NetFlow2SQL Collector - Link Report
More Software of "Alexander Yarovy"
sMonitor - sMonitor is a server uptime monitor which will constantly monitor the online status of both local and remote servers. It provides a thorough reporting system, SMS/e-mail notifications and everything else that network administrators need.
sMonitor 4.2 Build - sMonitor is a network monitoring software that allows you to verify the network connectivity of TCP/IP hosts on the Internet and LAN.
Wake-On-LAN Listener - The program receives magic packets and can be used as a Wake-On-LAN configuration troubleshooting tool. It allows to select local network adapters and create Windows Firewall exceptions. Requires administrator rights.
Wake-On-LAN Virtual Machine - Receives Wake-On-LAN magic packets and starts up virtual machines. Supports Microsoft Hyper-V, Virtual PC, VirtualBox, VMware Server, Workstation, Player, Parallels WS. The built-in service allows to run machines without logon to host machine.
Remote Desktop Assistant - Remote Desktop Assistant manages Microsoft Remote Desktop Connections, provides connectivity monitoring and sends Wake-On-LAN magic packets. Includes Wake-On-LAN Listener, RDP port configuration tool, and Windows shutdown program.
Wake-On-LAN Sender - Wake-On-LAN Sender can be used to turn on remote computers sending magic packets (UDP). This freeware utility supports SecureOn password and allows to identify MAC addresses of LAN computers. Also, it includes Wake-On-LAN Listener.
New software of Internet, Monitoring
IP Tools for Excel - NEW - IP Tools for Excel - Add-in / Plug-in for Microsoft Excel. Instant Productivity - Instant Results in Microsoft Excel. Ping, NsLookup, Tracert Sort IPA. Subnet Calculator, IPAM management. Very Fast Results displayed the way you want.
ActiveXperts Environmental Monitor - ActiveXperts Environmental Monitor runs as a Windows service and monitors temperature, humidity, wetness, CO, CO2, power, light and more. Integrates with AVTech and many more devices. The software alerts through SMS, e-maill and SNMP traps.
Net Monitor for Employees Professional - The Net Monitor for Employees is employee monitoring software that allows you to see screens of remote computers or show your screen to employee. This activity monitoring software allows you to take full control of your employee remote computers.
BW Meter - BW Meter is a powerful bandwidth meter, monitor, traffic controller and firewall, which measures, displays and controls all traffic to/from your computer or on your network. Unlike other products, it can analyze the data packets.
FirePlotter - FirePlotter is a real-time firewall connection or session table monitor. It provides the ability to track usage of bandwidth and traffic for Cisco PIX ASA and FortiNet FortiGate firewalls.
Total Network Inventory - Total Network Inventory will scan your entire network, query all servers, workstations and appliances discovered, and record important information about every piece of equipment. A perfect inventory without leaving a chair.
GSA Auto Website Submitter - GSA Website Submitter submits your website to thousands of search engines and directories. Many special features like spin syntax for titles and descriptions or the automatic captcha code analysis helps to minimize the time it takes to advertise your website.
BlueAuditor - BlueAuditor is a program for detecting, scanning and monitoring Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices.
NBMonitor Network Bandwidth Monitor - NBMonitor tracks your Internet bandwidth (upload and downloads) usage, monitors all your Internet, it shows all the active connections you have to the Internet at any given moment and also the volume of traffic flowing through them.
Nsauditor Network Security Auditor - Nsauditor is an advanced network security scanner for auditing and monitoring network computers for possible vulnerabilities. The software checks network computers using all potential methods that a attacker might use to attack it.