10-Strike Connection Monitor v.4.3

Advertisement
Advertisement
Editor's Review
Get Details On Who Accesses Your Shared Folders Through 10 – Strike Connection Monitor
 
Introduction To The Software
10-Strike Connection Monitor supervises network links on your shared resources and as well discovers who opens up your files over local network. The software is considered to be one of the best one that will help in protecting your servers and will also apprize you when a trespasser unfolds protected or confidential folders and files. The program renders screen, audio, and electronic mail notices on links to shared resources, and preserves a log file with data on inaccessible user and computer name, accessed data file and folder name, type of access, and so forth. It besides permits you to enable and incapacitate accession to network shares when required, employing the program's context menu in the arrangement tray. When a link endeavor is observed, 10-Strike Connection Monitor will crop up a window with particulars on the remote user attempting to access distributed files and adds that information to a log file along with the remote user's name, files and folders accessed. Simultaneously, the possessor of the data will be alarmed thru e-mail notices or with an on-screen content companioned by a sound.

Significant Features
The program's primary function is supervising of present user connections to shared resources. The program allows you to configure warning signal* and experience appraisals when an intended user unites to your folders and unfolds files. Each fresh user connection to a share or data file access is cracked whether it should arouse an alarm with the assigned parameters or not. You will be at once apprised when a connection to your shared folder happens by a specific user, from a predestined computer, or from a computer with certain Internet Protocol or MAC address. All connections to your shared folders are registered to the log file. You will right away be notified whenever an individual transcripts many data or opens excessively many files, someone accesses a vital folder or someone erases files in an eminent folder. The software is besides proficient enough to unplug users who download huge files mechanically according to the blacklist settings. The software has been supplied with a new power to watch the amount of files opened up by a user and alarm when the restrain is achieved. The program can as well supervise the entire file size of files unfolded by a user. When some user replicates several data, the program will apprize you about that. Employ the "Monitor file omission and access to specific folders" characteristic for this. The software likewise at present features of a reinforced share access scrutinize execution. At once you will be able to configure the refresh time in milliseconds. This helps observing more file access outcomes.

Pros
One of the greatest assets of the 10 -Strike Connection Monitor software is its notification feature as it has the tendency to immediately notify the user through an e-mail message or a screen message or playing a sound file whenever a user opens or causes any changes to a multitude of data files.

Cons
The software has a really disturbing and nag screen and is not an easy tool for beginners top operate instantly. It will take the fresher sometime to master the various easy features of the software.

Conclusion
If you are on the lookout for a software that will help you to watch your network and ascertain who has access to your files and has contrasting kinds of notices to allow you to recognize about the activity within your network, then there is no finer software than 10- Strike Connection Monitor software.


Publisher's Description

Monitor network connections to your shares, find out who opens your files shared over the local network. Protect your computer or file server, be notified when an intruder opens secure folders and files. When a connection attempt is detected, the program will pop a window with details on the remote user trying to access shared files and adds that data to a log file along with the remote user's name, files and folders accessed, and access date and type. At the same time, the owner of the data will be alerted with a screen message accompanied with sound and e-mail notifications.

Monitor access to shared folders and files. Find out who opens your files over network. The program generates screen, sound, and e-mail notifications on connections to your network shares. It writes a log file with information on remote user name, files and folders viewed, date, access type.

network, resource, share, access, monitor, connection, server, user, protect, security

 
  • 10-Strike Connection Monitor
  • 4.3
  • 01 Dec 14
  • 10-Strike Software
  • WinXP, WinVista, WinVista x64, Win7 x32, Win7 x64, Win2000, Windows2000, Windows2003, WinServer, Windows Vista, WinNT 4.x, Windows Tablet PC Edition 2005, Windows Media Center Edition 2005, Windows 8, Windows Server 2012
  •  
  • Shareware
  • 2.05 Mb
  • 378
  • $39.95
 
 
Latest Versions History
Version Date Released Release Notes
4.3 01.12.2014 Fixed bugs in email alerts.
4.2 07.10.2014 Added the file filter to the share access monitoring. Now you can filter out access to some temporary files, the printer spooler files, etc. The folder opening will be ignored when this option is enabled in the program settings.
4.0 23.08.2013 Added the ignore filter to the file deletion and creation monitoring.
3.0 30.03.2012 Added new ability to monitor the number of files opened by a user and alert when the limit is reached. The program can also monitor the total file size of files opened by a user. When some user copies a lot of data, the program will notify you about that.
 
 

Review 10-Strike Connection Monitor

  • captcha
 

Other software of 10-Strike Software
  • 10-Strike Bandwidth Monitor  v.3.0Monitor network bandwidth, audit the local network and Internet traffic usage. The program gathers data on the inbound and outbound traffic and displays the current bandwidth in the real time. It can alert you when a host utilizes too much traffic.
  • 10-Strike LANState  v.7.6Monitor hosts, services and servers, files, folders, free space, switches and UPS via SNMP with this network mapping and monitoring program. The network mapper will scan your LAN and create a map with devices being monitored and represented by icons.
  • 10-Strike Log-Analyzer  v.1.5110-Strike Log-Analyzer 1.2 processes raw log files (NCSA common and extended formats) which are created by web-servers (such as Apache, etc) and generates many types of reports and histograms (such as referrers, files requested, redirected requests ...

New Security software
  • User Time Control  v.6.1.2.5User Time Control Center lets you specify when exactly and how long the computer can be used. Schedule time intervals and the number of hours each child can use the computer per day a week.
  • Efficient Password Manager  v.5.50.0.540Efficient Password Manager is a free but cross-platform password management application. She can help you remember generic passwords, software registration codes, e-mail account passwords, etc. And you can sync data across PCs and mobile phones.
  • NetBull  v.3.0.0.3NetBull is the best and most undetectable keylogger you can find on the Net. By using the latest in PC monitoring techniques, NetBull tracks activities like Internet browsing, keyboard usage, chat convos, Facebook etc. NetBull site: www.netbull.com ...
  • RDS Knight Security Essentials  v.2.0RDS-Knight is the right shield for your windows servers. In minutes you will prevent foreigners from opening a session, avoid brute force attacks on your server, restrict access by device and by time, and provide security for your users environment ...
  • Be Mine  v.5.0Enjoy st. Valentine's day screensaver with your love! Be Mine screensaver is the best gift for your passion. Multiscenes, animated screensaver with several soundtracks will impress your imagination for a long time!
  • SystemAI  v.1.5SystemAI™ creates an ideal virtual computer for each of your applications. It isolates applications to eliminate conflicts. It then uses the intelligence of all SystemAI-enabled computers to create custom optimizations for each virtual computer.