Download Shareware and Freeware Software for Windows, Linux, Macintosh, PDA

line Home  |  About Us  |  Link To Us  |  FAQ  |  Contact

Serving Software Downloads in 956 Categories, Downloaded 50.146.698 Times

EagleEyeOS 2.beta

  Date Added: April 13, 2006  |  Visits: 2.499
4 Stars4 Stars4 Stars4 Stars4 Stars

EagleEyeOS
Full screenshot

Report Broken Link
Printer Friendly Version


Product Homepage
Download (568 downloads)



The main features of the EagleEyeOS Real time monitoring This feature gives the possibility to visualize the events in real-time and can be started or stopped any time. The monitored events are, date, time of the event, type, the name and location of the events source file, the name and location of the events target file, the ID of the user, the name and ID of the process that assisted the event, the result of the event. File Life-Time Tracking (FLT) The purpose of this feature is to track the complete life-time of a file, namely it gives a possibility to see how many location was the file copied to, which users opened it to read or modify, where and what files versions can be found in the organization. Both of the origin search and FLT draw the complete life-time of the relevant file from the first generation. Device handling EagleEYeOS can controll Floppy drives, CD or DVD drives, Infrared ports, general or storage-based Bluetooth drivers, Firewire Ports, Wires Lan, COM and LPT ports, Network access, USB drives or any media connected via PCMCIA drive. The access of these media can be normal (when read and write are enabled), read only or completely disabled. Notebook handling In case a notebook logs off the corporate network, the logging and storage of the log files is done locally. As the relevant protection profile is available on the local host too, the protection on the notebook will not decrease. As soon as the notebook logs in the protected network again, EagleEyeOS sends the saved log files to the server. QuarantineEagleEyeOSs Quarantine feature is a solution for document protection, that enables you to create separated data storage territories. In these Quarantines the data flow is allowed until the data stays inside the Quarantine, as soon as the dataflow points out of the Quarantine - by any means, be that coping, attaching to e- mails, clipboard operation, remote access - the dataflow gets blocked.

Requirements: .NET Framework 1.1
Install Support: Install and Uninstall
Platforms: Windows 2000, Windows XP
Keyword: Data Security Eagleeyeos Data And File Security Software File Monitoring File Security Security Logging And Audit Security Logging And File Monitoring Solution
Users rating: 0/10

