NetShareWatcher 1.4.6

"NetShareWatcher" snapshot

NetShareWatcher is network security improvement software. It allows network administrators to monitor network shares and identify shares which are violating data access policy of their organization.

Advertising
Software information
Platform:
Windows 7/Vista/XP/2000
Publisher:
Nsasoft LLC
Price:
$28.5
File size:
1.16 Mb
Date added:
May 26, 2008
Screenshot:
Product page:
Description from the Publisher
NetShareWatcher allows network administrators to monitor network shares and identify shares which are violating the data access policy of their organization. Once you configure it a first time, you can forget about network sharing problems. You only need to select restricted groups or users and NetShareWatcher will automatically detect network share with an access list containing those restricted groups and perform a configured action.
Users reviews & testimonials

This software is not reviewed yet.

Advertising
Other downloads from this publisher

Backup Key Recovery retrieves product key for over 1000 other software versions installed on your crashed or secondary hard disk drive. Before using software you should recover registry files in your crashed hard drive if they are damaged.

Product Key Explorer allows you to retrieve product key for Windows, Microsoft Office, SQL Server & 1000 other software products.You can also save all your product keys to a text file for printing or copy the serial number to your windows clipboard.

Recovers Internet Explorer, Firefox, Opera, MSN, ICQ, RnQ,Trillian,Miranda IM,VNC, Far, FileZilla,Total Commander, WS_FTP, CuteFTP, CoffeeCup FTP,FlashFXP, SecureFX, WebDrive, FTP Voyager, AutoFTP, FTP Control, 32bit FTP, Dial up, Outlook passwords.

APKF Adobe Product Key Finder is Adobe CS3 and CS4 Key Finder. The software automatically searches your computer for the product keys and serial numbers that your software programs store in the registry or in the cache

Nsauditor is a network security scanner that allows to audit and monitor network for possible vulnerabilities,checks methods that a hacker might use to attack it. Over 45 network tools for scanning,sniffing,enumerating and gaining access to machines.