mail abuse free software


Search results for tag «mail abuse»:

AbusePipe 2.1.2 AbusePipe 2.1.2
… lows for abuse emails to be analysed via customized reports or via Reporting tools such as Brio and Business Objects. Limitations You may use an Evaluation Copy of this SOFTWARE for up to 30 days in order to determine whether it meets your needs.… 

Mail Access Monitor for PostFix 3.9c Mail Access Monitor for PostFix 3.9c
… o take control of corporate e-mail system. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. The progra… 

Mail Access Monitor for CommuniGate Pro 3.9c Mail Access Monitor for CommuniGate Pro 3.9c
… o take control of corporate e-mail system. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.Mail Access… 

Mail Access Monitor for Novell GroupWise 3.9c Mail Access Monitor for Novell GroupWise 3.9c
…  take control of corporate e-mail system. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. The program… 

Finger 2.4.5 Finger 2.4.5
… ill be shown in the Finger Response section. Using Finger tool makes possible to get Abuse Address of remote host. For example to get the abuse address of prontomail.com you should type prontomail.com@abuse.net in the finger input section.… 

MailBeamer 3.37 MailBeamer 3.37
… ges against MAPS (mail abuse Protection System) Runs as a service on Windows NT or Windows 2/2003 Compresses messages when sending to reduce bandwidth (25% for zip files, 50% on average, 80% for WinWord and Excel) Limitations 30 days trial.… 

MailScan for SMTP Servers 6.x MailScan for SMTP Servers 6.x
… eway level. Clustering: This feature is useful to ISP or Servers that receive a large number of mails that need to be scanned. FREE 24/7 ONLINE SUPPORT. Requirements Pentium - 100 Processor and above 64-128 MB of Physical Ram 50 MB of free HDD… 

SMTPBeamer 3.41 SMTPBeamer 3.41
…  Runs as a service on Windows NT® or Windows 2/2003 Compresses messages when sending to reduce bandwidth (25% for zip files, 50% on average, 80% for WinWord and Excel) Encrypts messages using SSL / TLS when sending Limitations 30 days trial.… 

Stealth Activity Reporter 4.6 Stealth Activity Reporter 4.6
… s track use and abuse easily and invisibly using password-protected encrypted log files. You can deploy this tool using e-mail. Simply send an e-mail to the person using the computer you want to monitor. STAR will then be installed silently on th… 

Mail Access Monitor for Exim Mail Server 3.9c Mail Access Monitor for Exim Mail Server 3.9c
…  take control of corporate e-mail system. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. The program… 


Related: