10-Strike Connection Monitor 2.1
From: 10-Strike Software
Audit access to your shared folders and files via network. Protect your servers, be notified when an intruder opens secure or private folders and files. The program writes the access audit data to log files, notifies you with a message, sound, email.
License: Shareware, $39.95 to buy Size: 1189 KB
Audit access to your shared folders and files. The program monitors network access to your shared resources. Find out who opens your files over local network, protect your computer or a file server, and be notified when an intruder accesses secure folders and files. When a connection attempt is detected, the program will pop a window with details on the remote user trying to access shared files and adds that data to a log file along with the remote user's name, files and folders accessed, and access date and type. At the same time, the owner of the data will be alerted with an on-screen message accompanied with a sound, or via e-mail notifications.
All 10-Strike Software Soft
- 10-Strike Connection Monitor 2.1 - Monitor network access to your shared resources; watch who gets into your files
- 10-Strike LANState 5.3 - Create visual network map, monitor servers, be notified on failures.
- 10-Strike Network Inventory Explorer 4.0 - Network Inventory: track hardware and software installed on network computers
Latest Articles & Reviews
- How to unerase files?
- IPHost Network Monitor Review
- WLAN Visualization: A Picture Is Worth A Thousand Words
- GFI LANguard Network Security Scanner Review
- The Importance of Using Intrusion Detection Tools to Secure Your Business Network
- How to contact domain owner?
- Lansweeper Review
- PC Inventory Advisor Review
- Server Supervisor Review
- How to monitor other users' activities?
- Firewall and Intrusion Detection
- Network/Protocol Analyzer
- Network Scanner
- Privacy and Anonymity
- Whois and TraceRoute
- Network Utilities, Suits, Toolkits
- Network Monitor
- Network Traffic Accounting
- Network Inventory
- Remote Control
- File and Disk Encryption
- File and Password Recovery
- Keylogger and AntiKeylogger
- Email Tools