License: Freeware Size: 5.55 MB
USER REVIEWS
More Reviews or Write Review


EAGLEEYEOS RELATED
File Cataloguers  -  File List Generator 1.0
ReStoring Data's File List Generator Freeware software filters, prints, and organizes via a file's: name, type, size, created date, and date last modified. It was developed by the Research and Development team to aid data recovery service clients...
5.63 MB  
Development Tools  -  Receive serial data and decode it 1.0
This blockreceives serial data from an instrument or processor and decode it to apply on a plant model. You can see how serial receive block works and other blocks like ASCII Decode and Data type conversion . After receiving the data and decoding,...
10 KB  
Utilities  -  ZABBIX 1.4.2
ZABBIX is software for monitoring of your applications, network and servers. ZABBIX project supports both polling and trapping techniques to collect data from monitored hosts. A flexible notification mechanism allows easy and quickly configure...
2.7 MB  
File Renamers  -  Glary Undelete 5.0.1.15
Glary Undelete is a free and easy-to-use yet powerful file undelete solution for FAT and NTFS file systems. It will bring back files emptied from the Recycle Bin, in a DOS window, from Windows Explorer with the SHIFT key held down. It will even...
4.42 MB  
Security Tools  -  Bittium Data Protect Free Encryption Software 1.04
"Make your secrets unbreakable!" It's the major purpose for us to develop this software. Because most computer users have some document files, picture files, video files etc. Which don't allow unauthorized user to access. So, turn to us right...
842 KB  
Backup Utilities  -  Asoftech Data Recovery 2.0
Asoftech Data Recovery is the ideal rescue package for those who have accidentally deleted files, emptied the Recycle Bin, or even reformatted a disk or flash drive containing important data. The software is designed specifically to help recover...
4.13 MB  
Development Tools  -  UAV Matching and Data Base 1.0
this program consider to be data base of micro and mini uav's and allow to you to make matching between data and show the result in excel report
3.01 MB  
Database Tools  -  Data Masking Suite 1.4
Easy Data Masking - simple to install, flexible, and self-explanatory. Create test data and mask sensitive data. Orpheus Data Masking Suite is exceptionally easy to use. You don't need IT skills to know how to mask the sensitive data you...
3.65 MB  
Security Tools  -  Overwrite Program 1.4
Overwrite Program is a program that overwrites empty space on disk, data and metadata. The operating systems and programs automatically write and delete data on disk, for example text editors may save copies of the document for recovery and...
407 KB  
Utilities  -  Eltima RS232 Data Logger 2.7
RS232 Data Logger by Eltima Software is an Open Source application which allows you to redirect all communication data from RS232 compliant serial port device into a text file for further analysis. Redirects data from any available serial port...
745 KB  
NEW DOWNLOADS IN WINDOWS SOFTWARE, SECURITY TOOLS
Windows Software  -  iTop Screen Recorder 4.5.0.1385
iTop Screen Recorder is an all-in-one screen recorder, video editor, and screenshot tool. It helps capture anything on your PC screen to be a high-quality video file or screenshot, as well as edit the recorded videos and local videos to make them...
144.59 MB  
Windows Software  -  Lock Cursor Tools 7.0
Lock Cursor Tools simply locks the mouse cursor. You may choose a predetermined area, the primary or secondary monitor screen or part of the window of a particular application. Lock Cursor Tools makes your computer work more productively by...
1.34 MB  
Windows Software  -  Sync2 Cloud 2.10
Synchronizing Outlook between multiple sources now made easy with Sync2 Cloud, powerful Microsoft Outlook synchronization software. Sync Outlook Calendar, Contacts and Tasks between multiple sources. Share Outlook Calendar with others without...
28.29 MB  
Windows Software  -  WDZ Hash Generator 1.0
A simple program that can generate hashes such as md5, sha1, sha2 and many others. Hash function - a function assigning any short number to any large number, always having a fixed size, non-specific, quasi-random value, so-called irreversible...
2.27 MB  
Windows Software  -  WriterHelper 1
WriterHelper consist of WordNet Dictionary, WordNet Thesaurus, Plagairism Checker, Encryption using TripleDES, DES, and AES. WriterHelper helps you to search for dictionary, thesurus using WordNet Dictionary, Encrypt Text using AES, DES,...
223 KB  
Security Tools  -  Privacy Eraser Free 6.4
Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Microsoft Edge, Mozilla Firefox,...
9.41 MB  
Security Tools  -  WinGPG 1.0.1.1
WinGPG developed by Scand Ltd. is a tray-based classical Windows application and a classic GPGv2 distribution (we use the cryptography from the official site without making any modifications). It supports the following operations:...
9.39 MB  
Security Tools  -  USB Lockit 1.0
USB Lockit - Password Lock USB Drive. Protects the USB drive with your photos, audios, videos and other files from prying eyes on Android & Windows. Once the drive is locked, nobody can access your files. All in 3 Easy Steps: 1. To lock...
11 KB  
Security Tools  -  Overwrite Program 1.4
Overwrite Program is a program that overwrites empty space on disk, data and metadata. The operating systems and programs automatically write and delete data on disk, for example text editors may save copies of the document for recovery and...
407 KB  
Security Tools  -  Security Camera Viewer 5.2
If you have one or more IP cameras, then you also need software that is able to receive and display a video stream from these devices. Most likely you will also want to monitor access to the rooms in automatic mode. A modern security system should...
29.53 MB