|License:||Free to try|
|Op. System:||Windows Vista/2003/XP/2000|
|File size:||3.33 MB|
|Publisher:||IT Systems Ltd|
Publisher description for ShareRight Documentary
ShareRight Documentary provides detailed Analysis of all files and shares and their associated security, together with discovery and quick launch of each shared folder, documents and VNC viewer. ShareRight Documentary provides indexing of all files contained within shared Folders, with powerful searching technology to quickly locate documents based on any parameter (file name, type, contents etc...) and can handle tens of millions of documents. ShareRight Documentary is a network administration tool providing detailed analysis of all files and shares on the network and their associated NTFS permissions, together with discovery and quick launch of each shared folder, documents and VNC viewer. In addition, notes may be recorded for each machine for support and maintenance purposes. ShareRight Documentary provides indexing of all files contained within shared folders, with powerful searching technology to quickly locate documents based on any parameter (file name, type, contents etc...). ShareRight Documentary can handle tens of millions of documents. When run by a Domain Administrator, ShareRight's Network Scanner builds a database containing all known shares, both administrative ($ shares) and network shares and their NTFS permissions. Once complete, the application and database may be used to produce reports of sharing by any user. Unlike tools intended for live use, the data is retained after machines are switched off and a complete picture of your network's shares and VNC servers is instantly available. Once shared folders have been discovered or manually specified (as is necessary in the case of Novell, Linux, NAS or SAN shares where auto discovery is not possible), folders may be specified for document scanning on the next scanner run. A Default VNC password may be set or individually configured for each remote machine, giving convenient One Click access to a remote desktop, using heavily encrypted and hidden password storage.