Network Ferret Personal

Network Ferret is built to peer into networks. Rather than focusing on complex user tweaks we focus on solid detection, connection and control of network devices keeping the under the hood details under the hood. This allows you to focus...


IP and MAC Logger

A compact application that allows you to scan your network for the IP and MAC addresses. The program is designed to scan the network at fixed time intervals and to store the results in a text file. You can specify...


Stare Proxy Checker

We're all connected in our enterprise to advance software which improves people's lives. Every day we do work that matters. Stare proxy checker v1.36. Looking for a free and powerful solution for checking the lists of proxy servers? Congratulation -...


DEKSI Network Administrator

An advanced, powerful, and feature rich network mapping, monitoring, management, and administration software solution. DEKSI Network Administrator generates a network map, which speeds up accessing to remote hosts' properties and resources. Scan your network, find hosts, place them on a...


WinLock Tiny Client

WinLock Tiny Client is a free companion to WinLock Remote Administrator. Using Tiny Client together with Remote Administrator, you can: restart or shutdown the workstation, run executables on remote computer, take the screenshot of client's desktop. WinLock Tiny Client is...


Net Orbit

The administrator like IT managers can perform employee network monitoring, LIVE monitoring, view logged activity and control users computer right from your desktop. Under the LIVE monitoring features, it lets you view live screen of every employee or student, zoom...


ICU Child Monitoring Software

ICU is a very simple to use child monitoring application, it's all about providing you with an Insight into your Children's Unaccompanied activity. ICU gives you the power to see what your children have been looking at. You select which...


PingGraph

PingGraph helps find and diagnose network problems by graphing ping times and and estimated bandwidth available on multiple connections. Email alerts inform you of networking trouble. Data is saved in an easy-to-use XML format. Graphs are configurable to show a...


Antamedia HotSpot Software

HotSpot Software is a software for WiFi billing, which helps you control and bill your customers for the Internet usage. The software is suitable for all purposes where customers should be redirected to the login page to sign in or...


Advanced Host Monitor

HostMonitor is an award-winning network monitoring software that continuously monitors servers availability and performance. It can monitor any TCP service, ping a host, retrieve an URL, check the available disk space, check integrity of your files and web site, test...


NBMonitor Network Bandwidth Monitor

NBMonitor tracks your internet bandwidth (upload and downloads) usage, monitors all your Internet, it shows all the active connections you have to the Internet at any given moment and also the volume of traffic flowing through them. NBMonitor displays real-time...


Network Monitor II

The Network Monitor II (wired and wireless) will show your SSID, signal quality, Internal IP address, External IP address with your country flag when you are connected to the internet, network utilization, upload speed, download speed and total (both current...


Change MAC Address by LizardSystems

A powerful and simple tool for changing the MAC address of a network adapter. You can spoof the MAC address, set the MAC address of another manufacturer or generate a random MAC address in just several mouse clicks. Your changes...


LAN Audio Monitor

LAN audio monitoring software that monitors the sound which is played on remote computer in real time. Also you can set it monitors the sound around the remote microphone. It widely used for: 1. Often an alarm system was installed...


SecureVue STIG Profiler

The SecureVue STIG Profiler is a free tool that automatically identifies IT assets and determines which DISA STIGs apply, based upon attributes like installed software. Auditing device configurations against a secure standard like the DISA STIGs is a critical defense...