|
скачать Google Документы (iPhone/iPad) v.1.2019.22202 |
Рубрика: | Программы для смартфонов и планшетов |
Язык: | Английский |
![]() |
![]() | ![]() | ![]() | ![]() |
Последние новостиПопулярный софт
Google Документы (iPhone/iPad) - Google Docs - бесплатное приложение для создания и редактирования документов, а также для совместной работы с ними на iPhone или iPad.
Sysinternals Suite (11.06.2019) - большой набор полезных системных утилит от Марка Руссиновича и Microsoft.
Состав: AccessChk, AccessEnum, AdExplorer, AdInsight,...
Альфа Лэнд - Описание разработчика: "Альфа Лэнд поможет легко управлять деятельностью ТСЖ или ЖСК. Основной задачей программы является оптимизация хранения, поиска и доступа к...
|
Network SCAN soft - (AIO) by xanthux![]() Программное обеспечение для работы и мониторинга сети. Contents: 1.C.C.MAC.Address 2.ProxyPlus.v3.00 3.NETSCAN 4.IPSCAN 5.Bandwidth Monitor 6.CC Proxy 7.Real VNC 8.ShareAlarm 9.ShareWatch 10.SMAC v.20 1.C.C.MAC.Address C Get MAC Address is a handy tool for finding MAC address and computer name from IP address. You can use it to find MAC address, computer name and IP address of a computer on LAN even out of your LAN range. Network administrator can use this handy tool to lookup mac address of each computer on the LAN. Can find out who change his IP or mac address for spoofing. CCGMA is based on Microsoft Netbios technology. If you want to seach a computer's ethernet mac address, you just need to know his computer name or computer ip. That's to say, CCGMA can resolve mac address from IP or computer name. Vice versa, you can find ip address from mac address. CC Get MAC Address also can be used to Wake On LAN. You can use it wake up any computer on your LAN remotely. * Get MAC address from IP address * Get computer name from IP address * Wake On LAN (WOL) * Auto scan MAC address of referred IP range - For networks administrator: you can download CC Get MAC Address application to monitor your networks. WOL (Wake On LAN) This feature is very similar as WOM (Zero Voltage Wake On Modem), but it goes through local area network. To use Wake On LAN function, you must have a network card with chipset that supports this feature, and connect a cable from LAN card to motherboard WOL connector. The system identification information (probably IP address) is stored on network card and because there is a lot of traffic on the Ethernet. Note that, at least 600mA ATX standby current is required to support the LAN card for this function. 2.Proxy+ 3.00 Basic features Supported services Additional features Configuration Hardware and software requirements Free version Running as service in Windows NT License agreement Installation Contacts : Basic features Proxy+ gives the complete solution of access to Internet from LANs. If computer with Proxy+ is correctly set, Proxy+ separate local LAN from Internet with high safety. : Supported services: * HTTP proxy * HTTPS proxy * FTP proxy * FTP gateway * Gopher proxy * Telnet gateway * SOCKS4 and SOCKS5 * Real Audio Proxy * ICP Server/ICP client * DNS Forwarder * POP3/SMTP mail server * Mapped links By using mapped links access to NNTP servers (NEWS) can be realized and so on. : Additional features: * disc cache - support of HTTP 1.1 protocol - validity of HTTP object is verified by asking the originating WWW server (if the object is not fresh enough) - setting of default time-to-live of non-HTTP object in cache with possibility of exclusion of specified URL from caching with possibility to set non-standard time-to-live - wide range of settings - disc file based cache index accelerates cache reloading when Proxy+ starts * HTTP, HTTPS, FTP Proxy and Gopher Proxy protocol cascading (access by using parent proxies) - ICP protocol support (client and server) * dialing on switched telephone line - automatic dialing on demand - automatic hang-up after defined period of user inactivity - automatic dialing for messages - leased line support - support of multiple series of ISP's lines (alternative phone numbers) * managing of users - groups of users allowed - custom local e-mail addresses allowed * mail subsystem allows/supports: - automatic sending and receiving of messages with capability to restrict intervals of automatic activity during week process messages periodically process messages in shorter interval when connection is established process messages in defined time send messages if there is a defined number of mesages ready to send send messages if there is a message which is older than a limit in outgoing queue define actions when Proxy+ can't connect to mail server in Internet sorting of messages by defined sorting rules sorting of local messages POP3 Downloader with many features (leave messages on remote server, POP3 Restrictions,,,) - SMTP mail server with ETRN support. It works fine behind switched phone lines. - mailer masquerade - local domains used for intranet - SMTP authentication (on send and receive) * security - automatic detection of insecure interfaces - access to Proxy+ services from defined interfaces - access to Proxy+ services for defined users - all security violations are logged - restricted access to Proxy+ configuration - Access List feature * configurations - all settings are provided by WWW browser - user customizable error messages * ability to run as service on Windows NT or on Windows 95/98 * other features - State Board which displays status information - Browser Info which shows up information about your browser - utilities Ping and Traceroute built into WWW Admin interface - regular expression support (regular expression debugging utility included) - WWW server for small intranet - custom error messages for HTTPProxy and WWW server service - custom AccessLog.txt logfile format 3.NETSCAN SoftPerfect Network Scanner is a free multi-threaded IP, NetBIOS and SNMP scanner with a modern interface and several advanced features. It is intended for