travianbo55

Net-Peeker Group Edition v3.50.1177 cracked version download

Dec 5th, 2013
185
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
ASP 4.15 KB | None | 0 0
  1.                                       Net-Peeker Group Edition v3.50.1177
  2.  
  3.  
  4.  
  5.  
  6.  
  7.  
  8.  
  9.             This is the full cracked version of the software. Download, extract, install, enjoy.
  10.    Inside the archive there is "crack" folder wich contains everything you need to crack the software.
  11.                                                 Download link:
  12.                                    https://safelinking.net/p/1f71316d17
  13.  
  14.  
  15.  
  16. Main Features
  17.     Distributed network traffic monitor
  18.    
  19.  
  20.     Display real time network traffic speed for every computer in the network (Group Edition).
  21.     Display all active network applications on any computer in the network (Group Edition).
  22.     Display all sessions and listen to all ports for any active network application.
  23.     For service shared in svchost.exe, display real service name instead of just "svchost.exe"
  24.     Display application properties and loaded modules.
  25.     Support "Internet Connection Sharing (ICS)", and can monitor network usage of ICS clients without installing the NetPeeker agent in the clients.
  26.     Can monitor NETBIOS file transfer, which is copying shared files inside a local network.
  27.     Use "WHOIS" service to get detailed information on selected remote IP addresses and domain names.
  28.  
  29.     Desktop based firewall on all computers
  30.    
  31.  
  32.     Integrated system firewall and application firewall.
  33.     Support rules on applications, IP addresses/port numbers, remote country, DNS names, protocol types, and HTTP URLs.
  34.     Rule-Exception mode rule structure for easier setup and understandable rule relations.
  35.     Support rule schedule, and can specify the effective time range for every firewall rule.
  36.     Fast firewall engine which can handle thousands of rules without performance impact.
  37.     Drop invalid network packets.
  38.     Detect and block port scans, SYN floods, and DOS attacks.
  39.     Stealth mode to hide your computer from hackers.
  40.     Support importing spyware rules from BlueTack or Sponge, which have excellent anti-spyware rule lists
  41.  
  42.     Network speed limitation and Priority based traffic shaping
  43.    
  44.  
  45.     Rule based network speed shaping. Rules can be specified on applications, IP addresses/port numbers, remote country, DNS names, protocol types, and HTTP URLs.
  46.     Support rule schedule, can specify the effective time range for every speed limit rule.
  47.     "priority based traffic shaping" feature, which allow you to give critical applications or certain remote sites more bandwidth.
  48.     Network traffic quota, specify monthly/daily network usage quota before block or limit speed
  49.  
  50.     Protect system against "Malwares"
  51.    
  52.  
  53.     Protect system by monitoring system operations, deny operation by rules. Can be used to prevent malware from running
  54.     Rule on registry operations can specify detailed access type
  55.     Rule on execution operations can specify the command line argument
  56.     For all rules, "actor"(parent process) can be specified to refine the rule.
  57.  
  58.     Log and analyze network traffic
  59.    
  60.  
  61.     Log every session, including start/stop time, applications, remote addresses/ports, total transferred bytes and average speed.
  62.     Generate network traffic statistics report, and display period network usage for every application and every remote IP.
  63.     Store log information in compact mode to save disk space.
  64.     Support archiving on the fly, archive log files from remote agents, and save the files in .ZIP format.
  65.     Load archived log files without uncompressing the archive.
  66.     Support exporting log information into text format.
  67.  
  68.     Capture network traffic
  69.    
  70.  
  71.     Live capture network packets for any active network application or session.
  72.     Support pre-defined capture filter on applications, and use filter to get packets on appointed applications and remote addresses.
  73.     Associate captured packets with session logs, so you can browse captured packets while browsing logged sessions.
  74.     Support exporting captured packets into TCPDUMP format, so it can be further analyzed using third-part tools.
  75.     Support archiving on the fly, to archive captured files from remote agents, and save in .ZIP format.
  76.     Load archived capture files without uncompressing.
Advertisement
Add Comment
Please, Sign In to add comment