Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Internet :: Servers
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Where are your Internet visitors coming from? IP Address Country mapping Database can help you identify visitor's geographical location of an IP address. The IP Address to Country Code Database can be used for: 1>Real Time Geo-Locating ( Country ) 2>Redirect based on country 3>Automatically target advertising by country 4>Geo targeting for increased sales and click-through 5>Provide Location Aware Content ( language, currency, etc.) 6>Fraud Detection ( Credit Card Fraud, etc. ) 7>On-line Campaign ( targeted Banner Ads ) 8>Web log statistics and analysis (Analyze your web logs ) 9>Filter non-valuable traffic on basis of originating country and low your host bandwidth cost 10>Spam Filtering
  • Set up a VPN server in less than 1 minute. Free client software. iPig creates a secure "tunnel" that protects your inbound and outbound communications (Email, Web, IM, VOIP, calls, FTP, etc.) at any Wi-Fi hotspot or wired network. iPig works with any kind of Internet connection (Wifi, WLAN, wired ethernet). iPIG shields your data from even the most sophisticated methods of online spying and snooping like the "Evil twin attacks".
  • Whereas Isinteg Exchange 2010 utility helps resolving issues related to database integrity, it gets failed in case the database is damaged. Issues like checksum error, dirty shut down, virus attack, application failure, etc. often result in the damage of Exchange database file. Damage to the Exchange database file means inaccessibility to users? mailboxes and emails, contacts, etc. stored there in the mailboxes. Once the corruption has hit the database, email communication gets stopped until the damaged database is not replaced with the repaired one. Kernel for Exchange Server Recovery software facilitates the user to repair Exchange database file damaged due to above specified reasons. The software comprises three Exchange recovery modes that help the user to repair EDB file according to the corruption situation. First mode is Automatic Analyze and Recover, which is the fastest mode. It should be selected just after you have noticed corruption in EDB file. Second mode is Advance scan, which is ...
  • KernSafe iStorage Server is an advanced and powerful, full-featured software-only iSCSI Target Server for Microsoft Windows (both commercial and free versions). iStorage Server is IP SAN solution and allows you quickly export an existing storage such physical disk, partition, CD/DVD-ROM to all the clients, that delivers immediate benefits allowing storage to be consolidated, virtualized and centrally managed...
  • KernSafe iStorage Server is an advanced and powerful, full-featured software-only iSCSI Target Server for Microsoft Windows (both commercial and free versions). iStorage Server is IP SAN solution and allows you quickly export an existing storage such physical disk, partition, CD/DVD-ROM to all the clients, that delivers immediate benefits allowing storage to be consolidated, virtualized and centrally managed...
  • KernSafe iStorage Server is high availability and high performance iSCSI SAN server software for Microsoft Windows (both commercial and free versions). iStorage Server is IP SAN solution and allows you quickly export an existing storage such physical disk, partition, CD/DVD-ROM to all the clients, that delivers immediate benefits allowing storage to be consolidated, virtualized and centrally managed...
  • JiJiTechnologies AD Cleanup toolr and Ad Cleaner Tool enables Active Directory Old Object Cleaner Active Directory Unused users Cleaner Old Account Cleaner inactive Cleaner Active Directory Outdated Cleaner Account Cleaner AD Old Computers Cleaner Disable Account Cleaner scan and delete old computers Cleaner delete unused Accounts Cleaner Find and delete old Active Directory accounts Clean Active Directory with Active Directory Cleanupin Seconds
  • Active Directory Reports enables Active Directory computer Reports Active Directory OU Reports Active Directory User Reports Active Directory Group Reports Active Directory NTFS Reports Active Directory Passwords Reports Active Directory user logon Reports Active Directory GPO Reports Active Directory users Active Directory Reports for account lockout policy AD Reports for Last log on
  • Managing users, computers and contacts in Active Directory is a time consuming job for administrators. JiJi AD Bulk Manager helps to save administrators time by making AD Management process simple. Users can create/modify/delete users, computers and contacts attributes in bulk (General Attributes, Exchange Attributes & Terminal Service Attributes, etc) by importing the values from CSV or using a template.
  • JiJi AD Bulk Manager - AD Bulk User Export is a secured client server model which helps administrator/a delegated user to make AD management process simple. You can create / modify / delete users, computers and contacts attributes in bulk (General Attributes, Exchange Attributes, Terminal Service Attributes etc).
  • JiJi AD Bulk Manager - AD Bulk User Export is a secured client server model which helps administrator/a delegated user to make AD management process simple. You can create / modify / delete users, computers and contacts attributes in bulk (General Attributes, Exchange Attributes, Terminal Service Attributes etc).
  • JiJi GPO Search tool enables administrator to search GPOs with a user specified keyword. It extends the GPO search beyond the limit by providing individual settings level search.It resolves the search limit you had with Group Policy Management (GPMC). It provides settings based keyword search, advanced search, gpo viewer, export search result to PDF, CSV or Excel format, GPMC Integration, Multiple domain support.
