software in Firewall & Proxy Servers - Free download Monitoring - Top 4 Download

Monitoring search results

DNS Firewall 4.0

... people are looking for when it comes to monitoring DNS traffic and blocking specific domains. It is implemented as an application and allows loading of DNS blocking rules just by clicking on files containing the DNS rules. Switching between different sets of rules - no problem ! Just save the ...
software award

ProxyInspector for ISA Server 2.6n

... of us have to solve are network traffic monitoring and control over employees' web surfing. Without these ... solution for the tasks mentioned above. The ideal monitoring and control software should be easy to install ... the most comprehensive and feature-packed network usage and monitoring software available on the market! ProxyInspector takes advantage ...

RusRoute firewall 2.4.9

... TCP, UDP, HTTP, FTP, DNS speed and connections monitoring, HTTP captive portal feature, timed action and Splitters for rules, with advanced routing options. ...

UserGate Proxy & Firewall 6.5

... (Unified Threat Management) class solution for sharing and monitoring employees' access to the local and Internet resources, for filtering FTP and HTTP traffic, as well as for administrating the network in your Company. UserGate provides complex LAN security due to three integrated antivirus modules - Kaspersky Lab, Avira and Panda ...

Routix NetCom 2.2

NetCom is a software for system administrators, IT-professionals and advanced users. With NetCom you can give full control over local area network (LAN) and over INTERNET connections. - support for remote scripting (with Microsoft Active Scripting) and provide useful remote administration console; - support URL filtering; - support any ethernet/dial-up/xDSL connections ...

ProxyInspector for WinGate 2.7i

ProxyInspector for WinGate is a cost-effective solution for analysis of your corporate Internet connection usage. It works with popular WinGate proxy server to retrieve from its log-files comprehensive information about you employees' behavior on the Internet. It will provide you with visual easy-to-understand reports on users activity, visited sites, attempts to ...

ProxyInspector for WinRoute 2.7x

ProxyInspector for WinRoute is a cost-effective solution for analysis of your corporate Internet connection usage. It works with popular WinRoute firewall to retrieve from its HTTP proxy & mail servers log-files comprehensive information about you employees' behavior on the Internet. It will provide you with visual easy-to-understand reports on users activity, ...

Vov Syslog Server 2.1

... Once launched, the application is ready to start monitoring messages coming to your computer. These messages play an important part in a network administrators arsenal of tools; they alert the admin of errors and warnings right as they happen, allowing them to quickly respond to problems and hopefully fix them ...

ARPMiner 3.4.1

... simple interface for user definitions and real time monitoring of connected users. ARPMiner consists of a GUI ... a proxy DNS server. Major features; Real time monitoring of connected users, RADIUS AAA support (Commercial editions ... RADIUS dictionary support, Customizable HTTP interface and Performance monitoring through Windows Performance Monitor. ...

CCProxy 8.0

... control. It also provides web caching, online access monitoring, logging and bandwidth usage statistics functions. Besides, it can work with active directory. CCProxy features with rich functions as below: 1. Modem, Cable Modem, ISDN, ADSL, Satellite, DDN, WiFi and so on are supported. 2. HTTP, FTP, Gopher, SOCKS4/5, Telnet, Secure ...

CCProxy 7.3

... control. It also provides web caching, online access monitoring, logging and bandwidth usage statistics functions. With CCProxy's various functions and professional service of Youngzsoft, CCProxy has successfully set up 50,000 proxy servers and 1,000,000 clients all around the world, it's still exploding. This proxy software features with following special functions. ...

Jana Server 2.6.0.225

... internet sites Administrator friendly log files / monitoring · 11 different log files · Java-applet-monitor (DUN-disconnection, number of connections, etc.) · Systray icon, colour coded status indication ...
software award

Jana Server 64-bit 2.6.0.225

... internet sites Administrator friendly log files / monitoring · 11 different log files · Java-applet-monitor (DUN-disconnection, number of connections, etc.) · Systray icon, colour coded status indication ...
software award

Lavasoft Personal Firewall (32-bit) 3.0.2293

... be deactivated by targeted attacks. · Extended monitoring - For more advanced user, this feature allows additional control of inappropriate application behavior and provides more customizable protection. · Network activity monitor - gives you the ability to close down any unauthorized connections with other PCs. · Stealth ...
software pick

Lavasoft Personal Firewall (64-bit) 3.0.2293

... be deactivated by targeted attacks. · Extended monitoring - For more advanced user, this feature allows additional control of inappropriate application behavior and provides more customizable protection. · Network activity monitor - gives you the ability to close down any unauthorized connections with other PCs. · Stealth ...
software pick

Anti-Spam SMTP Proxy Server 2.6.5 21218

The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Click 'Browse all files' to download the professional version 2.4.5 build ...
software pick

Windows 7 Firewall Control 8.4.0

... exhaustive solution for applications network activity controlling and monitoring. Prevents undesired programs and Windows updates, informational incoming and outgoing leakage of applications running locally or remotely. Detects and stops zero-day malware, prevents from “phoning home”, unwanted automatic updates and sending “telemetry”, increases your network security and privacy. Puts you in ...
software pick

BeeThink IP Filter 5.2.0.0

BeeThink IP Filter blocks unwanted IP addresses based on IP blocklists. It monitors network activities in real-time and prevents the connection between a server/website and certain IP addresses or ranges of addresses. IP Blocker Firewall can be successfully used on Windows website server machines, in a production environment, to easily ban ...

ICS CUBE 5.2.5.180412

... traffic limits, rate limits. By extensive set of monitoring tools and reporting forms ICS CUBE exposes processes on the network boundary and allows for their management. Custom reports on traffic volumes, user activity and particular objects fetched, link loads and status can be used along with preconfigured ones. ICS CUBE ...

Monitoring download notice

Top 4 Download periodically updates software information of monitoring full versions from the publishers, but some information may be slightly out-of-date.

Using warez version, crack, warez passwords, patches, serial numbers, registration codes, key generator, pirate key, keymaker or keygen for monitoring license key is illegal. Download links are directly from our mirrors or publisher's website, monitoring torrent files or shared files from free file sharing and free upload services, including Rapidshare, MegaUpload, YouSendIt, Letitbit, DropSend, MediaMax, HellShare, HotFile, FileServe, LeapFile, MyOtherDrive or MediaFire, are not allowed!

Your computer will be at risk getting infected with spyware, adware, viruses, worms, trojan horses, dialers, etc while you are searching and browsing these illegal sites which distribute a so called keygen, key generator, pirate key, serial number, warez full version or crack for monitoring. These infections might corrupt your computer installation or breach your privacy. monitoring keygen or key generator might contain a trojan horse opening a backdoor on your computer.