Software Downloads for "Proactive Audit Logging"

jPlug is a opensource J2EE framework for developing enterprise multi-tiered applications. It comprises of multiple pluggable API and tools to provide common solutions for different application solutions like batch job, persistence, audit, logging etc.
jPlug J2EE Framework License - GNU General Public License (GPL).

  • Platform: WinOther
  • Publisher: Jplug
  • Date:

Policy Patrol Archiver stores Exchange emails into a central database, allowing you to apply email retention policies and reduce the load on your Exchange Server. Users can search and restore their own messages through an easy-to-use web interface. Policy Patrol Archiver boosts Exchange Server performance by optionally stubbing messages, and removing messages from the Exchange Information Store. Policy Patrol Archiver allows you to set email retention policies, specifying emails of a certain age to be automatically removed from the email archive database.

AsdeqDocs - Secure Mobile Document Management. AsdeqDocs enables BYOD productivity with Enterprise control allowing the secure and automatic synchronization of corporate documents to and from employee’s Tablets & Smart Phones. The AsdeqDocs solution is installed on premise, behind the corporate firewall and directly connects a mobile employee with more than 18 leading document management solutions including SharePoint, Trim, Documentum, Exchange, File Shares, OpenText, WebCenter and IBM Connections.

Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks. Proactive Password Auditor helps secure networks by executing an audit of account passwords, and exposing insecure account passwords. If it is possible to recover the password within a reasonable time, the password is considered insecure. The software supports a few different methods of obtaining password hashes for further attack/audit: from dump files (generated by 3rd party tools like pwdump/pwdump2/pwdump3), Registry of local computer, binary Registry files (SAM and SYSTEM), memory of local computer, and memory of remote computers (Domain Controllers), including ones running Active Directory.

  • Cibet
  • License: Freeware
  • Rating

Cibet is a handy framework designed to offer developers interfaces and classes to introduce audit - proof archiving and logging and dual control mechanisms like four-eyes principle and six-eyes principle into their applications.

The Cibet framework helps to control the execution of important business processes. To control an application in the sense of Cibet is not meant on a security level but on the reliance and trustfulness level.

.

Super 32-bit logging and debugging tool for C/C++ developers. Decreases development time significantly: no more slowly stepping through your program. Use macros to write information to a logfile. EXTREMELY POWERFUL: optionally duplicate the debug info REAL-TIME to a scrollable window. Suspend/resume, detect memory leaks, log function-call stack, disable/enable all logging or specific types from any point in your app, hex-dumps, more than one log file, system-generated error messages, exact #CPU-cycles between a function's entry and exit, printf-like logging, 64-bit integer values, current and maximum mem-usage at any time, array logging.

pdfapps PDF Security and Privacy Audit 2.0 Do you leave private, confidential or sensitive information in PDFs? Do your published PDFs conform to your information security policy? Auditing your PDF documents before release is a crucial business step in information management. PDF Security and Privacy Audit helps perform this step by instantly showing and reporting on the metadata and security permissions in your PDF documents. Features and Benefits: Instantly batch report on private metadata information that may have been left in PDFs.

  • Platform: Windows
  • Publisher: PDFapps.com
  • Date: 08-05-2005
  • Size: 1639 KB

Proactive Security Auditor FE (Freeware Edition) is a free, small, fast and easy to use program to assist Windows(R) system administrators and ordinary users to keep their computers secure by identifying what security updates are installed on local and remote machines, and allowing to download and install missing patches from Microsoft web site.

The features and advantages of Proactive Security Auditor FE are:
 Very small and extremely fast
 Intuitive user interface
 Agentless - no software to install on client machines
 Credentials management
 Does not use MSXML and MDAC - no additional software/libraries needed
 Scanning remote machines selected by NetBios names or IPs
 Compare scans made at different times - see what patches have been added and...

Monitors folders and sub folders for the following changes:- -File/Folder Attributes -File/Folder Last Write Time -File name -Folder name -File/Folder Security Attributes -Detailed Logging -Real time file monitoring -FREE for private use.

