Network settings. Programs for games on the Internet and local network


Free network utilities by Nirsoft

    Brief description and links to download a set of utilities from the site nirsoft.net. All programs are distributed free of charge. For almost all utilities, it is possible to download an installation file or a portable version of the program, packaged in a zip archive. At the end of each page describing the program on the nirsoft.net website there is a link to download support packages for various languages, including Russian. The Russification process is very simple - unzip the language support archive and copy the resulting ini file to the directory with the program.

CurrPorts CurrPorts(cports.exe) is a network connection monitoring program. Allows you to view a list of active connections and open TCP/IP and UDP ports on a given computer. For each port, information about the process that opened the port is displayed, including the name, path to the executable, version and additional information, when the process was created, and the user account that created the process.
Additionally, CurrPorts allows you to close an unwanted connection and forcefully kill the process that created it. It is also possible to save monitoring data in HTML, XML, TXT format.
SmartSniff SmartSniff allows you to intercept TCP/IP packets traveling through the selected network adapter and view the intercepted data as a sequence of data exchange sessions between the client and the server. The data can be presented as ASCII text or as a hexadecimal dump.
NetworkTrafficViewNetworkTrafficView is a utility for collecting statistical data about network traffic for the selected adapter. Statistics are displayed on source and destination addresses, ports, protocols, maximum data transfer rates, connection durations, identifiers and names of programs that exchanged data via the TCP protocol.
HTTPNetworkSniffer v1.00 HTTPNetworkSniffer a packet sniffer that intercepts all data exchanged between the browser and the web server via the HTTP protocol. For each HTTP request, information is displayed about the host name (Host Name), HTTP method (GET, POST, HEAD), URL path, User Agent field, Response Code, Response String, Content Type, Referer fields , Content Encoding, Transfer Encoding, Server Name, Content Length, Cookie String, etc.
It is possible to export sessions to the clipboard or text/html/xml/csv file.
AdapterWatch AdapterWatch displays general information about the network adapter - IP address, MAC address (Hardware address), WINS server, DNS server, MTU value, number of bytes received/transmitted, current transmission speed, TCP/IP/UDP/ICMP statistics.
DownTester DownTester- allows you to determine the download speed for web servers, the list of which is specified as a URL manually or in the contents of a text file. The results can be saved in html/xml/csv/text format
Wireless Network Watcher Wireless Network Watcher- a small utility for scanning a wireless network and creating a list of computers and devices connected to it, displaying IP and MAC addresses, network adapter information and computer name. The list can be exported to html/xml/csv/text file, or copied to the clipboard for further insertion V Excel pages or other application.
NetResView NetResView - small program to display a list of network resources on the local network, including computer names, operating system versions, information about network printers and catalogues.
PingInfoView PingInfoView a small utility for polling hosts by name or IP address with the ability to set the number and ping intervals. Similar to standard console program ping.exe. The results can be saved to html/xml/csv/text file.
FastResolver FastResolver a small utility for quickly determining host names by IP addresses. For a local network, it allows you to quickly obtain a list of IP and MAC addresses of computers.
BluetoothView BluetoothView is a small program that runs in the background to monitor the activity of Bluetooth devices. For each detected device, the Device Name, Bluetooth Address, device type, first and last detection time are displayed.
BluetoothView can alert the user when a new Bluetooth device is detected with a short sound signal and a pop-up window.
WirelessNetView WirelessNetView- a small program that runs in the background to detect demons wired networks Wi-Fi within the reach of this computer. For each node, the name, MAC address, signal strength, authentication algorithm, number of channels, etc. are displayed.
IPNetInfo IPNetInfo- a program that allows you to quickly obtain detailed information about a specific IP address. Information about the owner, country, subnet address range, and contact information is displayed.
WhoisThisDomain WhoisThisDomain allows you to quickly obtain information about a registered domain. Automatically connects to the WHOIS server of the corresponding domain and displays the WHOIS record.
DNSDataView DNSDataView- an alternative to the standard console utility nslookup.exe. Lets get DNS records for a given domain name. The results can be saved to a text/xml/html/csv file
NetRouteView NetRouteView- GUI analogue of the standard console program route.exe of the Windows OS family. Displays the current routing table and allows you to easily add new routes as well as modify and delete existing ones.

Free network programs Virtual Network Computing (VNC).

