Здесь может быть Ваша реклама

2baksa.ws2baksa.ws
Помощь сайту | Donate
Webmoney
Webmoney WMZ: 826074280762
Webmoney WME: 804621616710
PayPal
E-mail E-mail
YooMoney
YooMoney4100117770549562
Помощь проекту
Спасибо за поддержку!
Поиск по сайту
Вход на сайт
Меню
Последние комментарии
13:00 | Trashman
17:19 | Mausberg
08:21 | iLet
22:16 | Zolushok
21:25 | Trashman
00:11 | MerolaC
19:04 | leteha
18:35 | leteha
17:49 | MerolaC
17:31 | igormath
22:28 | leteha
20:20 | Trashman
20:20 | Trashman
20:19 | Trashman
12:01 | gedevan
22:00 | Pepa112
03:19 | IKUSAGAMI
00:23 | marlon
15:42 | Pepa112
21:37 | Trashman
Заказ рeклaмы

Купите у нас
рекламу !

Your advertising could be here !


E-mail для связи:
E-mail для связи
Партнёры
Для вас работают
Правила для авторов новостей >>
admin diim (админ)
admin brodyga (админ)
admin marlon
admin leteha
admin Ledworld
admin Mansory1
admin Masarat
admin manivell17
admin Sanchezzz
admin sibius777
admin Sergv


Network SCAN soft - (AIO) by xanthux
Новость от: brodyga
Просмотров: 7335
Программное обеспечение для работы и мониторинга сети.
Скриншоты ниже...



The software for work and network monitoring.
Screenshots more low...





The software for work and network monitoring.



Network SCAN soft - *(AIO) by xanthux


Contents:

1.C.C.MAC.Address
2.ProxyPlus.v3.00
3.NETSCAN
4.IPSCAN
5.Bandwidth Monitor
6.CC Proxy
7.Real VNC
8.ShareAlarm
9.ShareWatch
10.SMAC v.20

*******************************************************************************************

1.C.C.MAC.Address
C Get MAC Address is a handy tool for finding MAC address and computer name from IP address. You can use it to find MAC address, computer name and IP address of a computer on LAN even out of your LAN range. Network administrator can use this handy tool to lookup mac address of each computer on the LAN. Can find out who change his IP or mac address for spoofing.

CCGMA is based on Microsoft Netbios technology. If you want to seach a computer's ethernet mac address, you just need to know his computer name or computer ip. That's to say, CCGMA can resolve mac address from IP or computer name. Vice versa, you can find ip address from mac address. CC Get MAC Address also can be used to Wake On LAN. You can use it wake up any computer on your LAN remotely.

* Get MAC address from IP address
* Get computer name from IP address
* Wake On LAN (WOL)
* Auto scan MAC address of referred IP range

- For networks administrator: you can download CC Get MAC Address application to monitor your networks.
WOL (Wake On LAN)

This feature is very similar as WOM (Zero Voltage Wake On Modem), but it goes through local area network. To use Wake On LAN function, you must have a network card with chipset that supports this feature, and connect a cable from LAN card to motherboard WOL connector.

The system identification information (probably IP address) is stored on network card and because there is a lot of traffic on the Ethernet. Note that, at least 600mA ATX standby current is required to support the LAN card for this function.


2.Proxy+ 3.00


Basic features
Supported services
Additional features
Configuration
Hardware and software requirements
Free version
Running as service in Windows NT
License agreement
Installation
Contacts


: Basic features


Proxy+ gives the complete solution of access to Internet from LANs. If computer
with Proxy+ is correctly set, Proxy+ separate local LAN from Internet with high
safety.

: Supported services:


* HTTP proxy
* HTTPS proxy
* FTP proxy
* FTP gateway
* Gopher proxy
* Telnet gateway
* SOCKS4 and SOCKS5
* Real Audio Proxy
* ICP Server/ICP client
* DNS Forwarder
* POP3/SMTP mail server
* Mapped links

By using mapped links access to NNTP servers (NEWS) can be realized and so on.