DEKSI Network Audit provides a complete software and hardware inventory of all your network p.c.'s. DEKSI Network Audit is an extremely powerful, feature rich, advanced, but easy to use software system designed to provide network administrators with comprehensive and detailed reporting on all the software and hardware inventory installed on your networked computers. You can view the Information remotely, generate a variety of different reports, as well as track the changes that occurred since your last inventory was run.

Get a complete audit of your PC's hardware and software. Easy and fast. Great for personal and business use. Why people love it: * Automated - No more tedious manual PC audits. (Hint: forward it to employees!) * Accurate - Uses Windows Management Instrumentation (WMI) to collect PC inventory data. * Secure - No download required; runs right in your browser; no data sent back over the network. * Easy - Reports can be easily printed and exported to Microsoft Outlook or Excel with a single click.

  • Platform: Windows
  • Publisher: Express Metrix
  • Date: 01-08-2008
  • Size: 176 KB

Email Audit is a powerful add-in utility for Microsoft Outlook 2000/XP/2003.As the new mail arrives,it filters and clusters Spam mails, Junk mails, Bounce mails into their respective folders. The email audit utility comes with a host of built in spam control filters and flexible user defined filters. You can now create Whitelist of email IDs belonging to your friends, colleagues, relatives so that mails originating from your Whitelist contacts are secured. Features of Email Audit: Works on Microsoft Outlook 2000/XP/2003.

PAE is the best tool designed to Analyse and Audit your MS Windows Network PAE is the best tool designed to Analyse and Audit your entire Microsoft Windows Networks, Domains and Computers.1) Permission analysis and scanning (NTFS, audit and ownership) through the folders, files, LDAP objects and registries. Visualization of the permission inconsistencies, inheritance, differences and changes through time between folders and subfolders2) Visualization of the files and folders size and disk occupation, dynamic and recursive navigation through the files, folders, nested users and groups.

  • Platform: Windows
  • Publisher: winsysbee.com
  • Date: 21-9-2009
  • Size: 3051 KB

The Lock provides user audit and monitoring, access control, Internet and system security for any computer running Windows XP, Server 2003, Server 2008, Windows Vista, Windows 7. The Lock now supports 64 bit versions of Windows 7. Running on Windows 9x/ME may work, but is no longer supported. The Lock is PL-1 compliant to Chapter 8, NISPOM. It also meets Sarbanes-Oxley Access Control, Intrusion Detection, and PC Auditing requirements, as well as meets HIPPA, Access, Authorization, and Security control requirements.

In Codenica Audit, the auditing process is divided into two stages: scanning and recognition. The first stage is responsible for collecting source data (WMI, Windows registry, scanned files) from hosts (scanned computers) to be audited. The second stage is a process of transforming source objects into inventoried objects (computers, hardware, and software). Each stage can be fully configured by the user. The Codenica Audit software for PC auditing can perform one-time or periodic audits (computer audits, software licensing audits, etc.

  • Platform: Windows
  • Publisher: Codenica
  • Date: 15-04-2011
  • Size: 3056 KB

Complete network audit can be handled accurately and totally automated in a multi-OS network environments. Network Audit Advisor ensures each and every node is scanned and all the needed information is retrieved. You can audit your network agentlessly or using an exported agent utility, which can be run using a domain Logon script or right from a USB Flash drive Computer Audit Our enterprise-level computer audit software lets any business audit the whole network in just a matter of minutes. Plan hardware and software upgrades, optimize and save on licensing, improve security configuration thanks to deep and detailed computer audit of every node in your network.

WebSpy Sentinel is an advanced data logging device that captures the activity of multiple protocols on your network, including web, secure web, email, telnet, FTP and POP3. Sentinel can also be configured to capture the full content of these protocols. Sentinel will not only store URLs but has the ability to capture full web content and full email messages - so now you can analyze Sentinel log files and see dynamic content web pages and even attachments accessed by your network users. Sentinel can also be configured to log only low-level data without content, such as only the names of web pages visited without content, or the subject lines of emails without the body of emails.

  • Platform: WinOther
  • Publisher: WebSpy
  • Date: 05-11-2012
  • Size: 2632 KB

Audit Impression.

