This tool shows you the accesses the user or group you specify has to files, Registry keys or Windows services.
This simple yet powerful security tool shows you who has what access to directories, files and Registry keys on your systems. Use it to find holes in your permissions.
CacheSet is a program that allows you to control the Cache Manager's working set size using functions provided by NT. It's compatible with all versions of NT.
Wish you could quickly defragment your frequently used files? Use Contig to optimize individual files, or to create new files that are contiguous.
Disk2vhd simplifies the migration of physical systems into virtual machines (p2v).
Display volume disk-mappings.
This utility captures all hard disk activity or acts like a software disk activity light in your system tray.
Graphical disk sector utility.
Disk Usage (DU)
View disk usage by directory.
View information for encrypted files.
FindLinks reports the file index and any hard links (alternate file paths on the same volume) that exist for the specified file. A file's data remains allocated so long as at it has at least one file name referencing it.
Create Win2K NTFS symbolic links.
Dump the contents of the Logical Disk Manager"s on-disk database, which describes the partitioning of Windows 2000 Dynamic disks.
Schedule file rename and delete commands for the next reboot. This can be useful for cleaning stubborn or in-use malware files.
Use NTFSInfo to see detailed information about NTFS volumes, including the size and location of the Master File Table (MFT) and MFT-zone, as well as the sizes of the NTFS meta-data files.
Defragment the Windows paging file and Registry hives.
See what files are scheduled for delete or rename the next time the system boots.
Monitor file system, Registry, process, thread and DLL activity in real-time.
See what files are opened remotely.
The PsTools suite includes command-line utilities for listing the processes running on local or remote computers, running processes remotely, rebooting computers, dumping event logs, and more.
Securely overwrite your sensitive files and cleanse your free space of previously deleted files using this DoD-compliant secure delete program.
Scan file shares on your network and view their security settings to close security holes.
Dump file version information and verify that images on your system are digitally signed.
Reveal NTFS alternate streams.
Flush cached data to disk.
Set Volume ID of FAT or NTFS drives.