ID Network Watch - Link Report
More Software of "Fastlink2"
Article Spinner - Article Spinner allows you to rewrite a large number of articles in just few minutes! The results are amazing: in few minutes you will obtain high quality, readable and most of all well flowing articles you can use for article submission.
Feed Submitter - Feed Submitter is the easiest semi-automated blog and RSS feed promotion tool ever.
Anunturi - The application Anunturi is website promotion and submission software designed for Romanian market for submitting your business, product, or services ads to classified sites on the Internet.
ID Parental Advisor - ID Parental Advisor is a utility program designed to block porn sites from opening in your Internet Browser.
ID Directory Shield - Whenever you want to keep track of the changes of all the files on your personal computer, make sure you have a lot of spare time and patience.
ID Browser Backup - ID Browser Backup is a very handy, utility program, meant to help recreate any browser extensions.
ID Backup Manager - ID Backup Manager is a utility program designed for registering an automatic backup of your vital system files on any media storage type, like CDs or DVDs.
ID AntiSpam - ID AntiSpam is a vital security program designed to filter all incoming e-mails and prevents spam.
ID AntiPopup - ID AntiPopup is a very useful program created to block and prevent unwanted pop-ups from showing on your computer's screen.
ID AntiDialer - ID AntiDialer is a program meant to protect your privacy and prevent your internet modem from being used by third parties.
New software of Internet, Monitoring
IP Tools for Excel - NEW - IP Tools for Excel - Add-in / Plug-in for Microsoft Excel. Instant Productivity - Instant Results in Microsoft Excel. Ping, NsLookup, Tracert Sort IPA. Subnet Calculator, IPAM management. Very Fast Results displayed the way you want.
ActiveXperts Environmental Monitor - ActiveXperts Environmental Monitor runs as a Windows service and monitors temperature, humidity, wetness, CO, CO2, power, light and more. Integrates with AVTech and many more devices. The software alerts through SMS, e-maill and SNMP traps.
Net Monitor for Employees Professional - The Net Monitor for Employees is employee monitoring software that allows you to see screens of remote computers or show your screen to employee. This activity monitoring software allows you to take full control of your employee remote computers.
BW Meter - BW Meter is a powerful bandwidth meter, monitor, traffic controller and firewall, which measures, displays and controls all traffic to/from your computer or on your network. Unlike other products, it can analyze the data packets.
FirePlotter - FirePlotter is a real-time firewall connection or session table monitor. It provides the ability to track usage of bandwidth and traffic for Cisco PIX ASA and FortiNet FortiGate firewalls.
Total Network Inventory - Total Network Inventory will scan your entire network, query all servers, workstations and appliances discovered, and record important information about every piece of equipment. A perfect inventory without leaving a chair.
GSA Auto Website Submitter - GSA Website Submitter submits your website to thousands of search engines and directories. Many special features like spin syntax for titles and descriptions or the automatic captcha code analysis helps to minimize the time it takes to advertise your website.
BlueAuditor - BlueAuditor is a program for detecting, scanning and monitoring Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices.
NBMonitor Network Bandwidth Monitor - NBMonitor tracks your Internet bandwidth (upload and downloads) usage, monitors all your Internet, it shows all the active connections you have to the Internet at any given moment and also the volume of traffic flowing through them.
Nsauditor Network Security Auditor - Nsauditor is an advanced network security scanner for auditing and monitoring network computers for possible vulnerabilities. The software checks network computers using all potential methods that a attacker might use to attack it.