Her gün sizlere, piyasa değeri onlarca dolar olan bir programı tamamen ücretsiz olarak sunuyoruz!
DiskPulse Pro 9.3.16 giveaway olarak 19 Şubat 2017 tarihinde sunulmuştu
DiskPulse is a real-time disk change monitoring solution allowing one to monitor one or more disks or directories, save reports and disk change monitoring statistics, export detected changes to a centralized SQL database, execute custom commands and send E-Mail notifications when unauthorized changes are detected in critical system files.
VIDEO TUTORIAL
Windows 2000/ XP/ Vista/ 7/ 8/ 8.1/ 10; Windows Server 2003-2012 R2; 500 MHz or better CPU; 256 MB of system memory; 25 MB of free disk space
10.6 MB
$25.00
SysGauge is a free system and performance monitoring utility allowing one to monitor the CPU usage, memory usage, network transfer rate, operating system performance, the status and resource usage of running processes, file system performance, USB performance, disk read activity, disk write activity, disk read transfer rate, disk write transfer rate, disk read IOPS and disk write IOPS for individual logical disks or all physical disks installed in the computer.
DiskPulse Pro 9.3.16 üzerine yorumlar
Please add a comment explaining the reason behind your vote.
We had diskpulse installed few months ago and removed it the next day, reason:
It created huge useless files and info that jammed our SQL server and the email server.
It happen when windows was doing updates overnight and created d-base files of all of the changes including the 0 bytes files and just the regular replacement of old files.
There were tens of thousands of files mark with red dots and marked for deletion and every single file was sent to our mail server as separate notice.
It took out IT department all day to re-load from archives to restore our SQL d-base and server.
Recording everything can be good but comes with a price to be paid down the road. It slowed the server and created useless file access record that can be detrimental to everyday use of a computer system.
Save | Cancel
For those that have persitent problems with the giveaway wrapper and issues with the giveaway being an old version of the product and not the current version 9.4.26 you can download the Pro trial and register that with the license key provided in the readme.txt in the giveaway zip bundle. I put "GOTD" in the top field in the registration applet but I suspect you can put in anything you like.
Note I experienced a smartscreen warning on the files downloaded from their site, that I chose to ignore, that the files were not commonly downloaded and they were not digitally signed.
https://www.virustotal.com/en-gb/file/50e36dd628ab60042575a6a7c26697f32b52316402c18479d28f927c6c5d4887/analysis/1487508299/
all engines report clean.
Hope that helps.
Save | Cancel
It also tells lies... it calls updates to the NTFS last accessed time record "Modified" that is wrong the file was not modified just it's meta-data was touched with current date and time... the files last modified date is not changed because the file IS unmodified.
Save | Cancel
TK, more lies... in the "Charts" in default configuration it displays Number of changes per extension... for MDB extensions it reports "52 Files" ... THAT IS WRONG it was 52 changes on ONE MDB file! The only MDB file being accessed is:
19-Feb-2017 13:33:57 Modified 677.92 MB Username C:\ProgramData\Privacyware\Privatefirewall\pflog7.mdb
too much inacurate information from this program and not enough relevant information makes it into a novelty item, not a serious diagnostic tool for me. I am glad this does not install itself as a service or I'd be forced to uninstall it...
Save | Cancel
In my opinion there is a major omission in the reporting of change events... it does not show the PID or process name that invoked the change event! For me that is critical information, as critical or more critical than NTAUTHORITY class that this calls "Owner". e.g. on non-rootkit malware it would show the malware executable, on root-kit malware the lack of process name on the change, because the kernel is concealing the file, would signal a root-kit and warrant in depth investigation.
Save | Cancel