Mail Access Monitor for Kerio MailServerIt is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. Internet Access Monitor for ProxyInternet Access Monitor for Proxy+ is a software for monitoring the efficiency of the Internet bandwidth usage by your company employees. With Internet Access Monitor you can easily find out which employees load up the bandwidth most heavily, when and what exactly they download, how much time they spend online, and what data transfer volume they generate by their online activity. Internet Access Monitor for WinGateInternet Access Monitor for WinGate is a software for monitoring the efficiency of the Internet bandwidth usage by your company employees. With Internet Access Monitor you can easily find out which employees load up the bandwidth most heavily, when and what exactly they download, how much time they spend online, and what data transfer volume they generate by their online activity. Mail Access Monitor for QMailIt is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. Download Mail Access Monitor for QMail (4.77 Mb) Proxy WorkbenchProxy Workbench is a unique proxy server ideal for developers, trainers and security experts that displays its data in real-time. You can actually see the data flowing between your e-mail client and the e-mail server, web browser and web server or even analyse FTP in both Passive and Active modes. In addition, the 'pass through' protocol handler enables analysis of protocols where the server does not readily change. Download Proxy Workbench (6.00 Mb) 007 Proxy FinderFree software that automatically search and extract free proxy server from websites that provides daily updated proxy list. In several minutes, it will give you thousands of proxy server addresses. System Requirements: Windows 98/2000/2003/XP or later. Download 007 Proxy Finder (0.32 Mb) PPPshar ProTiny, yet powerful proxy server that enables you to share a single Internet connection of any type among several computers in home or office network. All the Internet services are pre-configured. Runs minimized as an icon in system tray, no configuration hassles and is easy to use. It can also allow or block access to IP addresses thus protecting ADSL/cable modem users from attacks on their computers. Share dialup, AOL, DSL, DirecWay connections Tags: internet sharing software, web proxy, proxy server, internet connection sharing, cable modem sharing Download PPPshar Pro (0.14 Mb) MidPoint Plus 6 User EditionSets a new standard for Internet Sharing. With one simple software installation, you'll immediately have simultaneous connections, faster downloads, connection teaming, user managment and accounting, site blocking & content control (PICS, VCR), ultra secure firewall, global caching, and much more. Proxy and NAT technologies ensure support for your Internet applications while MidPoint's integrated e-mail server puts you in control of your company. PPPshar LitePPPshar Lite is a simple and robust web proxy that enables you to share a single dialup, adsl, cable modem or satellite connection over a home or office network. Saves you money by removing the need for getting a separate Internet account, phoneline and modem for each user who wants to access Internet in your LAN. Extremely easy to setup and use. No configuration hassles. The whole program is just 73KB in size. Tags: internet sharing software, web proxy, proxy server, internet connection sharing, cable modem sharing Download PPPshar Lite (0.07 Mb) Mail Access Monitor for Exim Mail ServerIt is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. yvProxyCacheManDownload yvProxyCacheMan (0.41 Mb) Mail Access Monitor for VisNetic MailServerIt is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. Send Safe Proxy ScannerSend-Safe Proxy Scanner is a program designed for searching for HTTPS/SOCKS proxies over the net by scanning IP ranges and checking existing lists of proxies.
- Safe scanning using proxies. No more problems with ISPs! - Ability to check found proxies for SMTP protocol support. - Proxylists to check and proxylists used for anonymous scanning/checking can be placed on a web or ftp server. - Proxylists can be checked periodically. Download Send Safe Proxy Scanner (0.43 Mb) Mail Access Monitor for MS Exchange ServerIt is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. |