both system administrators and general users who are interested in computer security. The program pings computers, scans for listening TCP ports and displays which types of resources are shared on the network (including system and hidden). In addition, it allows you to mount shared folders as network drives, browse them using Windows Explorer, filter the results list and more. SoftPerfect Network Scanner can also check for a user-defined port and report back if one is open. It can also resolve host names and auto-detect your local and external IP range. It supports remote shutdown and Wake-On-LAN. Key features * Pings computers. * Does not require administrative privileges. * Detects hardware (MAC) addresses even across routers. * Detects hidden shared folders (normally invisible on the network) and write accessible shares. * Detects your internal and external IP addresses. * Scans for listening TCP ports and SNMP services. * Retrieves currently logged-on users. * You can mount and explore network resources. * Can launch external third party applications. * Exports results to HTML, XML, CSV and TXT * Supports Wake-On-LAN and remote shutdown. * It is absolutely free, requires no installation, and does not contain any adware/spyware/malware. 4.IPSCAN Angry IP scanner is a very fast IP scanner and port scanner. It can scan IP addresses in any range as well as any their ports. Its binary file size is very small compared to other IP or port scanners. Angry IP scanner simply pings each IP address to check if it's alive, then optionally it is resolving its hostname, determines the MAC address, scans ports, etc. The amount of gathered data about each host can be extended with the available plugins. It also has additional features, like NetBIOS information (computer name, workgroup name, and currently logged in Windows user), favorite IP address ranges, customizable openers, etc. Scanning results can be saved to CSV, TXT, HTML, XML or IP-Port list file, can be used as a command-line utility in a batch file, etc. With help of plugins, Angry IP Scanner can gather any information about scanned IPs. Anybody who can write code is able to write plugins and extend functionality of Angry IP Scanner. In order to increase scanning speed, it uses multithreaded approach: a separate threads is created for each scanned IP address. 5.Bandwidth Monitor Do you ever wonder how much bandwidth you are using? How fast you are downloading or uploading? Or if you're closing in on your monthly transfer limit? If so Bandwidth Monitor Pro is the utility for you! Detailed logging Supports logging of all your network adapters at once with separate statistics for each adapter. You can go back and check your daily, weekly, monthly, yearly or total transfer. Always control With the small transfer graph placed in the system tray you always have control of your bandwidth usage. Highly customizable Bandwidth Monitor Pro can be customized to display the information you want. You can also change the graph type and colors. Advanced alert system You can set up rules with various actions and conditions. Lets say that you have a monthly transfer limit of 30GB. You can then set up Bandwidth Monitor Pro to alert you when your approaching that limit. 6.CC Proxy It's a web proxy software and it enables you to browse web pages, download files, send and receive e-mail. * It's a web cache proxy and web caching expedites the speed of surfing the net. * The proxy user control provides powerful management functions including seven ways to control the Internet access on the LAN. They are IP address, IP range, MAC address, User Name/Password, IP + User Name/Password, MAC + User Name/Password and IP + MAC. * It's a time schedule proxy software and the time schedule can freely control the users' on-line time. * It can allocate client surfing service respectively. This gives you an authority to open the different proxy services to the different users. Some of them may browse the web pages or send and receive e-mails and others may enjoy all the Internet surfing functions. * It can allocate proxy client bandwidth respectively. The bandwidth control can allocate the different bandwidth to the different users. Thus, it can control the speed of net surfing and occupation of the bandwidth resource of each user and avoid the traffic jam of net, which is caused by some users who try to download files. * Web filter can ban the undesirable sites with unhealthy and irrelevant contents. This proxy software will help you keep the employees concentrate on their work or children stay away from the bad sites. * Access Logging can keep a full set of the Internet access log. * It's a SOCKS Proxy and allows you to use ICQ, MSN Messenger, Yahoo Messenger, CuteFTP and NEC Sockscap. CCProxy is especially suitable for the small to medium sized businesses. Its affordable cost, powerful functions, and easy to use nature plus our prompt technical support make it absolutely different from other Internet sharing software. Top CCProxy Main features * Modem, Cable Modem, ISDN, ADSL, Satellite, DDN and so on are supported(more). * HTTP, FTP, Gopher, SOCKS4/5, Telnet, Secure (HTTPS), News (NNTP), RTSP and MMS proxy are supported. * Port Mapping is supported. * Web cache can enhance browsing speed. The size and refresh time of cache can be freely changed. * Bandwidth control flexibly manages the traffic condition of clients. * Time schedule can freely control the clients' on-line time(access time control). * Web filter can ban the specified web sites or contents. Also can name specific web sites for browsing. * URL filtering prevents users from downloading files with designated extended name via IE. * Seven types of account authentication: IP address, IP range, MAC address, User Name/Password, IP + User Name/Password, MAC + User Name/Password and IP + MAC. * Parent proxy function enables CCProxy to access the Internet via another proxy. * Dial-On-Demand, remote dial up and auto disconnect are supported. * Access Logging can keep a full set of the Internet access log. * Enable IE, Netscape to access the Internet through HTTP/Secure/FTP (Web)/Gopher. * SOCKS5 proxy support allows use of ICQ, MSN Messenger, Yahoo Messenger, CuteFTP, CuteFTP Pro and WS-FTP. * Mail proxy supports Outlook, Eudora etc. * Supports NetTerm accessing the Internet via Telnet proxy. * Supports Outlook connecting to the News server via News proxy. * Support SOCKS5 and web authentication. * Support for Real Player RTSP proxy and Media Player MMS proxy. * Built-in DNS can resolve domain names. * Win98/WinMe/WinNT/Win2000/WinXP/Win2003 compatible. * Flow Stats. 