WhoHasIt 3.0
This version contains a major UI and browsing revamp, enabling servers and volumes to be browsed and checked without needing a drive to be mapped.
|
This version contains a major UI and browsing revamp, enabling servers and volumes to be browsed and checked without needing a drive to be mapped.
WhoHasIt lets the administrator quickly check who is using a file on the server.
The easy to use windows interface is far simpler than trying to do the same job using MONITOR/RCONSOLE.
WhoHasIt also displays any record locks held on the file and it is ideal for tracking down database problems.
WhoHasIt features
Requirements
tags the file record locks windows interface use windows
Download WhoHasIt 3.0
Purchase: Buy WhoHasIt 3.0
Similar software
WhoHasIt 3.0
The Gadget Factory
This version contains a major UI and browsing revamp, enabling servers and volumes to be browsed and checked without needing a drive to be mapped.
UGadget 1.6
The Gadget Factory
UGadget displays a full list of all connections used on a server.
WhoHasNT 2.0
The GadgetFactory
Now removes the need for elevated rights - Can be given to non privileged users.
LogDate 1.4
The Gadget Factory
LogDate allows the administrator to scan the NDS tree and look at the last login times for users.
Novell NetWare Revisor 3.8
Lanetis Software
Novell NetWare Revisor is a useful, reliable and multi-functional tool for managing servers running Novell NetWare 3.
DSpace 2.9
The Gadget Factory
Dspace is a Disk Usage Scanner which is specifically designed for Novell Networks.
DBatch 1.1
The Gadget Factory
DBatch is the command line version of our DSpace program.
SEES 1.6.1
Eastbow l.a.b.
SEES is a concurrent file collaboration and version system provides file sharing, editing by multiple users in a network.
UserSpace for Netware 1.3
The Gadget Factory
UserSpace quickly scans users home directories and reports on the amount of space used in each one.
ZedMon 3.24
Toucan IT
ZedMon is a NetWare server monitoring tool that provides network administrators with at-a-glance information on user activity, network address, login time and protocol preference, as well as server utilization and open file information.