    Virtual Network Computing (VNC)- system remote access to the computer desktop using the RFB (Remote FrameBuffer) application layer protocol. Control of a remote computer is carried out by transmitting keystrokes on the keyboard and moving the mouse pointer from one computer to another through the network. The managed computer uses the VNC server part (VNC server), and the manager uses the client part (VNC viewer). VNC is independent of the systems in which it operates and, for example, a Linux client can connect to a VNC server running in a Windows environment. There are also VNC implementations for Java, including for mobile phones.

The RFB protocol was developed relatively long ago and initially used a simple encoding method to transmit the screen buffer Raw Encoding- when the server transmitted screen points to the client in order from left to right and top to bottom. After transmitting the first buffer, in order to minimize traffic, only changed pixels were transmitted. With this encoding method and a small degree of image change, traffic is minimal, however, for example, when watching a video, the load on the transmission channel increases sharply, since almost all pixels in the screen buffer will change. To minimize exchange traffic, VNC systems began to use various methods of encoding and compressing transmitted data. Not all methods are standard for every VNC implementation. While the RAW Encoding method can be used in any VNC system, the specific methods (CopyRect, Zlib, CoRRE, etc.) depend on the software used and may differ for different versions of VNC. The client and server agree on the possibilities for encoding transmitted data when establishing a connection.

By default, the range of TCP ports from 5900 to 5906 is used for data exchange via the RFB protocol. Each port corresponds to its own graphical server screen (in Linux - terminals 0 - 6 of the X server, in Windows - the desktop with display number 0 and TCP port 5900 ). In some VNC implementations, it is possible to connect back from the server to the client via TCP port 5500.

Many free VNC implementations have a commercial version that provides additional usability features, increased security and productivity.

One of the simplest and most convenient representatives of the VNC family is RealVNC. The product is available in 3 versions:

- Free Edition- free version with support for basic server and client capabilities.
- Personal Edition- paid version for use at home and in small businesses. Added data encryption capabilities, chat, remote printing.
- Enterprise Edition- commercial version with improved authentication, data encryption, remote printing, chat, file transfer.

The installer includes both server and client parts. The server can be configured to run in user mode (User-Mode) or as a system service (Service-Mode). In system service mode, the server starts automatically during Windows boot. In this mode, the VNC server is ready to accept incoming connections without the user logging in or taking any action. In user mode, the server is started manually or via autostart, like a regular application program.

The VNC server is configured either by calling the context menu by right-clicking on the icon in the Windows taskbar (menu item "Options"), or by launching using shortcuts in the "Programs" menu - "RealVNC" - "VNC-Server: " - "Configure VNC Server" . During the server configuration process, minimal settings are made - authentication method and password for connection (tab Authentication):

No Authentication- the password request when connecting the client to the server is not performed.
VNC Password Authentication- connection to the server with verification of the password specified in the server settings. The password is set when the button is pressed Configure. Many free versions of VNC use an 8 character password. If you specify a longer password, the first 8 characters will still be used for verification, which makes such a server very vulnerable to hacking using password guessing. Moreover, the number of password entry attempts is not checked. In paid versions, security is significantly improved, since you can use long passwords, data encryption and access verification using Windows tools ( NT Logon Authentication mode)

Connection settings are made on the tab Connections:

Accept connection on port- accept connections on TCP port 5900. The port number can be changed if necessary.
Disconnect idle client after (seconds) - client inactivity time in seconds, after which the connection will be reset.
Serve Java viewer via HTTP on port- serve connections from a Java client connecting via HTTP to port 5800. When using this configuration item, connecting to a VNC server is possible in a browser window with Java support.
In field Access Control You can set connection processing rules for individual IP addresses or subnets. For each entry, there are 3 options for a predefined action:

Allow- Allow connection. In the window with a list of addresses, it is displayed with the sign + before the address.
Deny- Deny connection. In the window with a list of addresses, it is displayed with the sign - before the address.
Query- Issue a request for connection permission.. In the window with a list of addresses, it is displayed with a sign ? before the address.

Client connection service modes are configured on the tab Sharing:

Always treat new connection as shared- always treat a new connection as shared.
Never treat new connection as shared- never treat a new connection as shared.
Use client's preferred sharing settings- use client settings to define a shared connection.
Non shared connection replace existing ones- a non-shared connection replaces an existing one. When installing this mode, connecting a new client with the sign of a non-shared connection, the server will reset all other connections. To connect multiple clients to one server, the checkbox must be unchecked.

Tab Desktop defines the parameters for processing the desktop buffer when VNC clients connect, and the actions performed after the last one is disconnected from the server. .

While connected- actions when connecting a client to a VNC server
Checking the checkboxes for each of the fields reduces traffic when sharing the desktop buffer, but makes it a little easier appearance. It is advisable to enable it when the speed of the data transmission channel is low.