  • JiJiTechnologies GPO Export Import Tool - GPO ExIm enables Export or Import GPO settings from Group Policy Objects. GPO Tools creates Group Policy Object Settings, GPO Policies, GPO Active Directory settings. In GPMC, you can only Export or Import the whole GPO settings.GPO Export Import tool give you the granular level Export, Import, Cut, Copy, Paste, Report and Remove control over the GPO. The GPO testing can be made easy with GPO ExIm tool
  • JiJiTechnologies web based Active Directory Change Auditing Reporting Tool provides tracking, scheduling, live monitoring and change alerting unauthorized Active Directory vital changes in real time without the overhead of native Auditing. It also provides the detailed information like Who, What, When, Where, Which and Why for every changes. It enables forensics activity to ensure Enterprise Security and prevent Security Breach.
  • Platform independent reverse proxy server that allows your trading partners to access your data without having to open ports on your internal network or store sensitive information in the DMZ.
  • JspISAPI is developed by NeuroSpeech, it is an ISAPI dll which runs under IIS 4.0 onwards to tunnel java/tomcat requests to Tomcat web server running on same machine. Features: 1) Get rid of 8080 from web addresses 2) Get uniform web statistics under IIS 3) Monitor Bandwidth in IIS 4) You can throttle bandwidth with IIS for tomcat applications 5) HTTP Keep Alive for Jsp through IIS 100% 30 Day Money Back Gurantee if the software doesnt run to your expectations.
  • Kernel for Exchange to Novell GroupWise is one such efficient software that has been primarily devised to perform email migration operation right from MS Exchange to Novell GroupWise platform. In fact, the software has got an exceptional attitude to export all public folders to Novell GroupWise mailbox folders. The most striking aspect about this software is it converts large sized Exchange mailboxes and PST files. And, just in case one is not sure about how to convert the password protected PST file, then the large sized Exchange mailboxes and PST files, then with this tool it actually gets lot easier to deal with such situation. In fact, the product possesses ability to convert large sized Exchange mailboxes and PST files. Apart from that maintaining the integrity of data is never a matter of big concern. The tool is proficient enough to maintain or preserve the integrity of data in the migrated mailboxes, Outlook profiles or PST files. Moreover, the tool supports file names with UNICODE characters and save ...
  • KernSafe iStorage Server is an advanced and powerful, full-featured software-only iSCSI Target Server for Microsoft Windows (both commercial and free versions). iStorage Server is IP SAN solution and allows you quickly export an existing storage such physical disk, partition, CD/DVD-ROM to all the clients, that delivers immediate benefits allowing storage to be consolidated, virtualized and centrally managed...
  • A knowbase system allowing for the storage, retrieval, and sharing of unstructured information within an organization.
  • LiteFTP is a feature-packed FTP server that includes anonymous, shared, group, and superuser access, resume (upload and download), quotas, connection limits, speed per connection limits, advanced access controls, and unlimited accounts. Integrated DynDNS and No-Ip dynamic DNS clients help make LiteFTP a complete and convenient server solution. The administrator is given a precise log of everything that occurs.
  • LitePXP is a program designed to run PHP pages from CD or USB Stick. 1. It is a portable application which includes Apache, MySQL and PHP. 2. You can run this software directly from CD/DVD or any other media. 3. It runs PHP pages and its window will display the respective page. 4. You can re-brand and customize it with your product name and icon. 5. You can distribute it with your applications on CD or other media.
  • Cluster - Load Balance software enables multiple real servers to work as one powerful, reliable, scalable and easy to manage Web server cluster. Cluster - Load Balance is Windows-based traffic and content manager providing the scalable and highly available TCP / IP data transportation, IP Failover management solution for Internet, Intranet and cluster applications. Load Balance is high availability software package with relay tunnel and proxy technology to perform high number of connections, low response time, continuous availability and powerful security . Load Balancing URL (Http://, Https://, Ftp://, Mms://) Redirection and IP Switch (TCP/IP Failover) tools.
  • Local SMTP Relay Server is a SMTP server program for Windows that lets you send email messages directly from your computer. Along with a mass mailer the program can be used as a relay server for sending newsletters, distributing messages to different mailing lists, sending notifications to your customers, as well as for sending personalized messages. You can use it instead of ISP's SMTP server to increase your email security privacy
  • Local SMTP Relay Server is a SMTP server program for Windows that lets you send email messages directly from your computer. Along with a mass mailer the program can be used as a relay server for sending newsletters, distributing messages to different mailing lists, sending notifications to your customers, as well as for sending personalized messages. You can use it instead of ISP's SMTP server to increase your email security privacy
  • SMTP server program to send email messages without help of your ISP, directly from your local PC to recipient mailboxes. Use your favorite email client along with this software as usual. Mobile PC users who travel a lot and have to switch between different ISPs on the run will find this software ideal. Increase your privacy by using this server instead of your ISP's account. Built-in firewall lets you protect it from the outside of the Internet.

Page 8 of 12
1 2 3 4 5 6 7 8 9 10 11 12


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware