Best Bopup Scanner Alternatives in 2024

Find the top alternatives to Bopup Scanner currently available. Compare ratings, reviews, pricing, and features of Bopup Scanner alternatives in 2024. Slashdot lists the best Bopup Scanner alternatives on the market that offer competing products that are similar to Bopup Scanner. Sort through Bopup Scanner alternatives below to make the best choice for your needs

  • 1
    Site24x7 Reviews
    Top Pick

    Site24x7

    ManageEngine

    547 Ratings
    See Software
    Learn More
    Compare Both
    Site24x7 provides unified cloud monitoring to support IT operations and DevOps within small and large organizations. The solution monitors real users' experiences on websites and apps from both desktop and mobile devices. DevOps teams can monitor and troubleshoot applications and servers, as well as network infrastructure, including private clouds and public clouds, with in-depth monitoring capabilities. Monitoring the end-user experience is done from more 100 locations around the globe and via various wireless carriers.
  • 2
    Paessler PRTG Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Paessler PRTG is an all-inclusive monitoring solution with an intuitive, user-friendly interface powered by a cutting-edge monitoring engine. It optimizes connections and workloads, reduces operational costs, and prevents outages. It also saves time and controls service level agreements (SLAs). This solution includes specialized monitoring features such as flexible alerting, cluster failover, distributed monitoring, maps, dashboards, and in-depth reporting.
  • 3
    Angry IP Scanner Reviews
    The Angry IP scanner scans IP addresses and ports very quickly. It can scan IP addresses from any range and any ports. It is lightweight and cross-platform. It doesn't require installation and can be copied and used wherever you like. Angry IP scanner simply pings each IP to verify that it is alive. If it is, it will resolve its hostname, determine the MAC address, scan ports, and so on. Plugins allow you to increase the amount of data collected about each host. You can also access additional features like NetBIOS information (computer, workgroup, currently logged-in Windows user), favorite address ranges, webserver detection, customizable openers, and NetBIOS information (computer, workgroup, and currently logged in Windows user). You can save scan results to CSV, TXT or XML files. Angry IP scanner can collect any information about scanned IPs using plugins. Anyone who can code Java code can create plugins and extend the functionality of Angry IP scanner.
  • 4
    Acunetix Reviews
    Acunetix is the market leader for automated web application security testing and is the preferred tool for many Fortune 500 customers. Acunetix can detect and report on a wide range of web application vulnerabilities. Acunetix's industry-leading crawler fully supports HTML5/JavaScript and Single-page applications. This allows auditing of complex, authenticated apps. Acunetix is the only technology that can automatically detect out of-band vulnerabilities. It is available online as well as on-premise. Acunetix includes integrated vulnerability management capabilities to help enterprises manage, prioritize and control all types of vulnerability threats. These features are based on business criticality. Acunetix is compatible with popular Issue Trackers, WAFs, and is available online on Windows, Linux, and Online
  • 5
    LizardSystems Network Scanner Reviews

    LizardSystems Network Scanner

    LizardSystems

    $79.95 one-time payment
    Network Scanner is an IP scanner. It can scan large corporate networks with hundreds of thousands of computers as well as small home networks with many computers. The program can scan a variety of IP addresses, computers, and ranges of addresses. However, the number and subnets that it can scan is unlimited. Network Scanner will display all shared resources, including hidden NetBIOS (Samba), shared resources as well as FTP and web resources. Network Scanner is available to both network administrators as well as regular users. It can be used to audit network computers and search for available resources. Network Scanner can not only locate network computers and shared resources but also check access rights. Users can mount the network drive, or open them in Explorer. The program allows you to easily export the network scan results to an XML or HTML file, or save them in the program.
  • 6
    Free IP Scanner Reviews
    A free IP scanner is a fast IP scanner and port scanner. It can be used by system administrators as well as general users to monitor and manage networks. This program is powered by multi-thread scanning technology and can scan hundreds of computers per second. It simply pings each address to verify that it is alive. If it is, it can optionally resolve its hostname, scan ports, and so on. A free IP scanner can display NetBIOS information, including the host name, workgroup, current logged user, and MAC addresses. The information can be exported as plain text files. Administrators will appreciate the fact that the Free IP Scanner scans hundreds of computers per second. It can be configured to scan at different priority levels, limit the number of threads, and so forth. To enter the first and last IP addresses, you can use two fields in IP Range. You can enter a lower number than the first IP address. It is okay to translate your input.
  • 7
    Spiceworks IP Scanner Reviews
    Spiceworks IP Scanner automatically detects devices in your network. Basic information such as OS and MAC address can be retrieved with the scanner. You can also get detailed information about your servers and workstations, including storage, memory, serial number, CPU, and other software information. You can get the information you need with minimal setup. IP Scanner, a cloud tool, scans your network and returns a list of devices it finds. You can filter, search, and export devices to CSV. It will scan a local subnet by default. However, you can define your own IP range. The IP Scanner lists every device's hostname and IP address, as well as its vendor, OS, MAC addresses, description, open ports, and whether it's up/down. The type of device being scanned will determine the type of data that is returned.
  • 8
    MyLanViewer Reviews
    MyLanViewer Network/IP scanner is a powerful IP address scanner that can be used to scan local area networks (LANs). This program will allow you to find all IP addresses,MAC addresses, and shared folders on your Wi-Fi or wired network. The program scans your network and displays the information in a buddy-list-style window. It also provides the computer name and IP address. It can monitor your external IP address, send email notifications when it changes, and can also send emails to notify you. MyLanViewer Network/IP Scanner is able to turn on remote computers, view and manage shared folders, terminate user session, show netstat information and detect rogue DHCP server.
  • 9
    SolarWinds IP Address Tracker Reviews

    SolarWinds IP Address Tracker

    SolarWinds

    $1,288 one-time payment
    SolarWinds®, IPAM IP address tracker software automatically detects your network's IPv4 IP addresses and allows you create IPv6 subnets with a step-by–step wizard. IPAM records and keeps track of changes in MAC addresses, hostnames and status (reserved or transient, in use, in use and available) by regularly scanning managed subnets with ICMP, SNMP and neighborhood scanning. This automated IP address tracking feature records all IP addresses for a specific time period. Administrators can also use the timestamp provided by the tracker to help them troubleshoot network problems. Administrators can quickly access detailed device information to help them diagnose and resolve problems. SolarWinds IP Address Tracker can be used to identify conflicts and determine which device had the IP address in the first place. You can also change the IP address of the device in conflict.
  • 10
    ManageEngine OpUtils Reviews

    ManageEngine OpUtils

    ManageEngine

    $345.00/one-time/user
    OpUtils is an IP address and switch port management tool that engineers can use to efficiently monitor, diagnose and troubleshoot IT resources. OpUtils is a complement to existing management tools, providing real-time monitoring and troubleshooting capabilities. It makes it easy for network engineers to manage their switches and IP addresses. This switch port management tool includes over 20 tools that can be used to monitor network performance, such as monitoring bandwidth usage, monitoring the availability of critical devices, and backing up Cisco configuration files. Advanced IP scanning of IPv4 or IPv6 subnets within your network is possible to identify available and used IP addresses. You can scan all switches in your network, map ports, run port scans, and view details such user, physical location, and more. Block access to rogue devices and identify rogue device intrusions.
  • 11
    Advanced IP Scanner Reviews
    Advanced IP Scanner has been proven reliable over the years to be a useful tool for managing LANs and performing a wide variety of networking tasks. Famatech and beta-testers from all over the world rigorously test each new version. To ensure the best possible solution for customers, Famatech takes into consideration all suggestions for product improvement. Radmin, Famatech’s popular remote tech support product, is integrated with Advanced IP Scanner. This allows Advanced IP Scanner to expand its capabilities and simplifies the job of the system administrator. Famatech software can be used by many technology leaders, including IBM, Sony and Nokia, HP and Siemens, as well as major telecommunications operators and government organizations and financial institutions.
  • 12
    Lansweeper Reviews
    Lansweeper can help you discover your IT and build your central IT Asset System of Record. You can easily audit all assets within your company's network using the Lansweeper Deepscan IP scanner engine. You can create a network inventory that includes all hardware, software, and users. Scan Windows, Linux, or Mac devices. Keep track of all your licenses, serial numbers, and warranties from major brands such as Dell, IBM and HP. Detect Unauthorized Local Admins and unify Office 365/AD User Data. Get the netbios domain, check for Windows Updates and more. You can discover all assets in your IT environment you didn't know about and take full control over your network. Get your free trial to get started with IT asset management.
  • 13
    Nmap Reviews
    Nmap is an open-source software project that aims to dispel the stereotype of poorly documented open-source software. It provides a comprehensive set documentation for installing and using Nmap. This page links to Insecure.Org documentation as well as generous contributions by other parties. Nmap Network Scanning, the official guide to Nmap Security Scanner is a free and open source utility that millions of people use for network discovery, administration and security auditing. This book is suitable for all levels of security and networking professionals, from beginners to advanced hackers to explaining basic port scanning techniques. The 42-page reference guide explains each Nmap option and feature, while the rest of this book shows how to use those features to solve real-world problems. Diagrams and examples show real communication over the wire.
  • 14
    WiFi Scanner Reviews

    WiFi Scanner

    WiFi Scanner

    $29.99 one-time payment
    WiFi Scanner scans nearby networks and provides vital WiFi information for troubleshooting purposes. Filtering and sorting options can narrow down the results in high-occupancy areas. Channel graphs at 2.4 GHz or 5 GHz allow you to see overbearing and overlapping signal interferences that can affect network performance. The IP Scanner scans for devices connected to your network. Overcrowding can lead to speed and bandwidth issues. The Speed Test allows you to keep track of network speeds and performance. To test upload and download speeds, you can use a laptop to walk to different areas in your network. The IP Scanner Who's On My Network searches your network for connected devices. Too many devices can slow down your network, which can cause connection and speed problems. It can also be used for detecting intruders on your network.
  • 15
    Slitheris Network Discovery Reviews

    Slitheris Network Discovery

    Komodo Laboratories

    $195 per 256 devices
    Most network scanning software packages require credentialed access to remote devices in order to detect operating system. Slitheris Network Discovery uses TCP/IP stack fingerprinting, other technologies, and can identify many operating systems without authentication or credentials, including Windows (and its Edition), Linux and iOS. Slitheris can also scan for details about the operating system, such as Windows Uptime and Cold Boot Time, Time of Day, and Domain/Workgroup names. It distinguishes between Domain types and Workgroup types without requiring authentication or credentialed accessibility. This saves time and frustration when trying to find usernames and passwords, or visiting servers and PCs in person. This unique feature will be especially appreciated by IT Providers and Managed Service Providers.
  • 16
    Intruder Reviews
    Intruder, an international cyber security company, helps organisations reduce cyber exposure by providing an easy vulnerability scanning solution. The cloud-based vulnerability scanner from Intruder finds security holes in your digital estate. Intruder protects businesses of all sizes with industry-leading security checks and continuous monitoring.
  • 17
    SolarWinds IP Address Manager Reviews
    Use IPAM's capacity reporting feature to track subnet usage and aid in capacity planning. Use the customizable subnet capacity template to get fast, flexible, and central reporting. The Subnet Allocation Wizard is an IPAM tool that allows you to divide your IP address space into subnets that are perfectly sized for your network. IPAM's drag and drop interface allows you to create groups that contain any number of subnets, supernets, or groups. You can also create custom fields and use them. vRealize Orchestrator can be used by vRealize Automation and vCenter to automate the management of IP addresses. Reserve unique IP addresses and have them released automatically during the appropriate machine lifecycle. IPAM can be used to locate abandoned addresses from both static or DHCP systems. Just use IPAM's autoupdated logs for easy identification and reclaim.
  • 18
    SoftPerfect Network Scanner Reviews

    SoftPerfect Network Scanner

    SoftPerfect

    $29.11 one-time payment
    This highly configurable IPv4/IPv6 scanner will streamline many of your network support processes. SoftPerfect Network scanner is a versatile tool that offers a user-friendly interface, portability, and a wide range of advanced options. It is ideal for anyone who needs to monitor and maintain a network, as well as system administrators and users who are interested in computer security. SoftPerfect Network Scanner allows you to ping computers, scan ports and discover shared folders. It can also retrieve virtually any information about network devices via SNMP, HTTP and SSH. It can also scan for remote services, files, performance counters, and registry. It offers flexible filtering options and exports NetScan results in a variety formats, from XML and JSON.
  • 19
    SecurityTrails Reviews
    Data for security companies, researchers, and teams. Access to historical and current data via a fast, always-up API. The API is available at a simple price structure that allows you embed our data in your applications. All the data is available, fully-indexed, historical and current, and can be accessed immediately. Search over 3 billion historical and modern WHOIS data, and WHOIS changes. Our daily-updating database is over 203,000,000 deep and growing. Find out what tech sites are currently online and search for over a thousand technologies. Monthly access to more than 1 billion passive DNS data sets. You will have access to the most up-to-date information about IPs, domains and hostnames in real time. With tagged and index intel, searching is quick and easy. Access a treasure trove of cyber security information and find the information you need. Our API is able to provide security analysts and developers with the most up-to-date DNS and domain information.
  • 20
    Infiltrator Reviews

    Infiltrator

    Infiltration Systems

    Infiltrator, a free, intuitive, and easy-to-use network security scanner, can quickly scan your network computers for vulnerabilities, exploits, or information enumerations. Infiltrator allows you to catalog a wide range of information about scanned computers, including installed software, shared files, users, drives and hotfixes. It also provides information on NetBios, SNMP information, open ports, and other information. Infiltrator will audit each computer's security policies and passwords, and alert you when necessary changes should be made. The report generator can generate a clean, easy-to-read report from all results. Infiltrator includes over 15 powerful network utilities that allow you to scan, scan, enumerate, and gain access to machines. You will also find utilities such as ping sweep, whois searchups, email trace, brute force cracking tools and share scanning. Network enumerating is also included.
  • 21
    Arachni Reviews
    Arachni is a Ruby framework that allows administrators and penetration testers to evaluate the security of modern web applications. It is modular, feature-rich, and high-performance. It is free and open-source, so you can review the source code. It is multi-platform and supports all major operating systems (MS Windows OS X, Mac OS X, and Linux). It is distributed via portable packages that allow for immediate deployment. It can be used for a variety of purposes, including a command-line scanner utility, a global high-performance grid of scanners, a Ruby library that allows for scripted audits, and a multi-user multiscan web collaboration platform. Its simple REST API makes integration easy. It can also support complex web applications that make heavy use JavaScript, HTML5, DOM manipulation, and AJAX thanks to its integrated browser environment.
  • 22
    FP Scanner Reviews
    The best iPad document scanner app, FP scanner, is available for free on iPhone and iPad. It can batch scan documents to pdf, and recognizes text automatically in all languages. The best and most user-friendly app of its kind, FP scanner, can help you save a lot. It is small and powerful, and you don't have to pay anything. It is dedicated to becoming the best scanner on your IPhone. FP Scanner can extract all text from any type of document, including company documents transcription, paper books and receipts, as well as photo translation text and ID card recognition. Excellent image processing engine. It can remove cluttered backgrounds automatically and generate PDF files comparable with scanners. Free editing and selection of recognition results can be automated.
  • 23
    EZ-FORMS Reviews

    EZ-FORMS

    EZ-FORMS

    $20 per month
    All the features of EZ Forms-EXPRESS Plus. Visual forms can be created from scratch, and can import scans or graphic images. PDFs also have fixed fields, encryption, entry validation, pick list, overlay printing to preprinted forms, data import/export into txt files, command-line options, type (fill in on screen), print, and save. TWAIN-compliant scanners are supported. There are millions of documents (forms.contracts.proposals.reports.etc.) that can be imported/exported to txt files. Quick and easy. Import Scans and Graphics (.PDFs too;PDFTyper™, Type (fill out the screen), Print, Save, etc. TWAIN-compliant scanners are supported. There are millions of documents (forms. contracts. proposals. reports. etc.) that can be imported. The DataBase Engine is a powerful tool for form management. Filler, printer, and viewer for export-related forms (Proforma Invoices, Commercial Invoices, Packing Lists, Certificate of Origin, Certificate of Origin), etc.
  • 24
    VirusTotal Reviews
    VirusTotal inspects items using over 70 antivirus scanners, URL/domain blocking services, and a multitude of tools to extract signals. Any user can use their browser to select a file and send it directly to VirusTotal. VirusTotal offers a variety of file submission options, including the primary web interface, desktop uploaders and browser extensions, as well as a programmatic API. The web interface is the most popular submission method. Submissions can be scripted using any programming language that uses the HTTP-based public API. VirusTotal is useful for detecting malicious content, as well as identifying false positives and normal items that have been detected as malicious by one or several scanners. URLs can be submitted in the same way as files. You can submit URLs via the VirusTotal webpage or browser extensions.
  • 25
    WinFindr Reviews

    WinFindr

    Macecraft Software

    $0
    WinFindr for Windows is a powerful yet easy-to-use data search tool. WinFindr lets you search for files, directories, registry keys, and registry entries using multiple search terms. You can search using regular expressions and wildcards. It is freeware, lightweight and fast - the portable version weighs less than 2MB! Key Features Search for files, directories, registry keys, and registry entries at the same time. Supports search with regular expressions, file masks, and normal search words. Supports multiple search terms at once. Also supports negative search words, which allows you skip any data. Save the results in TXT or HTML format. Supports command-line parameters Supports Windows Dark Mode Includes built-in translations. It comes in a portable version as well as a Windows Command Prompt. WinFindr, a lightweight and freeware program, is easy to use. No bells or whistles.
  • 26
    Dynamic Web TWAIN Reviews
    Dynamic Web TWAIN, a browser-based document scanner SDK, is specifically designed for web applications. You can create robust applications that scan documents from any scanner, edit the images, and save them to a local/server folder or document repository with just a few lines JavaScript code
  • 27
    Emsisoft Emergency Kit Reviews
    A scanner that can scan infected computers without the need for installation. If you don't have an old PC from the late 1990s, then the answer is probably yes. This assumes that you are running Windows 10 (64bit), Server 2016 or higher with the most recent service pack. Emsisoft Emergency Kit takes up about 200MB of your RAM while it is running. This is quite low considering the millions upon millions of signatures it must load. This will work best if your computer has at least 1GB of RAM. Emsisoft Free Emergency Kit is a powerful tool that can be used to solve many PC problems. Keep a copy Emsisoft Free Emergency Kit handy if you are the security expert in your home, office, or community. The malware emergency kit for infected computers. Dual-scanner that cleans infections. Portable, perfect for USB flash drives.
  • 28
    Zenmap Reviews
    Zenmap is the official Nmap Security Scanning GUI. It can be used on multiple platforms (Linux OS X, Windows OS X, Mac OS X and BSD). It is free and open-source. Nmap is designed to be easy to use for beginners while offering advanced features for more experienced users. To make it easier to run them again and again, you can save frequently used scans as profiles. A command creator allows interactive creation and editing of Nmap command lines. You can save scan results and view them later. To compare scan results, you can save them and then view them later. The scan results are stored in a searchable database. Zenmap is often available as part of Nmap. You can download it from the Nmap download page. Zenmap is very intuitive. You can read the Zenmap User's Guide for more information or visit the Zenmap man page to get quick reference information.
  • 29
    AdminToys Suite Reviews

    AdminToys Suite

    Lovelysoft

    $149 one-time payment
    Allows you to centralized monitor computer's performance and reliability, manage processes remotely, inventory computers in your network for hardware configuration, view remote desktop, track and limit disk space usage, synchronize computer clocks, restart/shutdown/power on network computers, execute commands remotely, configure network adapters remotely, dump your network computer's statistic to CSV, TXT or HTML. There are 18 network tools within. Monitor system performance and reliability, alert administrators if parameters are outside of normal range. View the history of all processes and CPU utilization. Run programs. View the system summary, remotely view the desktop, and inventory computers for hardware configuration. View data storage devices, perform HDD health checks, open, copy and move files and folders.
  • 30
    FIRMM Reviews
    FIRMM is a real-time monitoring system and biofeedback technology that addresses patient motion during brain MR. FIRMM software supports workflows, reduces motion, and improves scanning efficiency. FIRMM tablet features a touch screen and an intuitive GUI that makes it easy for scanner operators to use. FIRMM automatically saves session log files, so you don't have to worry about saving sessions. FIRMM doesn't require a camera or any other complex sensing hardware to work in your current MRI scanner. FIRMM patient biofeedback works seamlessly with your existing A/V system and is compatible with a variety of video display configurations.
  • 31
    sMonitor Reviews

    sMonitor

    Alexander Yarovy

    $49 one-time payment
    sMonitor, a network monitoring program, allows you to verify network connectivity between TCP/IP hosts on both the Internet and LAN. The program periodically checks the TCP and UDP ports of user-specified computers or other network devices. sMonitor will notify you via audible alarms, visible notifications and e-mail messages if the destination host fails or is unable to respond to a ping, connection request or user datagram. The program also generates log files in CSV format, creates and uploads HTML files by FTP, which reflect a current status. The program can be used to remotely manage systems (power management and reboot, alarm reporting) via telnet or modem using custom scripts, according to test results. sMonitor is available as a standard Windows application or a NT service. NetFlow2SQL Collector is a tool that can receive NetFlow packets from routing devices, and store them in databases on Microsoft SQL or MySQL servers for analysis and retrieval.
  • 32
    Essential NetTools Reviews
    Essential NetTools is a collection of network scanning, security and administrator tools that can be used to diagnose networks and monitor your computer's network connections. It's a great tool for anyone looking for a powerful network toolkit for everyday use. It displays a list of your computer’s inbound and outbound connections, along with information on open TCP/UDP ports, IP addresses, and connection states. It can map open ports to the ownering application, which makes it stand out from other NetStat utilities. You can also configure alerts for both incoming and outgoing connections. Advanced TCP port scanner allows you to scan your network looking for active ports. This scanner supports both stealth (half open) and conventional (full connect).
  • 33
    Adobe Scan Reviews
    Adobe Scan is a free download that turns your smartphone into a powerful scanner. It recognizes text automatically (OCR), and allows you to save, organize, and create digital files from your paper documents. You can scan anything, including receipts, ID cards, photos, recipes, business cards, whiteboards, and convert them into PDF or JPEG files that you can use on your smartphone, tablet or computer. Any document can be scanned and converted to PDF or photo. You can save and organize important documents to make them easy to find. This mobile PDF scanner can scan any document with accuracy. You can preview, reorder and rotate any photo or PDF. You can also adjust the color and resize. Edit imperfections, remove marks, creases and even handwriting. Forms, receipts, notes and ID cards can be captured and organized into custom folders.
  • 34
    Smartscan Reviews

    Smartscan

    Baus-Systems

    $295 one-time payment
    Since 2000, Baus Systems has provided programs that allow you to add barcoding to QuickBooks. SmartScan's product line adds barcode scanning, printing, verifies shipping, receiving, and allows you to conduct physical inventories and cycle counting. This will improve your inventory accuracy and decrease costly errors. Verify that your items on your invoice or sales order match the items you are shipping. You can use barcodes, a scanner, a mobile computer, or manually check off. Verify that your purchase order and the items in your shipment match using barcodes, a scanner, a mobile computer, or manually. A mobile computer can be used to perform physical counts, cycle counts, and inventory audits. When items are sold or received, update your inventory in QuickBooks automatically. You can use existing manufacturer barcodes, or create your own internal barcode numbering system.
  • 35
    TapScanner Reviews
    Scan, Print and Share any document to PDF. You can now scan, import, and share any document right from the best portable scanner app. TapScanner allows you to access everything you have scanned previously. With your mobile device, scan any document and convert it to PDF. TapScanner's pdf maker has you covered. You can instantly convert any image into a pdf. Your documents can be auto-cropped and sorted the way you want them. To attach an E-signature using the pdf sign tools, use the best document scanner. These powerful filters will make your scanned documents look professional. To enhance your scans, remove shadows and artifacts. Port to black or white, adjust contrast and brightness.
  • 36
    loginTimer Reviews
    loginTimer is an advanced software that automatically scans your computer system's login, including the date and time of each user's login, the total number of logins per day/user, administrative actions, and login behavior (local or remote), and saves these continuously, one-by-one, in a log file. It included the successful invention of first Y2K38 technology. The software is useful for home, business, personal computers, computer networks. Activate loginTimer, in any drive (Eg: E:\\your folder\loginTimer) or inside sub folders you choose. satheeshsoft Y2K38 technology successful invention software.
  • 37
    WinSCP Reviews
    WinSCP is a popular SFTP client. FTP, FTPS and SCP are all options to copy files between local computers and remote servers. WinSCP is a free open-source SFTP client/client, WebDAV client/S3 client and SCP clients for Windows. Its primary function is file transfer between local and remote computers. WinSCP also offers basic file manager functionality and scripting. Graphical user interface translated into many languages. Integration with Windows (drag and drop, URL, shortcut icons). All common file operations, including support for SFTP/SCP protocols over SSH/FTP and WebDAV/S3 protocols. Batch file scripting, command-line interface, and.NET assembly are available for advanced programming tasks. Directory synchronization can be done in many semi- or fully automated ways. Integrated text editor, shares site settings with PuTTY, and supports password, keyboard-interactive, public key, and Kerberos authentication.
  • 38
    Orion File Recovery Reviews

    Orion File Recovery

    NCH Software

    $9.99 one-time payment
    Orion searches your hard drive or any external or removable drive connected to your computer for deleted files. Files that have not been overwritten can be permanently deleted or recovered to prevent future recovery. You can recover and undelete deleted files, or permanently delete data. Recover deleted files, music, or photos. Data recovery from your external drive, flash drive, or hard drive. Permanently delete files to increase security. The Orion file recovery software will open with a wizard that will guide you to search for and recover files, or permanently delete them. Orion file recovery software can be downloaded for free. Wizard guides you through the search and recovery process. Scan memory cards, flash drives or hard drives. Deep Scan mode finds more files. Filter results by folders, file types, names, and more. Wizard for easy file recovery or deletion.
  • 39
    AccessPatrol Reviews

    AccessPatrol

    CurrentWare Inc.

    $3.99 PUPM
    1 Rating
    AccessPatrol is a data loss prevention and device control software for preventing data leakage to portable storage hardware. With AccessPatrol you can restrict a variety of peripherals including USB portable storage devices, optical media, Bluetooth, WiFi, FireWire, and cell phones. Access permissions for USB devices can be set to Allow, Read Only, or Blocked. Peripheral devices can be identified based on Vendor ID, Serial Number, and PNP Device ID. Specific USBs, External Hard drives, Imaging devices, and portable devices can be added to an Allowed List to enforce the exclusive use of company-approved devices.
  • 40
    IRISPowerscan Reviews
    With the IRISPowerscan™, you can scan, capture, sort, index and export any document to your business application. Any scanner, file or MFD can be used to capture data. Sort documents and extract valuable information. The extracted indexes can be used to automatically populate your ECM, Cloud systems, or document workflows. It's easier and faster to collect and share documents. We have developed a variety of IRISPowerscan™, versions to meet your business needs. No matter what configuration you have, IRISPowerscan™, scanning solution will work for you. It requires minimal training and offers a user-friendly interface. A file menu is available to create, save, and open projects. It also allows you to modify interface, language, and general settings. A simple navigation mode that allows you to scan, modify, and process documents. For advanced configurations and project customization, a detailed designer view is available.
  • 41
    VulScan Reviews

    VulScan

    RapidFire Tools, a Kaseya Company

    $99 per month
    Discover, prioritize, and manage internal and exterior vulnerabilities. VulScan's vulnerability scanning helps you harden your networks and protect them against evolving threats. VulScan provides a powerful tool to automate and complete vulnerability scanning. It detects and prioritises the weaknesses that hackers could exploit, empowering users to harden networks and create an extra layer of security. Flexible network scanning options will help you protect the networks that you manage. Vulscan offers on-premise internal network scanners, computer based discovery agents, remotely internal scanning via proxy, and hosted external scans for comprehensive vulnerability management.
  • 42
    Remote Deposit Capture Reviews
    The EC9600i/EC9700i network scanners can be used for remote deposit capture, remote lockbox capture, teller and branch captures, check cashing, and in-person payments. They are available in a variety single-feed and multifeed multifunctional models that can process between 30 and 100 documents per minute. The RDM EC9100i series scanners work well with Windows-based payment applications, such as remote deposit capture and remote lockbox, teller captures, check cashing, and in-person payments. The scanners can be used for single-feed or multi-feed, and can scan up to 90 documents per hour. These scanners are not compatible with RDM network scanners. They require the installation of a USB driver. This is similar to traditional check scanners from other manufacturers. Our simplified scanner programming interface, "RDM SCI", allows application developers to quickly integrate any RDM scanner and certify it within a few days. This is unrivalled in the industry.
  • 43
    Wapiti Reviews
    Wapiti is an application vulnerability scanner. Wapiti is a web application vulnerability scanner that allows you to audit your website or web application's security. It crawls the pages of the deployed web application, looking for scripts or forms where it could inject data. Wapiti, once it has a list of URLs and forms, as well as their inputs (inputs), acts like a "fuzzer" by injecting payloads into a script to see if it is vulnerable. Search for potentially harmful files on the server. Wapiti can be used to launch attacks using both GET HTTP and POST methods. It can also inject payloads into filenames. When an anomaly is detected (for example, 500 errors and timeouts), warnings are raised. Wapiti can distinguish between reflected and permanent XSS vulnerabilities. Creates vulnerability reports in different formats (HTML XML JSON TXT CSV).
  • 44
    Fast Scanner Reviews
    Fast Scanner scans any type document, from receipts to multiple pages books. All scanned documents can be exported as an industry-standard PDF file. The PDF file can be edited to add pages or remove pages. Fast Scanner supports many image editing options to make the scanned images as clear and easy-to-read as possible. Fast Scanner can scan any type of document, from receipts to multiple pages books. All scanned documents can be exported as an industry-standard PDF file. The PDF file can be edited to add pages or remove pages. Fast Scanner supports many image editing options to make the scanned images as simple as possible.
  • 45
    ClamAV Reviews
    ClamAV®, an open-source standard for mail-gateway-scanning software, is available. ClamAV provides a multi-threaded scanner, command-line utilities to perform file scanning on-demand, and automatic signature update. ClamAV supports multiple file formats, signature languages, and file and archive unpacking. ClamAV versions compatible with your operating system are available. ClamAV®, an open-source antivirus engine, detects trojans, viruses and other malicious threats. ClamAV®, an open-source (GPL), anti-virus engine, is used in a variety situations, including email scanning and web scanning. It also provides endpoint security. It offers many utilities to users, including a flexible, scalable multi-threaded Daemon, a command line scanner, and advanced tools for automatic database updates. Support for ZIP, RAR and Dmg archive formats.
  • 46
    FORTE 12 Reviews