When last client disconnects- when the last client disconnects.
- Do nothing - do nothing.
- Lock Workstation - lock the desktop. The user's session does not end, but a user name and password must be entered to continue using the desktop.
- Logoff user - log the user out of the system.

Tab Modes Inputs define the interaction between the client and the server when processing keyboard and mouse events. The "Disable local inputs while server in use" mode disables the keyboard and mouse on the remote computer when connected to the VNC server.

Tab Capture method sets the desktop image processing mode when transferring data from the server to the client and processing transparent windows(Alpha - blended windows). Changing modes affects the amount of traffic between the client and server, as well as the degree of CPU resource utilization when processing the desktop buffer.

RealVNC server settings are stored in the registry key HKLM\SOFTWARE\RealVNC\WinVNC4

Client Real VNC Viewer After launch, it displays a window for connecting to the server. The input field uses the name or IP address of the remote computer, and, if necessary, the port number, for example 5909:

Button Options allows you to configure modes for the RealVNC client part. There is a tab in the settings window Load/Save with which you can save the current settings to a file with the extension .vnc or load previously saved settings from a file. This allows you to have multiple settings profiles for connecting to different VNC servers. The default settings are designed for average performance and average desktop display quality.

Tab Color & Encoding allows you to select the data encoding mode when transferring the desktop buffer and its color depth. It is possible to select one of 3 preferred encoding types or set the mode Auto Select- when the selection is made automatically when a connection to the VNC server is established.

Color depth Color Level determines the quality of the remote desktop display and the amount of data transferred from the server to the client. Minimal traffic and worst image matches the mode Very Low (8 colors

Tab settings Inputs are in many ways similar to the server settings and relate to the parameters of input devices - keyboard and mouse

Field Menu Key- defines a special key to call the menu for client interaction with the remote desktop. Used to pass special key codes (CTRL, ALT, CTRL-ALT-DEL:) The default menu key is F8. In addition to transmitting special key codes, pressing F8 allows you to call the client settings menu, go to full screen mode, create a new connection and view information about the current one (Connection Info:). Information about the current connection includes the IP address and name of the remote server, screen resolution, pixel format, encoding method, protocol used, and approximate data transfer speed.

    To install the server part on a remote computer, you can use a free utility pushVNC. The program allows system administrators to install a VNC server on a remote computer over a local network without any end user intervention.

An account with administrator rights is required to connect to a remote computer. In addition, the hidden network resources ADMIN$ and IPC$ must be accessible on the remote computer and the Remote Registry Management service must be running. The program copies several of its files to create a VNC server to a remote computer and registers it in the registry new service PushVNC and launches it. A normal client connection is then made to the remotely created server. If the mode is not set Leave Service, then after the session ends, the created server and the files copied over the network are deleted.

RealVNC is one of the simple and convenient free implementations VNC. In addition to it, there are several dozen more, differing to an insignificant degree. For example, the popular UltraVNC package has almost the same settings as RealVNC, but allows you to use a greater number of data encoding methods, encryption even in the free version, you can use a special proprietary driver to process the desktop buffer. And just like RealVNC, the UltraVNC server in the free edition truncates the password to 8 characters. Below are links and a brief description of free VNC implementations on the SourceForge project.

Programs of the VNC family of the SourceForge.net project

    SourceForge.net is one of the world's largest websites for open source software developers, operated by SourceForge, Inc. and uses SourceForge's proprietary system. On this site, developers can post and collaborate on their software projects. SourceForge.net hosts more than 230 thousand projects, and the number of registered users is about 2 million people.
Many projects published on sourceforge.net have their own website, a link to which is located on the page with brief description software product.

TightVNC- the most popular product of the VNC family, an improved implementation with “Tight” encoding, which reduces traffic between the client and server, and the ability to transfer files.
TigerVNC- VNC implementation based on the refinement of the TightVNC and TurboVNC projects. Features improved JPEG compression.
EchoVNC- implementation of a VNC client with improved security. There is support for connections to VNC, Remote Desktop, and RAdmin servers. An extended toolbar allows you to optimize your work with the selected server.
Flashlight-VNC- client (VNC Viewer) written in Flash.
Flashlight VNC Recorder- addition to the project Flashlight VNC with the ability to record the session.
Delphi VNC Server VNC server written in Delphi.
MultiVNC VNC client with support for a large number of data encoding methods
LightVNC implementation VNC server only with support for connections via HTTP protocols and HTTP(S). A web browser is used as client software. Allows you to connect to a remote desktop for devices that do not have a VNC client - smartphones, game consoles, tablet computers.
ThinVNC - implementation of VNC using HTML5 and AJAX technologies. The client must be a browser that supports HTML5 - Mozilla FireFox, Chrome, Opera.
pushVNC7- remote installation over a local network and launching a VNC server on Windows 7 workstations. Implementation of the pushVNC project for Windows 7.
A simple set of tools for installing UltraVNC on a remote computer without any user action and without being noticed by the user.

