NetRCM functions: acquiring detailed information about a remote computer, management of access to USB Flash drives, console connection to a remote computer, process management, file transfer, messaging to a remote computer, remote shutdown, ping, traceroute. All these functions are also available in batch processing. For example, you can upload files to several computers in one click and then launch them.
When the Wi-Fi Scanner begins to run, you will immediately see all wireless networks located nearby and its signal level. You can work out the optimal position for their access point at home, so that the signal is accessible throughout their home.
RemShutdown allows remotely shutdown or restart network computers. You can specify a delay during which a message you specify can be displayed and applications running on the remote computer at the time of shutdown can be allowed to close. In addition, RemShutdown offers the user the option to cancel the shutdown. The tool is designed with a user-friendly interface and is easy to use.
TechString is a free software utility that you can download to perform simple networking tasks such as multi-pinging, website monitoring, network scanning, proxy scraping and testing, plus much more Ė all from just one application! The software is free to download and will run on most Windows machines.
Share your USB device without risk of losing it! Access remote instruments without leaving your chair! USB is the standard interface used by most modern computer devices today. But, USB was designed to connect electronic peripherals only to a single computer. USB Over Network is a revolutionary software solution that allows you to use remote USB devices as if they were plugged into your own PC.
MOAT detects rogue hardware on the Enterprise LAN. Rogue laptops, Employee home laptops, and Wireless Hijackers will all be detected by MOAT. Employees or contractors plugging in laptops or tablets without permission can be detected and stopped. MOAT is ideal for internal security, logging, and auditing. Also, now that WPA2 routers can be cracked, MOAT is the sure way to know that only approved devices are on your Wireless network.
Remote Access Control is a utility to remotely control client's computers via the Internet or Lan. This program is one of few that can Reboot the remote computer and still connect back to itself without any user-interaction (via an in-build time-delay function). RAC was made with the "Technician" in mind that has to do repairs or virus removal of remote PC's.
Daihinia is a tool for WiFi. It turns a simple Ad-Hoc network into a Multi-hop Ad-Hoc network. Multi-hop Ad-Hoc networks offer a higher level of flexibility than the usual Infrastructure Mode: in Infrastructure Mode all the computers have to be in the range of the Access Point, while in Multi-hop Ad-Hoc networks they have to be within one another's range, possibly forming chains longer than one hop.
Sound over RDP is a sound virtualization tool which was built specifically to share sound devices from the local machine to the remote computer. Many applications use sound for various forms of feedback such as softphones, Skype, NetMeeting, AIM, ICQ and many others. Sound over RDP extends standard RDP functionality and delivers full high-resolution low-latency remote audio playback.
NetPeeker is a network monitor and control tool for personal Internet user. Priority and quota based speed limitor for each application or connection, guarantee bandwidth for critical applications. A flexible personal firewall which can setup rules based on DNS name and URL. A network capture. It can abort/block connections and trace back who is the guy. System guard to prevent malware running by monitor registry changes and execution.
"Internet Quota Control" monitor and controls the monthly Internet bandwidth usage for the machine and each user. If the user reaches his assigned quota, his Internet access will be blocked. If your ISP put limit on your monthly Internet usage, this tool can help you find out how much bandwidth each user used. This tool can also help limit kids' Internet access.
OsMonitor monitoring software was designed for LAN monitoring and employee monitoring. You can find every detail about your employees' PC and Internet usage on server. It also block ICQ, Disable USB, disable games and only allow specified applications running. Include ICQ monitor, MSN Monitor, Email Monitoring, web site Monitoring, Screen Capturing, Applications monitoring, Blocking games, Block Download and Install.
Many of us keep personal/work information in our PCís, information that is meant strictly for our eyes only. However, being online also allows a possibility that a malicious software can cross over to some deep corner of your PC and can start sending confidential information to someone, without you even knowing. This is where SterJo NetStalker comes to the rescue.