: Additional features:


* disc cache
- support of HTTP 1.1 protocol
- validity of HTTP object is verified by asking the originating WWW server
(if the object is not fresh enough)
- setting of default time-to-live of non-HTTP object in cache
with possibility of exclusion of specified URL from caching
with possibility to set non-standard time-to-live
- wide range of settings
- disc file based cache index accelerates cache reloading when Proxy+ starts
* HTTP, HTTPS, FTP Proxy and Gopher Proxy protocol cascading
(access by using parent proxies)
- ICP protocol support (client and server)
* dialing on switched telephone line
- automatic dialing on demand
- automatic hang-up after defined period of user inactivity
- automatic dialing for messages
- leased line support
- support of multiple series of ISP's lines (alternative phone numbers)
* managing of users
- groups of users allowed
- custom local e-mail addresses allowed
* mail subsystem allows/supports:
- automatic sending and receiving of messages with capability to
restrict intervals of automatic activity during week
process messages periodically
process messages in shorter interval when connection is established
process messages in defined time
send messages if there is a defined number of mesages ready to send
send messages if there is a message which is older than a limit in outgoing queue
define actions when Proxy+ can't connect to mail server in Internet
sorting of messages by defined sorting rules
sorting of local messages
POP3 Downloader with many features (leave messages on remote server,
POP3 Restrictions,,,)
- SMTP mail server with ETRN support. It works fine behind switched
phone lines.
- mailer masquerade
- local domains used for intranet
- SMTP authentication (on send and receive)
* security
- automatic detection of insecure interfaces
- access to Proxy+ services from defined interfaces
- access to Proxy+ services for defined users
- all security violations are logged
- restricted access to Proxy+ configuration
- Access List feature
* configurations
- all settings are provided by WWW browser
- user customizable error messages
* ability to run as service on Windows NT or on Windows 95/98
* other features
- State Board which displays status information
- Browser Info which shows up information about your browser
- utilities Ping and Traceroute built into WWW Admin interface
- regular expression support (regular expression debugging utility included)
- WWW server for small intranet
- custom error messages for HTTPProxy and WWW server service
- custom AccessLog.txt logfile format


3.NETSCAN
SoftPerfect Network Scanner is a free multi-threaded IP, NetBIOS and SNMP scanner with a modern interface and several advanced features. It is intended for both system administrators and general users who are interested in computer security. The program pings computers, scans for listening TCP ports and displays which types of resources are shared on the network (including system and hidden).

In addition, it allows you to mount shared folders as network drives, browse them using Windows Explorer, filter the results list and more. SoftPerfect Network Scanner can also check for a user-defined port and report back if one is open. It can also resolve host names and auto-detect your local and external IP range. It supports remote shutdown and Wake-On-LAN.
Key features

* Pings computers.
* Does not require administrative privileges.
* Detects hardware (MAC) addresses even across routers.
* Detects hidden shared folders (normally invisible on the network) and write accessible shares.
* Detects your internal and external IP addresses.
* Scans for listening TCP ports and SNMP services.
* Retrieves currently logged-on users.
* You can mount and explore network resources.
* Can launch external third party applications.
* Exports results to HTML, XML, CSV and TXT
* Supports Wake-On-LAN and remote shutdown.
* It is absolutely free, requires no installation, and does not contain any adware/spyware/malware.



4.IPSCAN
Angry IP scanner is a very fast IP scanner and port scanner. It can scan IP addresses in any range as well as any their ports. Its binary file size is very small compared to other IP or port scanners. Angry IP scanner simply pings each IP address to check if it's alive, then optionally it is resolving its hostname, determines the MAC address, scans ports, etc. The amount of gathered data about each host can be extended with the available plugins.

It also has additional features, like NetBIOS information (computer name, workgroup name, and currently logged in Windows user), favorite IP address ranges, customizable openers, etc.

Scanning results can be saved to CSV, TXT, HTML, XML or IP-Port list file, can be used as a command-line utility in a batch file, etc. With help of plugins, Angry IP Scanner can gather any information about scanned IPs. Anybody who can write code is able to write plugins and extend functionality of Angry IP Scanner.

In order to increase scanning speed, it uses multithreaded approach: a separate threads is created for each scanned IP address.


5.Bandwidth Monitor
Do you ever wonder how much bandwidth you are using?
How fast you are downloading or uploading?
Or if you're closing in on your monthly transfer limit?

If so Bandwidth Monitor Pro is the utility for you!



Detailed logging
Supports logging of all your network adapters at once with separate statistics for each adapter.
You can go back and check your daily, weekly, monthly, yearly or total transfer.

Always control
With the small transfer graph placed in the system tray you always have control of your bandwidth usage.

Highly customizable
Bandwidth Monitor Pro can be customized to display the information you want.
You can also change the graph type and colors.

Advanced alert system
You can set up rules with various actions and conditions.
Lets say that you have a monthly transfer limit of 30GB.
You can then set up Bandwidth Monitor Pro to alert you when your approaching that limit.