Built-in OS administration tools are not always convenient or often do not have sufficient functionality, so the system administrator's arsenal is replenished over time with useful utilities, add-ons and scripts that significantly simplify everyday tasks. It is doubly gratifying when the solution found not only helps to cope with a specific problem, but is also distributed free of charge.

Advanced IP Scanner

The system administrator must know everything about the systems running on the network and quickly gain access to them. Advanced IP Scanner, designed for fast multi-threaded scanning of a local network, helps to cope with this task. AIPS is provided completely free of charge, without any reservations. The program is very simple and easy to use. After starting, AIPS checks the IP addresses of the network interfaces of the host on which it is installed and automatically enters the IP range into the scanning parameters; if the IP does not need to be changed, then all that remains is to start the scanning operation. As a result, we get a list of all active network devices. For each, all possible information will be collected: MAC address, network card manufacturer, network name, user registered in the system, available shared resources and services (shared folders, HTTP, HTTPS and FTP). Almost all scanning options can be customized, such as changing the speed or excluding scanning of a certain type of network resource (shared folders, HTTP, HTTPS and FTP). You can connect to any resource with one click; you just need to mark it in the list. AIPS is integrated with the Radmin program and during the scanning process it finds all machines running Radmin Server. The scan result can be exported to a file (XML, HTML or CSV) or saved in “Favorites” (drag-and-drop supported). In the future, if you need to contact the desired client computer, you do not need to scan the network again. If remote device supports Wake-on-LAN function, it can be turned on and off by selecting the corresponding menu item.

NetWrix, a company specializing in developing solutions for auditing changes in IT infrastructure, offers ten free and very useful utilities designed to significantly simplify the administration of Windows OS. For example, NetWrix Inactive Users Tracker allows you to solve one of the pressing security problems - the presence of inactive accounts that no one uses for some time (fired employees, business trips, job transfers, temporary accounts, etc.). HR personnel rarely warn the IT department about changes, and such an account can easily be used by an attacker. The utility periodically checks all accounts in domains and reports those that have not been accessed certain time. IN Free versions As an action, it is possible to specify only a warning by e-mail (it is enough to set the SMTP parameters), the admin performs all other operations manually, although a warning is sufficient in our case. Available in the paid version: automatic setting of a random password, deactivation account and moving to another OU, OU filter to search for accounts. A PowerShell cmdlet get-NCInactiveUsers is separately offered, which allows you to get a list of inactive users (the “lastLogon” attribute is checked) and simplify the writing of corresponding scripts.

WinAudit Freeware

WinAudit is a free utility from Parmavex Services that allows you to perform a full system audit. Does not require installation, can be executed in command line mode. The program has a simple and localized interface; it supports launching on all Windows versions, including 64-bit. Data collection takes approximately a minute (process time may vary depending on operating system and computer configuration), the resulting report consists of 30 categories (customizable). As a result, the administrator can receive data about the system, installed software and updates, indicating the version and vendor, connected devices; a list of open network ports (number, service, program, etc.) and open folders; active sessions; security installations; access rights to the periphery; information about accounts and groups; list of tasks/services; startup programs; log entries and system statistics (uptime, memory, disk usage). You can also search for specific files by name. For example, to find music and videos on hard drives user, just specify the appropriate extensions (avi, mp3 and the like). The result can be opened as a web page, exported to a file of many popular formats (txt, XML, CSV, PDF) or to a database (using a wizard, all popular ones are supported: MS SQL, MS Access, MySQL, Oracle and others), send by e-mail and print.

Accounting for computers using CheckCfg

The problem of accounting for office equipment and software used is acute in any organization. You can solve it in different ways, one of the options is offered by developer Andrey TatukovCheckCfg. This solution periodically collects data about hardware, OS and programs, including CPU type, amount of RAM, disk space, S.M.A.R.T. status. And so on. At the same time, CheckCfg easily copes with several hundred computers. The result is displayed in a convenient tree form, and local directories are easy to access. Each PC can be assigned an inventory number, and if necessary, it is easy to generate a report in RTF format.

