mail abuse shareware downloads


Search results for «mail abuse»:

AbusePipe 2.1.2 AbusePipe 2.1.2
… lows for abuse emails to be analysed via customized reports or via Reporting tools such as Brio and Business Objects. Limitations You may use an Evaluation Copy of this SOFTWARE for up to 30 days in order to determine whether it meets your needs.… 

Mail Access Monitor for PostFix 3.9c Mail Access Monitor for PostFix 3.9c
… o take control of corporate e-mail system. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. The progra… 

Mail Access Monitor for CommuniGate Pro 3.9c Mail Access Monitor for CommuniGate Pro 3.9c
… o take control of corporate e-mail system. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.Mail Access… 

Mail Access Monitor for Novell GroupWise 3.9c Mail Access Monitor for Novell GroupWise 3.9c
…  take control of corporate e-mail system. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. The program… 

MailBeamer 3.37 MailBeamer 3.37
… ges against MAPS (mail abuse Protection System) Runs as a service on Windows NT or Windows 2/2003 Compresses messages when sending to reduce bandwidth (25% for zip files, 50% on average, 80% for WinWord and Excel) Limitations 30 days trial.… 

MailScan for SMTP Servers 6.x MailScan for SMTP Servers 6.x
… eway level. Clustering: This feature is useful to ISP or Servers that receive a large number of mails that need to be scanned. FREE 24/7 ONLINE SUPPORT. Requirements Pentium - 100 Processor and above 64-128 MB of Physical Ram 50 MB of free HDD… 

Stealth Activity Reporter 4.6 Stealth Activity Reporter 4.6
… s track use and abuse easily and invisibly using password-protected encrypted log files. You can deploy this tool using e-mail. Simply send an e-mail to the person using the computer you want to monitor. STAR will then be installed silently on th… 

SMTPBeamer 3.41 SMTPBeamer 3.41
…  Runs as a service on Windows NT® or Windows 2/2003 Compresses messages when sending to reduce bandwidth (25% for zip files, 50% on average, 80% for WinWord and Excel) Encrypts messages using SSL / TLS when sending Limitations 30 days trial.… 

Mail Access Monitor for Exim Mail Server 3.9c Mail Access Monitor for Exim Mail Server 3.9c
…  take control of corporate e-mail system. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. The program… 

Ace Spam Scram 1.00 Ace Spam Scram 1.00
… o so by using the WhoIs. There is a Automatic options that will try to locate the right WhoIs. You can also make a Trace Route or Ping and it can all be done from Ace Spam Scram. Very easy to use and there is even an option for whois.abuse.net… 


Related: mail abuse  abuse  abuse emails  spam abuse  nntp news smtp mail email e mail smtp mail smtp e mail control activex mail queue e mail queue mapi