SterJo NetStalker works on both 32-bit and 64-bit editions of Windows XP, Windows Vista, Windows 7 and Windows 8. It provides you internet protection as well as network security, windows security and computer protection. Itís a free network monitoring software for Windows which you can use in order to monitor incoming and outgoing network connections on your PC. It is very easy to use and it offers a lot of interesting features. Itís portable, so you can put it on your USB drive and carry it. Upon launch, the application automatically scans all currently running processes, and list them under the Activity tab, along with relevant information suc ...
After start, a small icon near the clock is shown. The tooltip of this icon shows the username, computername and workgroup/domain. Further, for every network adapter, every ip, gateway and dns server address.
sMonitor is a server uptime monitor which will constantly monitor the online status of both local and remote servers over the TCP/IP protocol. It provides a thorough reporting system including the ability to save files in plain text and HTML formats and upload them automatically to a remote FTP server. It also offers SMS/e-mail notifications and everything else that network administrators need.
SerialSniffer is a tool to visualize data, which are exchanged over the serial ports (i.e. RS232 or RS422). SerialSniffer gives you the possibility to have a deep view inside the data. You also can determine which data comes from which port, log it, record it for later playback or transmit via network. FAQ: http://www.serialsniffer.com/en/pdf/SerialSniffer_FAQ_English.pdf
Monitor open TCP and UDP ports and connections on your PC. With the help of this system utility you can view the list of open ports, process IDs that open these ports, local and remote IP addresses and connection state. This software maps open ports to the applications that own them, helping you easily detect trojans, spyware or malware. You may even instantly close open unwanted connection or export the list of open ports into a text file.
LAN Tornado agent is the very useful, easy-to-use and low cost network testing software. LAN Tornado is a tool for measure Ethernet based networks metrics. LAN Tornado agent is very applicable software for testing switches, routers, servers and other network devices.LAN Tornado Agent receive network traffic generated by LAN Tornado and calculate network statistic and IP performance metric (IPPM).
Free Port Scanner is a small, fast, easy-to-use and robust port scanner for the Win32 platform.You can scan ports on fast machines in a few seconds and can perform scan on predefined port ranges. This tool uses TCP packets to determine available hosts and open ports, service associated with port and other important characteristics. The tool is designed with a user-friendly interface and is easy to use.
LAN Tornado agent is the very useful, easy-to-use and low cost network testing software. LAN Tornado is a tool for measure Ethernet based networks metrics. LAN Tornado agent is very applicable software for testing switches, routers, servers and other network devices. LAN Tornado Agent receive network traffic generated by LAN Tornado and calculate network statistic and IP performance metric (IPPM).
Count all traffic (Ethernet and IP packet headers)
10/100 Mb and 1Gb IEEE 802.3 Ethernet network support
IP and UDP packets support
Calculates received packets, lost packets and percentage of lost packets
Evaluates IPPM such as Jitter and IPDV
Wifi hotspot will turn your wifi enabled Windows 7 laptop or PC into a virtual router that will let other wireless devices such as, laptops, smartphones, PDAs, tablet-pcs, Ipads, PS3 etc connect to your PC and use its internet connection. Can also be used to extend the range of an existing wifi network. The wireless networks created with WifiSpot uses WPA2 Encryption, to ensure the best security possible.Wirelessly share any Internet connection even another Wi-Fi network. WifiSpot can be set to try and auto recover and restart if there is a network fault.
LanDetective Internet Monitor is one of the leading solutions for monitoring traffic sent over a network including data sent via high-level protocols. All data from TCP/IP sessions is recorded, including emails and chat messages sent and received and Web content viewed. The data is then reconstructed and stored in its original format on your computer. No additional software needs to be installed on the other networked computers.
The Network Administrator is a set of handheld databases supporting the work of a computer network administrator.
Through Network Administrator:
1.Quickly create a database of computer hardware and peripherals
2.Quickly find your computer when IP number and by name
3.Quickly create a database of licenses
4.It is easy to assign licenses to computers
5.It is easy to check license status used, you will find free and missing licenses
Verax SNMP agent simulator is a tool that can simulate multiple SNMPv1/v2c agents on a single host on standard 161 port through multi-netting. It allows IT personnel to build virtual, simulated networks of devices without purchasing any additional hardware, for instance for testing purposes. Individual simulated agent responses can be initially retrieved from existing devices and modified at runtime by user defined rules.