CheckCfg is a whole complex of programs. CheckCfg is responsible for directly collecting data about the computer, which runs when the OS starts and writes the result to a file. Information is managed and archived using the Sklad accounting program, which processes the files created by CheckCfg and saves them into its database, after which reports can be generated. Using the Sklad_w program, you can conveniently view current computer configurations and basic data on office equipment (by IP addresses, CPU, Memory, software). To analyze changes in the PC configuration and notify the administrator about this, another utility is used - Doberman. Perhaps the setup will seem not entirely trivial, since you have to manually create the necessary configuration files, but the detailed description on the site and the available templates allow you to figure everything out without any problems.

MailArchiva Open Source Edition

Some mail servers, like MS Exchange, have mail archiving functions that allow you to find old messages if necessary, including to identify leaks of confidential information when investigating incidents. In other cases, you have to provide these functions yourself. A solution option is the development of MailArchiva, compatible with most modern mail servers (Lotus Domino, MS Exchange, MDaemon, Postfix, Zimbra, Sendmail, Scalix, Google Apps). Archiving via SMTP, IMAP/POP3, WebDAV and Milter protocols is supported (the program has a built-in SMTP and Milter server, IMAP/POP client). To avoid collecting all mail, you can create any archiving rules. Three levels of access to saved data are implemented - user (only your own mail), administrator (settings and your own mail) and auditor (all mail, can be limited by rules). The Open Source version of MailArchiva also includes intuitive search functions, including attachments (Word, PowerPoint, Excel, OpenOffice, PDF, RTF, ZIP, tar, gz). MailArchiva runs on Windows, Linux, FreeBSD and Mac OS X.

Performance Analysis of Logs

In case of problems with system performance, detect the bottleneck using standard Windows Performance Monitor is quite difficult without experience. In order to figure out what metrics need to be taken and how to correctly interpret the result, you will need to carefully scour the documentation. The PAL (Performance Analysis of Logs, pal.codeplex.com) utility greatly simplifies the search for bottlenecks. Once launched, it looks at logs and analyzes them using built-in templates. Currently there are settings for most popular MS products - IIS, MOSS, SQL Server, BizTalk, Exchange, Active Directory and others. After launch, the administrator in the PAL Wizard activates the necessary counters by simply selecting a template from the list of proposed ones, indicates the current server settings (number of CPUs, etc.), the analysis interval and the directory for saving the result. After some time, a detailed report will be issued in HTML and XML, containing a description, counter name and indicators (Min, Avg, Max and Hourly Trend). The report can then be easily copied into any document. But you will still have to further understand the collected parameters yourself. Although if PAL shows that the characteristic is in the green sector, there is no need to worry. The request itself is saved in PowerShell script PAL.ps1, which can be saved for future use. Templates are XML files; Taking any of them as an example, you can create your own version. The built-in PAL Editor is available for editing parameters in the template.


Officially supported by Win7, but works on all OS from MS, starting with WinXP (32/64). To install you will need PowerShell v2.0+, MS. NET Framework 3.5SP1 and MS Chart Controls for Microsoft .NET Framework 3.5.

Create an access point with Virtual Router

The situation when a computer with a Wi-Fi card needs to be turned into an access point is by no means uncommon today. For example, you need to quickly deploy a WLAN or expand your Wi-Fi coverage area. Initially work wireless card was provided in only one of two modes: point-to-point, when clients connect to each other, or as an access point. In Win7/2k8 (except Win7 Starter Edition), it became possible to virtualize network connections (Virtual Wi-Fi technology), which allows you to create several Wi-Fi modules with your own settings using one physical Wi-Fi adapter. In this way, the computer can be connected to Wi-Fi and at the same time act as an access point (SAPoint, Software Access Point). The connection to such a virtual hotspot is protected using WPA2. You can turn a PC running Win7/2k8R2 into an access point using the Netsh console utility, through the Network and Sharing Center, or using the Virtual Router application, which has an intuitive GUI and very simple settings. After launch Virtual Router you just need to specify the SSD and password to connect, and then activate the access point. If necessary, you can also stop the hotspot by pressing one button. Additionally, the window displays the current connections to the point; for each you can set its own icon and change some parameters.


