pt360 Tool Suite provides network monitoring and diagnostic tools from a single intuitive interface. Key features are device discovery and inventory, Cisco Configurator, Switch Port Mapper, NetFlow Listener, TFTP server, SNMP, WMI, Port Scan, DNS Audit, Trace Route, Syslog Server, application monitoring, Ping and supports open source tools (i.e. Nagios, MRTG, Cacti), SaaS (Salesforce.com), virtual servers
The program for remote computer management on Windows platform. Does not require any additional software installation on client computers. Allows to connect to remote computer with specified credentials and manage processes, services, users, groups, event logs, shared resources, printers, obtain system and hardware information, rename computer and change its domain/workgroup membership, reboot and shutdown.
Netflow Generator creates artificial NetFlow Version 5 data streams without the need for NetFlow compatible hardware. It is the perfect tool for testing the NetFlow functionality of PRTG or other NetFlow compatible programs. NetFlow Generator sends NetFlow 5 Packets to a specific target computer which processes the data. While the simulator is active it will create NetFlow packets which contain information about the selected traffic pattern.
Free HTTP and HTTPS (SSL sniffer) sniffer for Internet Explorer 6.0/7.0 and WinINET applications that allows you to sniff all traffic and see decrypted SSL traffic without using a proxy or alerting the browser. The sniffer is using Komodia's "SSL hijacker" which is an SDK for sniffing, intercepting and modiying SSL based traffic.
There are many programs that relentlessly try to breach into your computer from the Internet. The surveys show that a new computer can be infected in less than half hour with spyware and trojan horses. Another increasingly alarming trend is the number of non-malicious programs that send information about you and your online habits to their authors without any consent from you.
Mil Firewall blocks all attempts to exploit a security problem in the programs that are running on your PC. Mil Firewall will also protect your computer from infection with many viruses, trojan horses and spyware programs. It will also block any attempts of legitimate or spyware program to send your private information over the internet or to download ads and other content to show in pop-up windows.
You can use specific network access rules for each program or use global rules for all programs. There are predefined rules for most frequently used programs but you can change them. All network access can be temporarily disabled with ...
Path Analyzer Pro delivers advanced network route-tracing with performance tests, DNS, whois, and network resolution to investigate network issues. By integrating all these powerful features into one simple graphical interface, Path Analyzer Pro has become a must-have tool for any network, systems, or security professional on Windows and Mac OS X.
USB drive monitoring software is a surveillance tool to monitor multiple USB device activities in real time working in any windows platforms. USB mass media surveillance application support all USB storage media like pen drive, thumb drive, USB MP3 / MP4 player, memory stick, smart media, USB flash camera and other similar device with all type and capacity of memory card. Software facilitate administrator to change access permission (read or write) or block USB port of any client machine within local area network even LAN is not established or any breakdown occurs. USB drive analyzer software provide sound alert notification from either CPU or selected tune when USB plug in and generate log file of connected USB information such as hardware ID, storage capacity and manufactures name with complete client machine details like machine name, IP address and connection or removable date, time of USB drive. Analyzer application prevents unauthorized copying of your confidential data on USB sticks/drives. Software is ...
Diary Manage: You can record your daily diary with many individuation forms which based on the date,the schedule,etc.At the same time,you can also edit them to modify or add content.
Set Alarm: Set any kind of alarm to do the designed intend, such as, running the appointed application, shutting down the computer.These actions can be repeatable with a reiteration of many kinds.
System Tools: Efficiently get many important windows tasks together to economize time by the way of integrating them together.You can change Display Mode, Empting Recycle Bin,Set Screen Save,Printer and Fax, and so on. Mange your PC conveniently.
Setting Shortcut Key: Establish a Shortcut Key to reveal or hide the application procedure which assigns. Moreover, by "left-clicking" and "right-clicking" your mouse at the same time, it can hide the Desktop or the task bar, and restore it with the same action.
Make many unit conversions by Metrology tool.
IP Snooper application was designed to be an efficient tool that will help you monitor your network traffic. WinPCAP based.
IP Snooper main features:
Monitors network traffic
Provides per-application or per-protocol statistics
Saves daily reports to .CSV files
Exports statistics to a .HTML or .CSVfile