    FORTE 12

    FORTE

    $24 one-time payment
    1 Rating
    FORTE 12 music notation software allows you to create sheet music on your computer in just minutes. It can also be played back by over 100 preloaded instruments with the click of a mouse. For more information, see the video and download your FREE trial of FORTE Premium today! You can easily create and edit music notation. You can also print physical copies. FORTE 12 is an innovative and simple-to-use program for notation. It can be used to compose, arrange, edit, and transpose scores, regardless of your experience. You can scan sheet music from your phone, scanner, or camera to import it into FORTE 12. Then, you can edit, transpose, and save it as MusicXML or MIDI. This software uses new algorithms to provide superior scanning and fast editing tools.
  • 47
    Nsauditor Network Security Auditor Reviews
    Nsauditor network security auditor is a powerful tool that scans networks and hosts for potential vulnerabilities and provides security alerts. Vulnerability Scanning Software and Network Security Auditing Software Nsauditor network auditor scans the enterprise network for any possible hacker methods and generates a report. Network Security Auditing Software, Vulnerability Scaner Network Security Auditing Software, and VulnerabilityScanner Nsauditor Network Auditing Software significantly reduces the cost of managing enterprise networks. This software allows IT personnel and system administrators to gather information from all computers on the network without installing any server-side programs and creates a report detailing potential problems.
  • 48
    ChronoScan Reviews

    ChronoScan

    Digital File

    €245 one-time payment
    With the many features of ChronoScan, you can virtually improve any data capture requirement. ChronoScan Enterprise is a server-client application that can process a wide variety of documents and automate your workflow. The windows service architecture provides the flexibility and power for the system administrator. The thin client interface is accessible from any web browser, from anywhere and at any time. It provides all the functionality of ChronoScan, without the need to install additional software. You can choose the email notifications you want for each Job and keep everyone informed. ChronoScan Enterprise comes with a scanner plugin. This plugin allows any client machine to scan directly into ChronoScan Enterprise using a local scanner.
  • 49
    Merces Museum Suite Reviews
    All programs and applications can be called up in the browser. There is no need to install software on workstation computers. This results in huge cost savings in IT maintenance and renewal. It also allows for high flexibility in choosing the hardware you prefer: Windows PC, Apple, or Android. Data security, backup, data security, and data protection are all centrally guaranteed. Ticketing and shop checkout systems can be used as either a tablet or stationary touchscreen computer with barcode scanners, receipt printers, cash drawers, and receipt printers. A ticket printer for color tickets, including vouchers or entry tickets, and discounts for groups and tour operators. You can also purchase against an invoice or with a card payment. Everything is fully integrated and can be used offline in case of a network outage.
  • 50
    AVG File Server Business Edition Reviews
    AVG File Server Business Edition's network antivirus scanner protects your customers and business data from malware and hackers. It eliminates the hassle and worry that you don't need. Hackers and malware can stealthily enter your business and disrupt your operations, causing disruptions that can cost you both time and money. Even worse, hackers and malware could take down your entire business. To run a successful business, your customer and business data are crucial. Our network antivirus scanner protects your files from hackers with Windows file server security. Our advanced scanning engine doesn't sleep and scans your computer only when you aren't working to ensure it doesn't get in your way. It does all the work so that you and your employees can concentrate on your business without any costly delays or distractions. Remote management allows your administrator to remotely install, update, configure, and configure AVG across all your PC devices and the entire network.