Editor's choice |
Top Exchange Recovery
Easily recover Exchange EDB File by using Enstella Exchange Recovery Tool
Notepad Pro
HTML source Editor for Windows with syntax highlighting, utlimited text size etc
WebSlinky
WebSlinky is an off-line browser tool. It has a simple user-interface and ha...
DISCo WatchMan Upgrade
DISCo WatchMan intended to monitor contents of e-mail boxes, frequently visi...
Enstella Best EDB to PST Tool
Enstella EDB to PST Tool-best EDB File Recovery program to recover EDB to PST
DKMessenger
DKMessenger is a free peer-to-peer messenger with video and Voice Over IP.
Exchange Migration to PST
Enstella Best EDB Migration tool smoothly does Exchange Migration to PST
|
|
Innovative software package gainings from the greatest in download directories! Investigate the asked-for programs families, check the newest refreshes of the perfect programs solutions, and test straight off! Do not lose an advantage to download the best apps: apply SoftEmpire directory to test software solutions for free of charge. Meet the aggregation of free programs and software tool demo versions. Choose among system softwares, get controllers, softwares for relax, and all other sorts of software apps for your PC or cell devices!
Internet utilities and tools for home and business. Programs for file sharing, download managers and e-mail software. Free download.
|
Remote Administrator
|
|
Download
|
Buy now!
|
View screenshots
|
Vendor Price: $ 35
License: Shareware
File Size: 1.81 Mb
Version: 2.2
Release Date:
15 Jun 2004
OS: Win95, Win98, WinME, WinXP, WinNT 4.x, Windows2000, Windows2003
System Requirements:
nothing special
Company: Famatech International Corp.
Languages:
|
Remote Administrator (Radmin) is the award-winning remote control program that is fast, reliable and secure, which enables you to work on one or more remote computers from your own computer.
You see the remote computer desktop displayed either in a window or full screen on your computer monitor. All your mouse and keyboard functions are transferred to the remote computer. You work with the remote computer as if you are sitting in front of it. The remote computer can be located anywhere on the Internet or LAN. It is a complete remote control and remote access solution with all key features such as View and Control Modes, File Transfer and Telnet support included.
Radmin is optimized for both high- and low-bandwidth connections, so even if connected via modem, you have 5-10 screen updates per second.
If you are connected to a LAN you, can reach real-time speeds of 100 - 500 screen updates per second. This can be adjusted up or down to save bandwidth. When in "Full control" mode you can do whatever you like on the remote computer - remote access, monitor, transfer files to and from, shutdown, logoff, etc. All provided you have a login and the permissions.
Radmin provides robust 128-bit strong encryption of all data streams.
Radmin supports the OS-integrated NT security system with NTLMv2 support, and includes smart protection from password guessing and DoS attacks. The software is based on the TCP/IP protocol. All you need to control a computer located anywhere in the world is a TCP/IP connection between the two computers and a login.
Radmin is very secure and reliable remote control software. It typically works months without exceptions. Radmin is widely used for network management and helpdesk support either in large corporate networks with tens of thousands of computers or on small business and home networks. Many travellers use Radmin to remotely access their home or office computers from anywhere. It is also extensively used by telecommuters.
|
More to download:
Access Administrator
Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet acces
1st Security-Administrator
Protect PC, restrict access to Windows applications, password-protect boot, apply access restrictions to PC, deny access to Control Panel, disable boot keys, context menus, DOS, Registry editing, Internet, network access. Hide desktop icons, disk dri
Access Administrator Pr
Controls access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level, allocates access to files and folders between users according to predefined schedules, and protects system files and folders...
#1 Photo To VCD Burner
#1 Photo To VCD Burner is a powerful but easy to use DVD/SVCD/VCD authoring application. This tool can help you to easily burn your favorite digital photos into a DVD/SVCD/VCD compatible slideshow on video CD, complete with background music and awes.
Work Examiner Standard
Work Examiner Internet Usage Monitoring tools for pc monitoring and internet monitoring. Get our computer and internet monitoring for tracking employees' activities, generating detailed reports, locking/unlocking separate applications or websites.
Popup Killer and Ad Stopper
Popup Killer and Ad Stopper is a compact and efficent plug-in of Internet Explorer. It has the following features:- Block the annoying popup ad/ads windows;
- Block Messenger Spam (which is getting popular today);
- Block Macromedia Flash;...
NetFlow2SQL Collector
NetFlow2SQL Collector can be used to receive NetFlow packets from routing devices and store their contents into databases on Microsoft SQL and MySQL servers for retrieval and analysis. NetFlow2SQL Explorer explores stored data, exports into csv, xls.
Network Incident Tracker
Network Incident Tracker is designed to optimize support delivery and leverage thousands of valuable support hours. The tool enables tracking of problem resolution for support cases.
|
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|