TAG: br>, network, capture, li>, packets, software, activity, ,  < br>, br> <, b> <, < b>, network spy, u> <, < li>, < u>,
Best Search Category: website design, DVD Cutter, DVD Rip, Easy CD, Convert PDF, Shop Pro, Smart Movie, Recovery, Messenger, Mobile Phone, supernova, music store, dvd video capture, dvd video record, vhs video conversion
Network Spy

License / Price:
Shareware / 49.95 $
Category :
Internet / Miscellaneous
Requirements :
Publisher / Limitations:
Network Spy /
Size / Last Updated:
506KB / 2008-02-13
TAG: br>, network, capture, li>, packets, software, activity, ,
lt brgt, brgt lt, bgt lt, lt bgt, network spy, ugt lt, lt ligt, lt ugt,
Operating System:
Win95,  Win98,  WinME,  WinNT 4.x,  WinXP,  Windows2000
Download:
Download
Publisher's description - Network Spy
Rate
 
 
 
 
 
12 Ratings  
  Network Spy is a general purpose diagnostic tool for administrators,

programmers and students of network technologies. It can operate in

different modes depending on the application. Some of the more typical

applications of this tool include: <Br>

<blockquote>

<ol>

<li>Packet capture and decode

<li>Network Statistics gathering

<li>Software debugging

<li>Intrusion Detection and activity monitoring

</ol>

</blockquote>

<b><u>Packet Capture and Decode</u></b><br><br>

In this mode, Network Spy can be used to get a snapshot of data from an

ethernet network. It is capable of decoding the most widely used IP

protocols such as UCP, TCP and ICMP. It also allows you to save this data

for later analysis. The decoded packets are displayed in human readable

form.<br><Br>

<b><u>Network Statistics gathering</u></b><br><br>

In this mode, the amount of data attributed to a certain activity can be

captured. For instance, if you want to monitor how much data is

transferred between user x and excite.com, you can specify a rule to keep

a track of amount of this data. Another example is keeping track of how

much FTP data flows on your network.<br><br>

<b><u>Software Debugging</u></b><br><br>

People programming network software and web applications will find this

tool extremely useful. It can be used to debug application to find errors

in code, compute bandwidth utilization and find bottlenecks. <br><br>

<b><u>Intrusion Detection and Activity Monitoring</u></b><br><br>

Using the new rules-based filtering mechanism, one can capture packets of

interest, avoiding a huge capture of all packets on the network. A rule

specifies a pattern to match. For instance, one could specify to capture

all ICMP packets where TTL=1. This would be true when someone is

performing a traceroute.

Network Spy also includes various other tools such as DNS Lookup, Ping, TraceRoute and Whois to aid in everyday tasks.
 
 

Also see ...


...in Internet

1)    Browser Resizer 1.0Browsing Tools by Christopher Burke - Software Free Download
 Allows you to resize a browser (or any window) to specific sizes (e.g. 640x480) to assist in developing web pages for specific resolutions. Allows selection of which browser window to resize, optional taskbar correction and two way feedback (browser...

2)    TCPtoSer 1.2.4Dial-up & Connectivity by Carsten Gottbehuet - Software Free Download
 Waits for a TCP connection on a port specified by you, for example, the Telnet port 23. Or, it connects to any port of a host. After that, any data from that connection is forwarded to the serial port and vice versa. If the data can.t be sent to the serial port immediately, it is buffered dynamically by...

...in Miscellaneous

1)    Submit King 1.30Miscellaneous by Kevin C Martin - Software Free Download
 search engine submission to google, alta vista, excite, hotbot and others - easy and simple. You can have Ultimate control. The SubmitKing free trail submission software gives you the power. Easy to use, incredible results. Breakthrough the internet tangle and get to the top now. Yes Sex Sites Are Not The Only Ones That Can Pull In $5000 A Week Using The Power of...

2)    WebSnap 1.5Miscellaneous by N-Networks - Software Free Download
 WebSnap downloads all the requested contents (including graphics), following the Web-links. As a result, a number of mutually related files (.HTML, .GIF, .JPG, etc.) are stored in your local file system. The WebSnap utility tries to follow the sub-directory structure of the source. The links are reconstructed so that the local snapshot can be browsed off-line. The user has an option to specify some HTML-tags and/or data types to be excluded from the process of downloading. The WebSnap utility is...

 

 

Related tags:
Advertisement