Managing RDC connections - RDCMan

For remote management of servers and PCs running under Windows control, the Remote Desktop Connection snap-in is intended. If you need to establish many RDP connections with different settings, then working with it becomes inconvenient. Instead of methodical saving individual settings For each remote computer, you can use the free tool Remote Desktop Connection Manager RDCMan, which automates this process. After launch, you should specify the RDP connection settings, which will be used by default and inherited by all connections. Here we set general credentials, gateway, screen settings, security settings and much more. Next, we create the required number of system groups (for example, by purpose, location, OS version), for each of them you can specify specific connection settings. And the last step is to populate the groups with systems. To add a server, you only need to enter a domain name; if any parameter differs from the group settings, you can immediately override it. If necessary, systems can be easily moved between groups by simply dragging and dropping. If there are many systems, it is easier to create a text file, specifying one name per line, and then feed the workpiece to the utility. Now, to connect, just select required server and in context menu Click the “Connect” item. You can activate multiple connections at the same time and switch between them.

Free Active Directory Tools

Managing Active Directory settings using standard tools is not always easy or convenient. In some situations, a set of utilities Free Active Directory Tools, developed by ManageEngine, will help. The kit consists of fourteen utilities launched from one shell. For convenience, they are divided into six groups: AD USer Report, SharePoint Report, User Management, Domain and DC Info, Diagnostic Tools and Session Management. For example, running Empty Password User Report will allow you to get a list of accounts with empty passwords, GetDuplicates - get accounts with the same attributes, CSVGenerator - save Active Directory account data to a CSV file. Other features: report last logon time, retrieve data from AD based on a query, report on SharePoint installations, manage local accounts, view and edit domain password policies, get a list of domain controllers and their roles, manage their replication, monitor them work (CPU load, RAM, hard drives, performance, etc.), managing terminal sessions and much more.


Comodo Time Machine

The ability to restore the system using the System Restore component is built into Windows, starting with XP, but its functionality, to put it mildly, is limited, so it is often used for backup third party applications. The free utility Comodo Time Machine (comodo.com) allows you to roll back the OS to any previous state. Moreover, it will work even if the OS has completely stopped loading. During the process, CTM creates recovery points (manually or on a schedule), all changes are entered into them system files, registry, and user files. This big advantage compared to System Restore, which saves and restores only system files and the registry. The first copy has the maximum size; the remaining copies store only changed files. In order to save free disk space, you should periodically create a new checkpoint by deleting old archives. To make it possible to restore the OS, information about the CTM is written to the boot sector; To call the corresponding menu, just press the Home key. You can also restore the OS state according to a schedule, for example, configure the behavior of the utility so that every reboot it automatically rolls back to a “clean” version of the system. This will be useful, for example, in an Internet cafe, where users leave a lot of garbage in the system. In addition to a complete OS restore, the utility provides the opportunity to obtain more from the archive earlier version any file. Search is implemented, so you can find the necessary data without any problems.

Amanda

The task of centralized Reserve copy data from workstations and servers running Windows and *nix can be resolved using AMANDA Advanced Maryland Automatic Network Disk Archiver). Initially, the program was created to work with tape drives, but over time the developers proposed a mechanism called “virtual tapes” (vtapes), which allows you to save collected data to hard drives and CD/DVDs. AMANDA is a convenient add-on to the standard Unix dump/restore programs, GNU tar and some others, so its main characteristics should be considered based on the capabilities of these basic utilities. It works according to a client-server scheme. All available authentication methods are used to access computers: Kerberos 4/5, OpenSSH, rsh, bsdtcp, bsdudp or Samba password. To collect data from Windows systems, a special agent or, alternatively, Samba is used. Compression and encryption (GPG or amcrypt) of information can be performed both directly on the client and on the server. All settings for reservation parameters are made exclusively on the server; the delivery includes ready-made templates, so it’s quite easy to understand.

Core Configurator 2.0 for Server Core

The initial setup of a server running Win2k8/R2 in Server Core mode is done in the console using commands. To simplify the task, OS developers added an interactive script SCONFIG.cmd to R2, which allows you to configure basic system parameters. An alternative is available on Codeplex - the wonderful Core Configurator. For it to work you will need the components NetFx2-ServerCore, NetFx2-ServerCore and PowerShell. After running Start_CoreConfig.wsf we get a menu, in it we find several items that provide access to basic settings that would have to be managed from the command line: product activation, setting screen resolution, clock and time zone, network interface, setting permissions for remote RDP connections, managing local accounts, Windows settings Firewall, enable/disable WinRM, change computer name, working group or domain, setting up roles, components, Hyper-V and running DCPROMO. If you check the "Load at Windows startup", then the program will be loaded along with the system.