  • Platform: WinOther
  • Publisher: CZ Solution
  • Date: 18-11-2012
  • Size: 51763 KB

The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and using removable media. Using this software to become possible to receive the anformation about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole. Also you can restrict access to some programs (using file tame or keyword) or to CD/DVD/Zip and other removable media.

PC Remote Permissions Audit is a network permissions audit tool that lets you gather detailed user permission data from servers on the network. This includes Direct Access Token, Direct and Group Access Token, Direct and Everyone Access Token and Access via Any Token. The data is stored in an XML database on your local computer. The data can be exported to many popular formats. Data can also be reported and be sent directly to default installed printer..

New Reviews


Print Inspector

Whether you are using a printer connected to your local desktop computer or a print server sometimes you need to see whats going on in your printer by having a close look at the print jobs sent by the users. Print Inspector is such type software ...


Disk Genius

Disk Genius was formerly known as Partition Guru which is an all-in-one solution for disk partition management, data recovery and disk repairing. It can recover lost files from partition, backup and restore partition table, clone partition or clone ...


Safe In Cloud

It is quite difficult to find any computer users nowadays who do not need to use the web, for any purpose. Whether it is for education or entertainment, the web is your best resource. You also need to use various online services for banking, ...


PictBear

Nowadays, a majority of PC users resort to digital image editing once in a while. It may be required for retouching image captured in smart phones or for creating an album in Facebook. For some people, tinkering with digital images is a pastime too. ...


Panda Cloud Cleaner

PC security has become a tricky and complicated subject both for home users and network supervisors, with complexity and risk factors multiplying over the years. Using a single antivirus app may not be enough anymore. That explains why many users ...


SnapCrab

Nearly every PC users need to take screenshots from time to time, whether it is for personal or professional needs. While using the basic Windows screenshot capture method is available, it is not adequate for everyone. When you want to capture ...


BitKiller

Dealing with various types of data efficiently holds the key to success in any computing task. Apart from generating new data and modifying existing files, it becomes necessary to delete existing files at times. While most users resort to using ...


SeaMonkey, Portable Edition

Using the Internet has become a necessity for a majority of people, including those who do not use a PC regularly. To browse web, stream video or download online content, people often resort to using various third party apps. For example, using ...


TuckAway Intelligent Email Organizer Pro

Using an email software allow you to do a number of things including managing your address lists, emails and even ending memos, documents and even virtual letters. You can also use it to manage your tasks easily. The email software comes in ...


WebAcappella

Web design sector has witnessed several trends and technological innovations affect website development in big ways. With time, designing websites has become easier. Nowadays, you can find web design software that nearly eliminates the need to ...


New Downloads

RationalPlan Single Project
for Mac

RationalPlan Single Project is
a project management software
covering the project
management areas starting with
WBS ...

Active@ Data Studio

Active@ Data Studio provides a
range of desktop applications
and a customizable boot
environment allowing you to
access ...

Debut Pro Edition for Mac

Debut Pro Edition Video
Capture Software for Mac
allows you to easily capture
video and store the data on
your Mac\'s ...

DosPrint

DosPrint allows you running
DOS programs on modern Windows
computers (64 bit too) and
printing to Windows printers
...

WinTools.net Premium

A suite of tools for
increasing MS Windows
operating system performance.
WinTools.net Premium contains
tools: Clean ...

WinTools.net Classic

Suite of tools for increasing
operating system performance.
WinTools.net cleanly removes
software from disk drives and
...

RationalPlan Single Project
for Linux

RationalPlan Single Project is
a project management software
covering the project
management areas starting with
WBS ...

ChequeSystem Cheque
Printing Software

ChequeSystem provides a
complete cheque printing and
management solution. You are
no need to write any, just
print and ...

SoftPerfect WiFi Guard

A specialised network scanner
that helps to protect and keep
your WiFi network secure. It
scans your wireless network at
...

Express Scribe Pro Edition

Express Scribe Pro Edition
helps typists by installing on
the user\'s computer and
connecting to a transcription
foot ...