English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by document audit

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: CI Discovery Network Inventory 3.0.211
Download CI Discovery Network Inventory 3.0.211
more info
Compare Suite 3.0 by AKS-Labs
2005-10-26
Compare Suite can compare both - related and non-related files. "By keywords" comparison feature highlights common and unique keywords, allowing to compare non-related files. Word-by-word comparison compares files with a common ancestor.
2005-10-26
Analyze log files of your WinGate proxy server and produce comprehensive report on the corporate Internet connection usage. Reports include bandwidth consumed by each user, sites visited, hourly and weekly usage, attempts to access blocked sites etc.
2005-10-26
Analyze log files of your WinRoute HTTP proxy & mail servers and produce comprehensive report on the corporate Internet connection usage. Reports include bandwidth consumed by each user, sites visited, incoming & outcoming mail etc.
ComfortAir HVAC Software 3.3 by Baltik Engineering Limited
2005-10-26
ComfortAir HVAC software is designed to be used by engineers, architects, contractors and energy auditors for calculating and analysing heating and air conditioning hourly loads in commercial buildings. Units can be set to English or Metric.
The Lock XP 5.05.0704 by CrashCourse Software
2005-10-26
Provides user audit, access, Internet and system security for any computer running Windows 98 to Windows XP. Meets requirements outlined in NISPOM, Chapter 8, as well as system security and auditing required by Sarbanes-Oxley and HIPPA.
SysAid Help Desk and Inventory 3.0.4 by Ilient Help Desk Software
2005-10-26
SysAid scans your network, providing information (such as hardware/software) about your assets, and allowing remote control. It also provides help desk, reports, and more.
2005-10-26
Infiltrator is an intuitive network security scanner that can quickly audit computers for vulnerabilities, security holes and exploits, and information enumerations. Infiltrator can reveal security holes and alert the user.
2005-10-26
Provides users with real-time graphical display showing what their PC is doing during idle time including system activity and availability overlaid on a choice of real-time revolving pictures of Earth from space showing major cities and local times.
LBE Desktop Helpdesk 186 by Leigh Business Enterprises Ltd.
2011-01-27
Easy to use helpdesk software - sensibly priced. No extensive training required. Easily configured to reflect the way that you work. Uses e-mail to keep everyone informed. Maintains a complete audit trail of all actions. Extensive reports supplied.
0.018