Home Contact Sitemap

N5 Net Software Repository

Your one-stop for all your software needs.

Search N5 Net Software Repository:

Search Files

Only Freeware



Areas Of Interest

Authors Area

Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.

10-Strike Connection Monitor 4.41

Security & Privacy :: Access Control


(Click to Enlarge)

Monitor network connections to your shares, find out who opens your files shared over the local network. Protect your computer or file server, be notified when an intruder opens secure folders and files. When a connection attempt is detected, the program will pop a window with details on the remote user trying to access shared files and adds that data to a log file along with the remote user's name, files and folders accessed, and access date and type. At the same time, the owner of the data will be alerted with a screen message accompanied with sound and e-mail notifications.


Version: 4.41
Author: 10-Strike Software

License: Shareware
File Size: 2 MB
Last Virus Scan: 2018-02-20
Downloads: 389
Views: 545
Price: $39.95

Installer: Install and Uninstall
Released: 11-3-2015

Recent Changes:
Added a filter for disabling recording to a log when certain remote users connect from certain computers to a certain folder. This helps to reduce the log file size and allows analyzing the critical information easier. Added ability to create the "black/while" lists for connecting MAC addresses.

network resource share access monitor connection server user protect security



Buy Now | Visit Home Page

Runs on:

WinXP, WinVista, WinVista x64, Win7 x32, Win7 x64, Win2000, Windows2000, Windows2003, WinServer, Windows Vista Ultimate, Windows Vista Ultimate x64, WinNT 4.x, Windows Tablet PC Edition 2005, Windows Media Center Edition 2005, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, Windows Vista Home Basic x64, Windows Vista Home Premium x64, Windows Vista Business x64, Windows Vista Enterprise x64, Windows 8, Windows Server 2012


local network, existing shares


Similar Products:


Network & Internet :: Other
img Managed software deployment for corporate networks. Total Software Deployment makes deploying software on any number of computers a blast. Software inventory management, automatic network scanning, and concurrent deployment of multiple types of installation packages make TSD a clear winner among remote deployment tools. Unlike competition, this tool supports advanced concurrent deployment, allowing to install multiple packages on multiple PCs.
Windows | Shareware
Read More


Network & Internet :: Network Monitoring
img The Managed Switch Port Mapping tool maps the physical port connections of a managed network switch to MAC and IP addresses of the attached devices using SNMPv1/v2c/v3. Shows VLAN assignment, port status, speed, duplex, connected device interface manufacturer, LLDP, CDP connected devices, LACP/LAG, PAGP links and more. Spreadsheet format results can be printed in color. Export results to XML or tab delimited text.
Windows | Shareware
Read More

RADMIN VPN 1.0.3448

Network & Internet :: Other
img Radmin VPN - is a free and easy-to-use software product to create virtual private network (VPN). The program allows users to establish a secure connection between computers over the Internet as if they were connected over a LAN. Provides you with a secure VPN tunnel. Encryption keeps your connection safe. The connection speed is up to 100Mbps. Radmin VPN does not malfunction after months of continuous operation
Windows | Freeware
Read More


Security & Privacy :: Anti-Virus Tools
img Metadefender Cloud Client is the most thorough free malware analysis tool available. Metadefender Cloud Client performs a deep endpoint forensic analysis for malware using several unique methods: memory module multi-scanning with 40+ anti-malware engines, local anti-malware log file analysis, and IP reputation analysis to identify potential threats. Look for threats and assess the security state of an endpoint if you think it may be compromised.
Windows | Freeware
Read More