LanSpy is a network security scanner, which allows getting different information about computer Domain and NetBios names, MAC address, Server information, Domain and Domain controller information, Remote control, Time, Discs, Transports, Users, Global and local users groups, Policy settings, Shared resources, Sessions, Open files, Services, Registry and Event log information. Nothing on the remote computer is hidden from you now.
Windows 2000/XP/2003 Server
Like it? Share with your friends!
Other Windows Software of Developer «LanTricks»:
LanCalculator LanCalculator - makes possible not only to easily calculate the subnet addresses range and subnet masks but also broadcast address, net address, net prefix and net mask inversion which is used in the access control lists (ACL) of Cisco network equipment. O
LanShutDown LanShutDown is made for computer shutdown and/or reboot under Windows control both locally or on the net. In addition you can write a message to be shown before shutdown. It is obligatory to have administrator rights to shut down a remote computer. One cli
LanWhoIs LanWhoIs provides information about domains and addresses in the Internet. This program helps you find out who, where, and when registered the domain or site you are interested in, and the information about those who supports it now. LanWhoIs will answer a
Mirracrypt Encryption for Outlook Mirracrypt Encryption for Outlook integrates seamlessly with Outlook 2003 & 2007 to provide powerful Sender-to-Receiver E-mail Encryption that is convenient and easy-to-use. Mirracrypt is the perfect add-on program for any Outlook user who requires confide
Secret Server Secret Server is a secure password management system for information technology teams. This password manager features AES 256 bit encryption, the U.S. government standard encryption algorithm. Users can safely store, view, audit and when necessary, share a
Microsoft Exchange 5.5 Outlook Web Access Patch OWA is a service of Exchange 5.5 and 2000 Server that allows users to use a Web browser to access their Exchange mailbox. However, a flaw exists in the interaction between OWA and IE for message attachments. If an attachment contains HTML code including sc
CopyNotify Small Business Edition Control and Block USB drive usage across the office network. Monitor all files being copied onto USB drives and Block Unauthorized USB drives in office (white listing). Disallow USB port usage for data transfer out of office.Limitations:15 day trial
TrustPort WebFilter 2010 TrustPort WebFilter 2010 is a progressive solution for protection of your company network. It monitors web activities of all users in the network. It enables blocking of selected categories of websites, for instance porn, warez, gambling, and chats. This w
Deskman Deskman allows you to tightly secure desktops and lock computers, and it's suited for both home users and administrators. Combining different options, you can achieve the desired level of security. Deskman is advanced, yet accessible, desktop security mana
FileWipeOut Stop stolen laptop data disasters. Meet compliance standards. Block forensic discovery. FileWipeOut exceeds government standards for file destruction by ten times. FileWipeOut overwrites, scrubs, and destroys files in seconds flat. Just select a file for d
Device Seizure Perform logical and physical forensic extractions of mobile phone & device data such as iPhone, iPads, Androids, BlackBerry, & more. Forensically acquire user data such as contacts, call logs, SMS, MMS, pictures, videos, and much more. Recovers deleted cel
abylon Logon SSO Pro Abylon LOGON protects your computer against illegal access in a comfortable kind. You need only to train a smart card, and removable media (e. g. memory stick) or a CD with your windows login data. In future you need only this physical key for the login au