abuse shareware downloads


Search results for «abuse»:

AbusePipe 2.1.2 AbusePipe 2.1.2
… itations You may use an Evaluation Copy of this SOFTWARE for up to 30 days in order to determine whether it meets your needs.… 

TrafficProgrammer Standard Edition 0.6 TrafficProgrammer Standard Edition 0.6
… increase 100% free targeted traffic to your site? TrafficProgrammer Standard Edition offers the solution to increase traffic and web visitors to your site with pure and 100% free targeted auto/manual surfing traffic interchange! Complete abuse control Surfing not effected while send… 

PhotoMarker Pro 1.5 PhotoMarker Pro 1.5
… ny Beach Estate, frontline golf road 22', you simply create a photomark with this information and burn it into the 50 photographs, so all viewers will always know which property is shown on these photographs.… 

CallerIP 4.1b CallerIP 4.1b
… not protected by firewalls, so you can identify hackers before your system or confidential information is compromised. Worldwide WHOIS lookups show domain and network contact information for IP addresses, web servers and email servers, including abuse reporting information. Connections to yo… 

Mail Access Monitor for CommuniGate Pro 3.9c Mail Access Monitor for CommuniGate Pro 3.9c
… e control of corporate e-mail system. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.Mail Access Monit… 

Mail Access Monitor for PostFix 3.9c Mail Access Monitor for PostFix 3.9c
… e control of corporate e-mail system. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. The program wor… 

Personal Inspector 6.20 Personal Inspector 6.20
…  to monitor computer activity of employees and find out if they misuse corporate resources or spend too much time on their personal needs, what applications they are running and which Internet resources they visit (this may help you prevent Internet abuse and reduce the risk of liability). Perso… 

Stealth Activity Reporter 4.6 Stealth Activity Reporter 4.6
…  send an e-mail to the person using the computer you want to monitor. STAR will then be installed silently on th… 

Mail Access Monitor for Novell GroupWise 3.9c Mail Access Monitor for Novell GroupWise 3.9c
…  control of corporate e-mail system. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. The program work… 

MailScan for SMTP Servers 6.x MailScan for SMTP Servers 6.x
…  MailServer and the MAPS DUL project helps in identifying and stopping Spam. The project has a list of DUL users who are known Spammers. To verify if the request for connection to your SMTP Server is genuine, you can send a query to dialups.mail-abuse.org. The request is verified and returned. R… 


Related: abuse  abuse emails  mail abuse  spam abuse  software abuse advertising anti spam anti