Monday, 9 January 2012

EffeTech Network Monitoring Software


EffeTech Network Monitoring Software
EffeTech develops a series of award-winning network diagnosis and Internet administration software for parents, network administrators, and network protocol developers. These groundbreaking sniffer software helps you accelerate your development, identify Internet abuse in your LAN, and discover further information beyond common packet sniffer.

Click to view full screenshot
 Read MoreOnline Demo
 Buy Nowhttp://www.effetech.com/ 
MSN Sniffer 2
Simple MSN chat monitoring solution for your network.
MSN Sniffer 2 is world's first sniffer to automate MSN chat capturing and impact analysis. After installed on one computer, it captures MSN chat across all computers in the same LAN, analyze and save into database for future analysis.
“Help us identify the company's confidential leaking before getting worse”
-Don Sweeney, President, SecuOne
Visit official web site of MSN Sniffer 2

Click to view full screenshot
 Read More  
 Buy NowTrial Download
Ace Password Sniffer
Recover passwords through http, ftp, smtp, pop3 and telnet.
New version provides candidates of username or password for HTTP post submission.
The effective password recovery utility brings you a brand-new way to get your forgotten password back. Network administrators or concerned parents can also use it to capture passwords of other users, but such action may be considered as invasion of privacy, and make sure you have the right to do so. Currently Ace Password Sniffer supports passwords monitoring through FTP, POP3, HTTP, SMTP, Telnet, including some web mail password.

Click to view full screenshot
 Read MoreOnline Demo
 Buy NowTrial Download
http://www.effetech.com/
EtherDetect - Packet Sniffer update
Connection-Oriented Packet Sniffer and Protocol Analyzer.
EtherDetect Packet Sniffer enables you capture full TCP/IP packets and organize them by TCP connections or UDP threads. With its powerful filter, you can customize what you need to capture and avoid those irrelevant packets from disturbing you. It is also easy to detect what are transferred out from your computer.
EtherDetect Packet Sniffer is a helpful tool for network developer, web page designers, LAN administrators, security professionals, C++/Java/ASP/JSP/PHP/SOAP programmers, and those who are interested in network traffic going through his PC or the whole LAN.
The new version supports live capturing for Intel wireless network adapter, Vista x86, and Vista x64.

Click to view full screenshot
 Read MoreOnline Demo
 Buy NowTrial Download
http://www.effetech.com/
EffeTech HTTP Sniffer update
Who have surfed where online?
EffeTech HTTP Sniffer is a HTTP protocol packet sniffer, network analyzer and file reassembly software based on Windows platform. Unlike most other sniffers, it is dedicated to capture IP packets containing HTTP protocol and to reassemble the HTTP communications and files sent through HTTP protocol. Its smart real-time analyzer enables on-the-fly content viewing while monitoring and analyzing. It can also parse and decode HTTP protocol, and generate a web traffic report for reference.
By delivering an ideal mix of power, ease of use, and functionality, the award-winning EffeTech HTTP Sniffer has become the preferred choice of managers, network administrators and developers worldwide. No matter you are a professional or a rookie, you can easily get HTTP web traffic report on your network.
New version supports chunked or gzip mode.