7.RealVNC VNC stands for Virtual Network Computing. It is remote control software which allows you to view and fully interact with one computer desktop (the "VNC server") using a simple program (the "VNC viewer") on another computer desktop anywhere on the Internet. The two computers don't even have to be the same type, so for example you can use VNC to view a Windows Vista desktop at the office on a Linux or Mac computer at home. For ultimate simplicity, there is even a Java viewer, so that any desktop can be controlled remotely from within a browser without having to install software. VNC is in widespread active use by millions throughout industry, academia and privately. There are several versions to choose from, including a free version and some substantially enhanced commercial versions. 8.ShareAlarm ShareAlarm is a network tool that allows network administrators and users easily perform network shares monitoring. Using ShareAlarmPro you can monitor users attempting to access secured shares and confidential files, detect and log network access to shared folders, monitor security events, monitor accessed files, disconnect users from open files or deny network users access, monitor sharing permission changes. ShareAlarmPro includes intrusion detection system based on security events log analyzer. Security Event Log Monitor monitors the security event logs of Windows NT/2000/XP servers or workstations and notifies user on selected events detection. This software also provide you ability to manage and monitor all shares on your workstation, disable or enable default administrative shares, hide your workstation in network, view how many users are currently connected to each shared resource on your workstation. ShareAlarmPro also allows you to easily browse your LAN and view all shared resources no meter they are hidden or not and connections to shared resources on remote workstations. The program has firewall system that allows you to block any unwanted connection to your shared resources. ShareAlarmPro also monitors your shares permissions and alerts if “Everyone”, “Domain Users” or other selected broad access group is added to the permissions of a share. With ShareAlarmPro you can monitor files or folders creation, deletion or any attribute change in your shares. Using ShareAlarmPro you can collect all alarms in a central place so several shares on multiple servers can be monitored from a single location. Program keeps log for all detected events (access to shared folders, security events, folder watcher events) in HTML format. 9.ShareWatch ShareWatch allows you to see who is connected to a computer and what files they are accessing. Have you ever wondered why your hard drive or modem is active, but you aren't doing anything to cause it to be active? It is possible a remote user is accessing your computer. Have you ever had a file locked but you don't know why? ShareWatch can tell you if a network user is using the file and allows you to disconnect them so that you can edit/delete the file. Have you ever wanted to shutdown a computer, but don't want to disconnect people using the computer. ShareWatch will show you all resources in use and by what users. 10.SMAC v.20 SMAC is a powerful, yet an easy-to-use and intuitive Windows MAC Address Modifying Utility (MAC Address spoofing) which allows users to change MAC address for almost any Network Interface Cards (NIC) on the Windows VISTA, XP, 2003, and 2000 systems, regardless of whether the manufacturers allow this option or not. SMAC does not change the hardware burned-in MAC addresses. SMAC changes the "software based" MAC addresses, and the new MAC addresses you change will sustain from reboots. SMAC helps people to protect their privacy by hiding their real MAC Addresses in the widely available wifi Wireless Network. SMAC also helps Network and IT Security professionals to troubleshoot network problems, test Intrusion Detection / Prevention Systems (IDS/IPS,) test Incident Response plans, build high-availability solutions, recover (MAC Address based) software licenses, and etc... SMAC is the first Windows MAC Address Modifying Utility (since 2002), and it is developed base on the extensive research of KLC Consulting, Inc. SMAC is continuous updated with the latest trend in the networking and security, as well as valuable customers' wishes and feedbacks. SMAC is created and maintained by Certified Information Systems Security Professionals (CISSP), Certified Information Systems Auditors (CISA), and Microsoft Certified Systems Engineers (MCSE), and professional software engineers. With combined efforts, SMAC is well designed to be an user-friendly tool for both the technical and non-technical users. 66.9 MB Download/Скачать Rar pass: www.warezsoft.ru
источник:
|
Полный текст
|
12:20 17 июля
Другие посты блога на эту темуЕсли вы уже заскучали в эти долгие выходные дни - у Nubia есть, чем вас порадовать. Это презентация нового игрового смартфона Nubia Red Magic 3. Что особенного Главная особенность смартфона - это его система охлаждения. Внутри установили настоящий кулер, как на компьютерах и ноутбуках, который следит за температурой 'сердца' устройства - процессора Snapdragon 855...