6.CC Proxy

It's a web proxy software and it enables you to browse web pages, download files, send and receive e-mail.
*

It's a web cache proxy and web caching expedites the speed of surfing the net.
*

The proxy user control provides powerful management functions including seven ways to control the Internet access on the LAN. They are IP address, IP range, MAC address, User Name/Password, IP + User Name/Password, MAC + User Name/Password and IP + MAC.
*

It's a time schedule proxy software and the time schedule can freely control the users' on-line time.
*

It can allocate client surfing service respectively. This gives you an authority to open the different proxy services to the different users. Some of them may browse the web pages or send and receive e-mails and others may enjoy all the Internet surfing functions.
*

It can allocate proxy client bandwidth respectively. The bandwidth control can allocate the different bandwidth to the different users. Thus, it can control the speed of net surfing and occupation of the bandwidth resource of each user and avoid the traffic jam of net, which is caused by some users who try to download files.
*

Web filter can ban the undesirable sites with unhealthy and irrelevant contents. This proxy software will help you keep the employees concentrate on their work or children stay away from the bad sites.
*

Access Logging can keep a full set of the Internet access log.
*

It's a SOCKS Proxy and allows you to use ICQ, MSN Messenger, Yahoo Messenger, CuteFTP and NEC Sockscap.

CCProxy is especially suitable for the small to medium sized businesses. Its affordable cost, powerful functions, and easy to use nature plus our prompt technical support make it absolutely different from other Internet sharing software.

Top
CCProxy Main features


* Modem, Cable Modem, ISDN, ADSL, Satellite, DDN and so on are supported(more).
* HTTP, FTP, Gopher, SOCKS4/5, Telnet, Secure (HTTPS), News (NNTP), RTSP and MMS proxy are supported.
* Port Mapping is supported.
* Web cache can enhance browsing speed. The size and refresh time of cache can be freely changed.
* Bandwidth control flexibly manages the traffic condition of clients.
* Time schedule can freely control the clients' on-line time(access time control).
* Web filter can ban the specified web sites or contents. Also can name specific web sites for browsing.
* URL filtering prevents users from downloading files with designated extended name via IE.
* Seven types of account authentication: IP address, IP range, MAC address, User Name/Password, IP + User Name/Password, MAC + User Name/Password and IP + MAC.
* Parent proxy function enables CCProxy to access the Internet via another proxy.
* Dial-On-Demand, remote dial up and auto disconnect are supported.
* Access Logging can keep a full set of the Internet access log.
* Enable IE, Netscape to access the Internet through HTTP/Secure/FTP (Web)/Gopher.
* SOCKS5 proxy support allows use of ICQ, MSN Messenger, Yahoo Messenger, CuteFTP, CuteFTP Pro and WS-FTP.
* Mail proxy supports Outlook, Eudora etc.
* Supports NetTerm accessing the Internet via Telnet proxy.
* Supports Outlook connecting to the News server via News proxy.
* Support SOCKS5 and web authentication.
* Support for Real Player RTSP proxy and Media Player MMS proxy.
* Built-in DNS can resolve domain names.
* Win98/WinMe/WinNT/Win2000/WinXP/Win2003 compatible.
* Flow Stats.


7.RealVNC
VNC stands for Virtual Network Computing. It is remote control software which allows you to view and fully interact with one computer desktop (the "VNC server") using a simple program (the "VNC viewer") on another computer desktop anywhere on the Internet. The two computers don't even have to be the same type, so for example you can use VNC to view a Windows Vista desktop at the office on a Linux or Mac computer at home. For ultimate simplicity, there is even a Java viewer, so that any desktop can be controlled remotely from within a browser without having to install software.

VNC is in widespread active use by millions throughout industry, academia and privately. There are several versions to choose from, including a free version and some substantially enhanced commercial versions.