Exchange 2010 RBAC Manager

Exchange 2010 introduces a new role-based access model that allows you to finely control the level of privileges for users and administrators depending on the tasks performed. The only negative is that built-in management tools using PowerShell cmdlets may not seem convenient and understandable to everyone. More advanced capabilities are available in the free Exchange 2010 RBAC Manager tool (RBAC Editor GUI, rbac.codeplex.com), which offers a clear graphical interface for configuring the properties of all roles. Understanding its features will not be difficult even for a beginner. The program is written in C# and uses PowerShell. To work you will need Exchange 2010 Management Tools installed.

PowerGUI

As soon as it appeared, the PowerShell command shell won the sympathy of Windows admins, who had long been in need of a tool that would automate many tasks. With the first versions of PowerShell, Microsoft developers were unable to offer a more or less functional editor, so several third-party projects filled the niche. The best of them today is PowerGUI, which provides a convenient graphical interface for effective creation and debugging PowerShell scripts. At the same time, the authors suggest ready-made kits scripts for solving many problems - they can be used in your developments.

Multi-Tabbed PuTTY

The free PuTTY client is well known to administrators who need to connect to remote hosts via SSH, Telnet or rlogin. This is a very convenient program that allows you to save session settings for quick connection to the selected system. The only inconvenience is that with a large number of connections, the desktop turns out to be loaded with many open windows. This problem is solved by the Multi-Tabbed PuTTY add-on, which implements a tab system.

INFO

PuTTY was originally developed for Windows, but was later ported to Unix.

Conclusion

Often there is no need to rack your brains over solving a certain problem: most likely, other administrators have already encountered it and offered their own option - a specific utility or script for which you don’t even have to pay.

Hamachi is one of the most famous tools for creating virtual private VPN networks. Using this program, you can easily establish an encrypted connection over the Internet between remote computers, simulating a local network connection. By running the Hamachi service, users will be able to share equipment - printers, webcams, etc. You can download the program for free on our website and install it on your computer with Windows 7, 8 or XP.

SHAREit is a popular cross-platform program from Lenovo, designed for convenient data exchange between different devices connected to the same wireless network. Thanks to this program, you can easily transfer files between Windows computers.

TeamViewer - free program on Windows, which allows you to remote control computer via the Internet. This is one of the most popular utilities for such purposes. In literally a matter of seconds, the program will provide you with a visual connection to your computer from anywhere in the world. You can download the program for free in Russian using a direct link from our website.

TeamSpeak is a program for Windows devices designed to organize multi-user voice conferences over local or global network via VoIP technology. TeamSpeak is aimed primarily at gamers communicating with each other during online games, but can also be used by employees of various organizations for conferences and meetings.

Wireshark is a free functional sniffer program for Windows designed for analyzing network traffic of computer networks. various types, including PPP, Ethernet, FDDI, Token-Ring and many others. The program is a fairly easy-to-use utility with low system requirements, which has wide functionality and is easy to use.

Home media server (UPnP, DLNA, HTTP) is a modern free program on Windows for the convenience of viewing various media files on your computer on a TV, tablet, player, or other devices with network connection or Wi-Fi. Based on the multifaceted experience of Internet development, the program is able to function regardless of the operating system used in the device.

Local networks are no longer something unusual, as they were at the dawn of their creation. The advantages of such networks are obvious. Users of computers united in a single local network will have access to shared files and folders and can easily exchange necessary information, edit documents, play games using team modes etc. However, this only applies to computers that are connected to each other using wires and a fairly large amount of hardware. But what to do when the computers are quite far from each other? This is where software products for creating virtual local networks come to the rescue. Among them, quite often there are completely free programs. Downloading free programs for creating local networks and installing them on your computer is not a problem now. As they say, there would be a desire. Among the free burnouts for local networks of such applications, two main types can be distinguished. The first type allows you to create a virtual private network in such a way that one of the computers will act as a server. And this also includes programs that use computers alternately as the main server. Data exchange in this case is carried out using P2P (peer-to-peer) technologies, that is, using the universal BitTorrent protocol. The second type includes programs where the role of the central server is played by remote server software manufacturer. Here you only need to register on the manufacturer’s website. If we talk about free programs of this kind, then, in comparison with paid analogues, they allow you to create networks with the connection of about one and a half dozen computers or accounts. It is clear that paid analogues can create networks connecting even several hundred computers. However, for home use or small offices, 15-20 users are completely sufficient. It must be said that networks created using such applications have all the capabilities of conventional wired networks. And the setup, in most cases, is very similar. The difference in such programs may also be that sometimes one computer is bound to only one specific IP address. In some other cases, the IP address may be assigned automatically. To work on such a network, you will only need a program installed on your computer. Some free programs for creating private virtual networks even allow you to use the registration data of many Internet messengers, for example, Jabber accounts. However, the capabilities of such programs are quite similar. Some additional functions may differ, for example, in the presence of built-in chats or the ability to exchange short text messages. It seems that today, virtual networks are still preferable, since they allow you to combine single network computers located even in different parts of the world. On our website you can download the most modern programs for creating local networks.

