Software Downloads | Home | Submit | Latest News | Category | Contact us |
Search for PROXY TrojanHunter 4.5 in Mischel Internet Security TrojanHunter is a dedicated anti trojan with file memory and registry scanning. With an easy-to-use Scanner and a Guard that scans in the background TrojanHunter is a must-have complement to your virus scanner. Features - High-speed file scan engine capable of detecting modified trojans. - Memory scanning for detecting any modified variant of a particular build of a trojan. - Registry scanning.. AND MUCH MORE !DEKSI Modem Pooling 1.2 in DEK Software International DEKSI Modem Pooling (DMP) is an advanced, powerful, and feature rich client-server software system that allows you to use any serial (COM) port on a remote computer from your local computer via a TCP/IP network connection. Sharing COM ports means sharing resources like modems, ISDN adapters, X.25 PADs or any device that connects to a COM port. With DEKSI Modem Pooling you will save money on unnecessary hardware costs.DEKSI Modem Pooling 1.2 in DEK Software International DEKSI Modem Pooling (DMP) is an advanced, powerful, and feature rich client-server software system that allows you to use any serial (COM) port on a remote computer from your local computer via a TCP/IP network connection. Sharing COM ports means sharing resources like modems, ISDN adapters, X.25 PADs or any device that connects to a COM port. With DEKSI Modem Pooling you will save money on unnecessary hardware costs.DirectUpdate 4.1.2 in WildUP DirectUpdate is a dynamic DNS updater that runs as a NT service with remote (web) administration. It integrates with many of the free or pay DNS services and you can automaytically update multiple DNS accounts as soon as your IP changes. In addition, the program can perform local actions upon IP change, including FTP upload, application launching and email notification.ProxyShare PS3 Filesharing 1004 in Globalnet S.R.L. Welcome to ProxyShare P2P What is ProxyShare? ProxyShare is new generation of P2P software. Its fully designed for security and speed. Why the name is ProxyShare? Unlike all other P2P network we take full advantage of internet proxy servers to hide your IP and gain speedy downloads. Every client in this network can act as a proxy server.3proxy 0.5.2 in SECURITY.NNOV Universal proxy server with HTTP, HTTPS, SOCKS v4, SOCKS v4a, SOCKS v5, FTP, POP3, UDP and TCP portmapping, access control, bandwith control, traffic limitation and accounting based on username, client IP, target IP, day time, day of week, etc. ODBC logging support to any dabase or to file of any format for compatibility with log analizers. Proxy chaining support for any type of parent proxy. Randomization for chain building.Proxy Firewall 1.0.4.253 in Unique Internet Services, LLC Proxy Firewall is an automatic proxy selector that will simply and easily manage proxy connections for you. Proxy Firewall does all of the work. When using Proxy Firewall there is no need for you to configure your Internet programs to use a proxy, just answer Proxy Firewall's questions when asked.Trivial Proxy 1.6 in X-Ray Application Software. Tiny email logger that allow to see and log network activity of the any applications(browsers, email clients etc.).Trivial Proxy 1.6 in X-Ray Application Software. Trivial Proxy is a small application that allow to see and log network activity of the any applications(browsers, email clients etc.). So what does that mean in English? Simple, run TrivialProxy and configure it to redirect the local port to the specified host:port; configure the appication to use this port and localhost (it's very easy, there's), and voila! You're seeing and logging the network activity of this application!ReportGen for Novell BorderManager 2.0 in RnR Software ReportGen for Novell BorderManager allows you to search, query and report on a database created from the Proxy log files from Novell BorderManager.ReportGen for Novell BorderManager 2.0 in RnR Software ReportGen for Novell BorderManager allows you to search, query and report on a database created from the Proxy log files from Novell BorderManager.ezProxy 2.7.1 in LavaSoftware ezProxy allows an entire network to share a single internet account simultaneously, while protecting the valuable information on the network with the integrated proxy server/firewall. It supports internet connections of nearly any type, including broadband and works with many popular programs, such as Netscape, Internet Explorer, Icq/AIM, FTP programs, RealAudio and any other software that supports proxy connections .Internet Access Monitor for EServ 3.1 in Red Line Software Internet Access Monitor for Eserv is a software for monitoring the efficiency of the Internet bandwidth usage by your company employees. With Internet Access Monitor you can easily find out which employees load up the bandwidth most heavily, when and what exactly they download, how much time they spend online, and what data transfer volume they generate by their online activity.Internet Access Monitor for MS ISA Server 3.1 in Red Line Software Internet Access Monit for ISA Server or is software for monitoring the efficiency of the Internet bandwidth usage by your company employees. With Internet Access Monitor, you can easily find out which employees use the most bandwidth, when and what exactly they download and how much time they spend online.Internet Access Monitor for MS Proxy Server 3.1 in Red Line Software Internet Access Monit for MS Proxy Server or is a software for monitoring the efficiency of the Internet bandwidth usage by your company employees. With Internet Access Monitor you can easily find out which employees load up the bandwidth most heavily, when and what exactly they download, how much time they spend online, and what data transfer volume they generate by their online activity.
|