Remote Administrator Control Client Lite 3.5.0

Remote Administrator Control Client Lite 3.5.0With Remote Administrator Control you can work without any limits on a remote computer with operation system Windows, as if working on your local computer. You can connect through Internet/Intranet network with the TCP/IP protocol.

You can also connect to computers without public or static IP addresses using VPC (Virtual Private Connection).

The connection can be done through the integrated HTTP tunnel if your work computer is limited to viewing internet sites only, so that you could remotely control your home computer from work and the other way around.

Supported Remote Services: Full Control, Viewing Only, File Transfer, Command Prompt, Process Control, Chat, Sending Message, Computer Shutdown.

The RAC is made of RAC Client Lite and RAC Server (remote computer).

The RAC Client Lite (this) displays all the activity that is being done on the remote computer, and you can fully control the remote computer with your keyboard and mouse or only view. For remote computer control there are some displays modes available: full screen, 15-200% display.

During the time of controlling the remote computer you may record all your activities to video files. The data transfer between the client and server is secure, all data frames are encoded. Using the RAC Client Lite is free (freeware).

The RAC Server runs on the remote computer, waiting for requests from client. You can connect more users to the server. The server can run as a system service under the Windows to enable remote log on to system and support Fast User Switching.

RAC Server is shareware you can test the fully functional version during the 30-day trial period. After the trial period expires you may use without any charge the redirect service and HTTP tunnel server with the possibility of tunneling TCP or UDP ports.

Active Backup Expert Pro 2.11

A full-featured backup tool creates automated zip- or cab-format backups of local and network files on hard disks, CD, DVD, Blu-Ray, HD-DVD and other removable devices, local network or FTP site. A Wizard guides you through the steps of the backup-set creation: selecting the folders and filters for included and excluded files, specifying the storage folder and setting to schedule. Once you have configured your backup-sets, the ABE will create an unlimited number of backups at timed moments.

Though you can use a shortcut or a hotkey to launch a backup anytime you wish. Use Incremental or Differential mode to back up only new and changed files. You can easily restore the files from any backup, view or edit their content. The export and import features are useful to synchronize the folders on two or more PCs and to span large backups across multiple discs. Other features include selecting files by date, size and attributes, Blowfish backup encryption, creating self-extracting backups, the support for the Command-line and ActiveX automation. The ample documentation is available.

The ABE Pro creates the unattended backups by using the Active Task Manager included into the installation package. This automation utility can work as a stand-alone application to help you to schedule other tasks. Though, you can use the MS Task Scheduler to automate your backups as well.

A VIP Simple To Do List 2.9994

A VIP Simple To Do List 2.9994

VIP Simple To Do List is an easy-to-use PDA software which uses To Do List method to help you do more tasks spending less time. It increases your personal productivity drawing much of your attention to the most important tasks which give 80% of successful results.

You can use VIP Simple To Do List to manage your time and tasks at home. Using our software you will optimize efforts you take to carry out your everyday tasks and activities. It is your right hand in:

  • planning personal life for days, months and years ahead
  • organizing, prioritizing, setting deadlines and tracking tasks
  • managing meetings, events, household projects, repairs, etc.

Parent Tools for AIM 2.0.1

Parent Tools for AIM 2.0.1Parent Tools is a powerful yet easy-to-use tool for monitoring and controlling AIM. With this software, you can silently save all conversations, block features, and limit online time. Features Include:

Silently record Instant Message and Chat Room conversations:

Parent Tools comes loaded with powerful tools to monitor all chat and instant message conversations from any screen name on your computer. Saved conversations are hidden, compressed, and encrypted for maximum security.

Limit online time to a certain number of hours per day:

Set online time limits for all screen names or create different limits for each different screen name on your computer.

Create an online schedule to limit times per day online:

Create schedules where screen names can only sign on at your specified times

Disable chat rooms with objectionable titles:

Block out objectionable chat rooms that contain words or phrases that you specify.

Disable incoming and outgoing IMs from select screen names:

Block any screen name for any reason using this feature.

Disable several IM and chat features that could be used to deliver objectionable material:

Disable incoming and outgoing chat invitations, the instant message “Direct Connect” feature, and the IM Talk features built into AIM

Powerful stealth features to hide the program:

Remove the Parent Tools icons while the program is running, and hide it from all visibility while its running

Welcome Screen Setup Wizard:

After installing Parent Tools, a helpful setup wizard will get you up and running in no time!

Integrated Help Questions:

The control panel window has a help context button at the top of the screen. If you ever have a question about what anything does, just press the ? button and click the item in question.

Easy Folder and File Backup & synchronization ECSync

ECSync 1.0

ECSync 1.0

Professional program that saves and synchronizes data and files on any Windows computer. Easy synchronization of files on notebook, desktop and server. Data can be on internal or external disk or other storage device. Extensive options for configuration. Tasks can be stored in profiles for individual copying processes. Can be automated with Windows Task Scheduler for periodic tasks. Runs with and without user intervention. Creates log files. Very fast! A must for every notebook owner!

ECSync! works on the same drive, on another drive or across a network. Works in both directions to ensure that all files are up to date.

Can save source and target locations plus all options in profiles. Can synchronize a saved profile with one click automatically.

Creates shortcuts to profiles to synchronize files by only one double click on the shortcut or putting the shortcut in Scheduled Tasks for frequent synchronization and backup.

Makes exact copies of folders for backup and archive purposes. Can also be used as a briefcase and transport the data between two unconnected machines using any movable media.

  • Keeps all your computers and disks up to date.
  • Synchronizes your notebook with your Desktop.
  • Synchronizes files within a work or project team.
  • Transfers files between your office, home and your notebook Computers.
  • Backups your day’s work and transfers data between Computers.
  • Writes status and error information to a log file.
  • Is currently available in english and German.
  • May be adapted to different languages easily.
  • 60 days trial period without restriction!

Nsauditor Network Security Auditor 2.1.4

Nsauditor Network Security Auditor is a network security scanner that allows to audit and monitor remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Nsauditor is a complete networking utilities package that includes a wide range of tools for network auditing, scanning, monitoring and more. You can discover network services and check them for vulnerabilities, list all TCP and UDP endpoints with their associated process, discover NetBios names, audit MS SQL servers, scan for common Adware traces and more.

The program also includes real-time network packet filtering and analyzing, remote network performance monitoring, network status monitoring, web proxy scanning, password auditing, intrusion detection system based on security events log analyzer and firewall system that allows to stop internet threats and block unwanted network connections, IP address lookup and more than 45 network tools for scanning, sniffing, enumerating and gaining access to machines, DNS and WHOIS lookups, e-mail validation and HTTP traffic generator.

Overall, this is a very complete package for a surprisingly low price. The product contains a built-in database of known network security vulnerabilities, which allows you to select the items for scanning and add custom entries. Nsauditor can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios, RPC, SQL and SNMP information, open ports.

It can also audit password and security policies as well as make a variety of network attack probes, such as stealth port scans, HTTP / CGI server auditing, registry auditing. The program can sniff and use brute-force and dictionary attacks on LM and NTLM password hashes and expose the insecure ones. Nsauditor does OS detection and automatically creates OS fingerprints which are not included in database. Reports can be generated in HTML and XML format.