полный текст | 15:40 29 апреля
На ресурсе Slashleaks появились официальные пресс-рендеры складного смартфона Motorola Razr. Что показали Изображения подтверждают предыдущие утечки об устройстве. Новинка, как её предшественник, получит форм-фактор 'раскладушки'. Смартфон оснастят гибким широкоформатным экраном с вырезов для датчиков, динамика и фронтальной камеры...
полный текст | 15:40 29 апреля
Несмотря на то, что до анонса Galaxy Note 10 ещё далеко в сети продолжают появляются подробности о новинке. Что на этот раз Китайский инсайдер Ice Universe сообщил, что одна из четырёх моделей смартфона с номером N975 получит энергоёмкий аккумулятор на 4500 мАч. Речь идёт об LTE-версии Galaxy Note 10 Pro. Естественно, новинка будет поддерживать быструю зарядку...
полный текст | 15:40 29 апреля
Инсайдер OnLeakes, совместно с изданием Cashkaro, продолжает публиковать качественные изображения будущих iPhone 2019. Что показал На этот раз, вместе с iPhone XI, инсайдер показал ещё iPhone XI Max. Он также, как и младшая модель, внешне будет отличаться от своего предшественника лишь наличием тройного модуля основной камеры...
полный текст | 15:40 29 апреля
Наверняка, некоторые наши читатели слышали про компанию Realme. Это суббренд Oppo, который продаёт недорогие устройства, в основном на индийском рынке. Производитель недавно анонсировал свой флагманский смартфон Realme 3 Pro. После его презентации, журналистам GSMArena удалось пообщаться с генеральным директором компании...
полный текст | 15:40 29 апреля
Учёные согласились и писателем-фантастом Л. Спраг де Кампом и теперь заговорили об эволюционном происхождении мифической рептилии. Лох-Несское чудовище, пожалуй, наш самый известный морской монстр, известный тем, что топит местных жителей перед святыми и избегает мотоциклов в своём походе обратно к озеру...
полный текст | 00:42 29 апреля
Драконье яйцо просыпается на краю пропасти и содрогает Землю. Планета Х запустила цепь непрекращающихся землетрясений от Индонезии до Камчатки. Китай и РФ могут уйти под воду, считают уфологи. Землю продолжает трясти. Сегодня снова зафиксированы мощные землетрясения на Дальнем Востоке РФ, в КНР, Индонезии и на Филиппинах. Индия и Тибет до сих пор приходят в себя после вчерашних толчков...
полный текст | 00:42 29 апреля
'Не исключено, что все мы - научный проект инопланетного разума', - сказал конспиролог. Буквально вчера в СМИ начали обсуждать заявление оксфордского профессора по поводу реального существования инопланетян на Земле...
полный текст | 00:41 29 апреля
Эксперты подсчитали приблизительную дату, когда Планета Х сблизится с Землёй на достаточное расстояние, чтобы вызвать массу катаклизмов. У человечества осталось лишь пять лет до неминуемой гибели, из-за чего все страны стремятся ускорить колонизацию Марса и Луны...
полный текст | 00:41 29 апреля
Экипаж станции использует 3D-принтер и клетки животных, чтобы создать образцы рыбы и мяса. Группа ученых России, США и Израиля разрабатывают специальную программу, чтобы в начале осени отправить на Международную космическую станцию образцы клеточного материала рыбы и мяса. Специалисты из Израиля предоставляют мышечный материал крупного рогатого скота, а из США - клетки определённых видов рыб...
полный текст | 00:41 29 апреля
|
|
Все программы на сайте являются бесплатными (freeware) или демонстрационными (shareware)
и распространяются свободно в сети интернет. Дистрибутивы софта, описания и скриншоты программ
взяты с сайтов разработчиков. Администрация сайта не несет ответственности за прямой,
непрямой или любой другой ущерб, полученный в результате использования материалов сайта SoftP.ru.
При использовании материалов сайта прямая ссылка на сайт
www.softp.ru обязательна.
|