Our programs for system administrators will help you keep abreast of everything that happens in the computer park and enterprise network, and respond in a timely manner to equipment failures and problems in software, minimize costs and downtime. This page presents programs for monitoring the network, servers and hosts, for PC inventory, accounting installed programs and licenses, creating reports on computer hardware, for accounting traffic on the network, for studying the network topology and creating graphical diagrams of local networks.

A network administrator may also find useful programs for searching files on local networks and auditing user access to file resources of servers over the network. All these programs will help the system administrator improve the performance of network devices and servers and ensure the proper level of security in the enterprise network.

10-Strike programs are included in the unified register of Russian computer programs of the Ministry of Communications and can participate in government procurement.

Programs for network administrator, network utilities

A program for inventory and accounting of installed software and hardware on computers in local networks. "Computer Inventory" allows system administrators to keep track of computers on the enterprise network and view configurations remote computers and lists of installed programs over the network, track configuration and software changes. The program contains a powerful report generator. For example, you can create reports on the presence of certain programs on computers and their quantity. At planning upgrades can be created report containing computers with insufficient disk or RAM memory. Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.


- program for monitoring servers and computers on the network, allowing you to visually observe the current state of your network at any time. LANState monitors hosts on the network, monitors connections to network resources, monitors traffic, and signals various events. LANState contains many functions useful for network administrators: sending messages, shutting down remote computers, scanning hosts and ports, receiving various information from remote computers (access to the registry, event log, etc.). Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.


- program for monitoring servers and other network devices, monitors the performance of the network and notifies the administrator of problems. Find out in time about a failure that has occurred (connection loss, server disk space running out, service stop, etc.) and fix the problem with minimal loss of time. The program signals problems using sound, on-screen messages, by e-mail, and can launch external programs and services, as well as reboot computers and services. Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.


- program for searching files on local network computers(via NetBios and FTP protocols). Enter a phrase or file masks and search necessary information. When viewing search results, found files can be immediately opened, saved to disk, or generated a report. The search uses multi-threaded technology, which significantly speeds up the work. You can set filters by file size and modification date. Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.


- monitoring program network connections users over the network to shared folder and files, allows you to find out in time about connections of network users to your computer. The program beeps, displays alerts on the screen, and keeps a detailed log of connections, which records information about who connected to the network and when. network folders computer, what files were opened, etc. Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.


3.0 FREE!

- scanner for local networks, IP addresses and hosts. This free program allows you to scan your local network and detect active hosts, computers and servers. Supports scanning of IP address ranges and many protocols for detecting network devices (ICMP ping, searching for open TCP ports, NetBios, SNMP, UPnP, ...). If you have administrator rights, you can read many useful information. Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.

Sets of network programs for system administrators

Software suites for system administrators allow you to save money when purchasing several of our network programs or all at once. Get three programs for the price of two and so on. For example, when purchasing Full set of administrator programs in option " for the organization"(without restrictions on the number of workstations), consisting of our seven programs for network administrators, you can save up to 85,000 rubles or 30%!

Other utilities

- CD cataloger (CD, DVD). With its help, you will quickly find the files you need on the CDs and DVDs of your collection. SearchMyDiscs helps you organize your CD and DVD collections, allowing you to find the disc you need in a few seconds. If you are tired of searching for the right disk for a long time every time, this program is for you! Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.


- Apache web server Raw log file analyzer. Creates various reports and histograms. The program has many settings and filters that will allow you to get accurate information about your site, downloaded files, and who is coming to you and from where. Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.

Payment and delivery

When ordering programs legal entities Payment by bank transfer is accepted. Invoices are issued electronically and an agreement is concluded. Electronic delivery: the distribution kit is downloaded from our website, registration keys are sent after payment by e-mail. After payment, the original contract and documents for accounting are sent to the buyer by mail.

Issue an invoice (specify necessary programs and types of licenses, your details and the name of the director for the agreement)

All our programs are also presented in the Softkey and AllSoft online stores (follow the “buy” links from our website).


Our clients: small and medium-sized businesses, government and budget institutions, hospitals, schools, colleges and institutes, banks, oil industry, telecoms.







2024 gtavrl.ru.