8.ShareAlarm
ShareAlarm is a network tool that allows network administrators and users easily perform network shares monitoring. Using ShareAlarmPro you can monitor users attempting to access secured shares and confidential files, detect and log network access to shared folders, monitor security events, monitor accessed files, disconnect users from open files or deny network users access, monitor sharing permission changes. ShareAlarmPro includes intrusion detection system based on security events log analyzer. Security Event Log Monitor monitors the security event logs of Windows NT/2000/XP servers or workstations and notifies user on selected events detection. This software also provide you ability to manage and monitor all shares on your workstation, disable or enable default administrative shares, hide your workstation in network, view how many users are currently connected to each shared resource on your workstation. ShareAlarmPro also allows you to easily browse your LAN and view all shared resources no meter they are hidden or not and connections to shared resources on remote workstations. The program has firewall system that allows you to block any unwanted connection to your shared resources. ShareAlarmPro also monitors your shares permissions and alerts if “Everyone”, “Domain Users” or other selected broad access group is added to the permissions of a share. With ShareAlarmPro you can monitor files or folders creation, deletion or any attribute change in your shares. Using ShareAlarmPro you can collect all alarms in a central place so several shares on multiple servers can be monitored from a single location. Program keeps log for all detected events (access to shared folders, security events, folder watcher events) in HTML format.


9.ShareWatch
ShareWatch allows you to see who is connected to a computer and what files they are accessing. Have you ever wondered why your hard drive or modem is active, but you aren't doing anything to cause it to be active? It is possible a remote user is accessing your computer. Have you ever had a file locked but you don't know why? ShareWatch can tell you if a network user is using the file and allows you to disconnect them so that you can edit/delete the file. Have you ever wanted to shutdown a computer, but don't want to disconnect people using the computer. ShareWatch will show you all resources in use and by what users.


10.SMAC v.20
SMAC is a powerful, yet an easy-to-use and intuitive Windows MAC Address Modifying Utility (MAC Address spoofing) which allows users to change MAC address for almost any Network Interface Cards (NIC) on the Windows VISTA, XP, 2003, and 2000 systems, regardless of whether the manufacturers allow this option or not.

SMAC does not change the hardware burned-in MAC addresses. SMAC changes the "software based" MAC addresses, and the new MAC addresses you change will sustain from reboots.

SMAC helps people to protect their privacy by hiding their real MAC Addresses in the widely available wifi Wireless Network. SMAC also helps Network and IT Security professionals to troubleshoot network problems, test Intrusion Detection / Prevention Systems (IDS/IPS,) test Incident Response plans, build high-availability solutions, recover (MAC Address based) software licenses, and etc...

SMAC is the first Windows MAC Address Modifying Utility (since 2002), and it is developed base on the extensive research of KLC Consulting, Inc. SMAC is continuous updated with the latest trend in the networking and security, as well as valuable customers' wishes and feedbacks.

SMAC is created and maintained by Certified Information Systems Security Professionals (CISSP), Certified Information Systems Auditors (CISA), and Microsoft Certified Systems Engineers (MCSE), and professional software engineers. With combined efforts, SMAC is well designed to be an user-friendly tool for both the technical and non-technical users.






66.9 MB


Страница загрузки/Page of Loading


Rar pass: www.2baksa.net

Чтобы Скачать с Rapidshare !
Кликаем по ссылке, далее еще раз внизу страницы на кнопу "Free", переходим на страницу с картинкой на которой отображены символы.
Вводим эти символы в поле и кликаем "Download".


Credits to xanthux and yashar!

Screenshots:
http://photoupload.romaniainedit.org/images/1701361.jpg
http://photoupload.romaniainedit.org/images/7585913.jpg

Уважаемые пользователи nowa.cc и 2baksa.ws. У нас сложилось тяжёлое финансовое положение. Мы работаем для вас вот уже более 15 лет и сейчас вынуждены просить о помощи. Окажите посильную поддержку проектам. Мы очень надеемся на вас. Реквизиты для переводов ниже.
Webmoney Webmoney WMZ: 826074280762 Webmoney WME: 804621616710
PayPal PayPal_Email E-mail для связи по вопросу помощи
Кошелек для вашей помощи YooMoney 4100117770549562
YooMoney Спасибо за поддержку!

Раздел: Наборы AIO | 16.07.07 | 11:18

Внимание! Всегда проверяйте анти-вирусом файлы, полученные по ссылкам в комментариях!
Attention! Always check files you download from links in comments with your anti-virus software!
charonx 16.07.07 | 11:28:38

BravoLink
http://bravoshare.net/d.php...
hoalantim 16.07.07 | 11:30:51

Mirror: http://www.megaupload.com/?...
zillion 16.07.07 | 11:39:55

Mirror: http://depositfiles.com/fil...
Для добавления комментариев необходимо зарегистрироваться на сайте
Здесь может быть Ваша реклама
Здесь может быть Ваша реклама
Design by DolpHin | Disclaimer
Реклама | E-mail для связи: E-mail для связи | Skype: diim_diim | ICQ: 400632