Saturday, 7 January 2012

Using the ‘route print’ Command in Windows 7


The ‘route print’ Command from an Administrative Command Prompt in Windows 7 provides a variety of useful information.  Let’s take a look at the output of a ‘route print’ Command to examine how the output data is grouped and to understand its logic.
Let’s begin by simply issuing the following command:
route print
An Administrative Command Prompt output shows the following the following sections of the Command Output:
Figure 1 - Issuing the 'route print' Command from an Administrative Command Prompt in Windows 7
 Observing the output of the Command indicates there are 5 Major Sections.  The Sections include:
  • Interface List
  • IPv4 Route Table
  • IPv4 Persistent Routes
  • IPv6 Route Table
  • IPv6 Persistent Routes
On this Workstation a single Physical Network Interface is visible and has been assigned a DHCP Address of ‘10.1.1.36′. 
The IP Stack for this Workstation is as follows:
  • IP Address: 10.1.1.36
  • Subnet Mask: 255.255.255.0
  • Default Gateway: 10.1.1.1
  • DNS Server: 10.1.1.1
  • DHCP Server: 10.1.1.1
  • DNS Suffix: YYY.YYY.isp-provider.net
Most of the time our focus is upon the IPv4 Routing Table output.  Here are the sections of the IPv4 Routing Table output for reference.
Figure 2 - The IPv4 Route Table output listing the 'all networks' route through the Default Gateway.
The next IPv4 Routing Table entry indicates ‘10.1.1.36′ (the Host Workstation’ is a member of the ‘10.1.1.1/24′ Network and would route packets out the ‘10.1.1.36′ Interface.
Figure 3 - The Workstation Host at '10.1.1.36' is a member of the '10.1.1.0/24' Network Subnet.
 The next IPv4 Routing Table entry indicates ‘10.1.1.36′ may receive a Broadcast from the ‘10.1.1.0/24′ Network (as noted by the Subnet Mask of ‘255.255.255.255′).
Figure 4 - The Workstation Host at '10.1.1.36' can offer a Broadcast on the '10.1.1.0/24 Network' (as noted by the 255.255.255.255 Subnet Mask).
 Another IPv4 Routing Table entry focused on Broadcast Addresses is the following.  The Host Workstation at ‘10.1.1.36′ may offer Network Broadcasts to the ‘10.1.1.0/24′ Network.
Figure 5 - The Workstation Host at '10.1.1.36' can receive Network Broadcasts from the '10.1.1.0/24' Network (as noted by the '10.1.1.255' Network Destination).
 The next IPv4 Routing Table entries (3 of them) are focused on the Loopback Network Values of ‘127.0.0.0/8′,  ’127.0.0.1/32′ and the Loopback Network Address of ‘127.255.255.255/32′ respectively.  These Addresses provide Services to the Local Host (or Loopback Adapter).  The Loopback Network Destination of ‘127.0.0.0′ provides access to the Loopback Network through ‘127.0.0.1′ the Loopback IP Address.  The Loopback IP Address of ‘127.0.0.1/32′ receives Limited Local Broadcast to the Loopback Network while the Loopback IP Address of ‘127.255.255.255/32′ provides Limited Broadcast to the Loopback Network.
Figure 6 - The Workstation Host at '10.1.1.36' uses 3 Addresses for Services to the 'Local Host'. All 3 Addresses incorporate the '127.x.x.x' format.
 Next the Routing Table includes 2 specific entries for the Multicast Network (224.0.0.0/4) for both the ‘Local Host’ or Loopback  Address of ‘127.0.0.1′ and the Host IP Address of ‘10.1.1.36′ that are ‘224.0.0.0/4′ .  These are used for Multicast Network functions.
Figure 7 - The Workstation Host at '10.1.1.36' includes 2 Multicast Addresses (starting with '240.0.0.0') reserved for use through either the Loopback Address '127.0.0.1' or the Host IP Address '10.1.1.36'.
 The last 2 Routing Table entries provides Services through Limited Broadcast Addresses.  The Network Destination of ‘255.255.255.255/32′ are the Limited Broadcast Address Ranges for both the Loopback Adapter ‘127.0.0.1′ and the Host IP Address ‘10.1.1.36′.
Figure 8 - The Workstation Host at '10.1.1.36' includes 2 Limited Broadcast IP Address Values to Service both the Loopback Network '127.0.0.1' and the Host IP Network '10.1.1.36'.
Finally, upon understanding the sections of the Windows 7 Routing Table there are additional functions available when using the ‘route’ Command.  This Blog entry is focused solely on output from the ‘route print’ Command.

Sunday, 1 January 2012

Evolution of Computer Networking


Computer network is a combination of many independent science and engineering students, such as telecommunications, computer science, information technology and / or computer engineering. Computers linked to each other in the first place with telecommunications.Telecommunications, by contrast, can run and use of computers both in the media and telecommunications. To access the explanations advanced technology devices, including computers used in the construction of the efficiency of information technology networks and computer science and computer enhanced.

Chronology of the evolution of computer networks
Even before the nineteenth century, believed that the signs used in optical networks.Communication between devices that are used to calculate by sending the instruction manual.Computer network evolution can be traced back to the center during the last century. In time, can be described as follows:

September 1940 – Using the George Stibitz teletype machine to send instructions to set the problem of the model at Dartmouth College in New Hampshire calculator complex numbers in New York and provides them with the results of the return.
August 1962 – computer scientist JCR Licklider of Bolt, Beranek and Newman Inc., the formulation and dissemination of the concept of production systems such as Teletype connect to a computer to build a computer network “intergalactic.”
Hired in October 1963 – Advanced Research Projects Agency (ARPA), Licklider colleagues to design and develop advanced resources research projects agency network ARPANET) to the interests of the United States Department of Defense and the sharing of information.
Advanced 1964 – Researchers at the Dartmouth time-sharing system to a separate computer system at Dartmouth. In the same year, a group of researchers at the Massachusetts Institute of Technology, managed to direct and manage the phone using a computer. This project was supported by General Electric and Bell Labs.
Replaced in 1965 – Lawrence G. Roberts and Thomas Merrill in the formation of an extensive network of first). In the same year, the introduction of the first widely used PSTN (Public Switched Telephone Network) switch by companies and Western Electric. That’s important, because control over a computer network for the first time in history.
Established in November 1969 – and the first permanent ARPANET link between the processor and the interface messages (Imp) on the University of California, Los Angeles), and the international military presence in the Stanford Research Institute.
What is the relationship in December 1969 – and the entire four-node network with the University of California at Santa Barbara, University of California Research Institute, Stanford University Computer Science Department in the state of Utah for a contract from them.
Published in 1972 – commercial services used in X.25, and then used as the basic infrastructure to expand the scope of Transmission Control Protocol / Internet Protocol network.
Discovered in 1989 – the World Wide Web before, Timothy Berners-Lee at the European Laboratory for Particle Physics in Geneva, Switzerland.
Continued efforts to communicate through computer networks and communication among themselves, too, was the emergence of technology through the improvement of computer hardware, software, and device industries. As a result, placed within the scope of some contacts. Is it possible that without such progress in a computer network.