Описание: IP Traffic Monitor - there are many reasons why you may want to monitor your Internet traffic flows. I'll point out only a few of the most popular reasons. No anti-virus can guarantee you 100% protection from Trojan Horses and malicious spyware or adware programs. Some of them are highly customized and checking against anti-virus databases does nothing. They also slow down your Internet connection. Needless to say that identity theft or using your computer as a peer-to-peer network hub for pirated software, music and video downloads without you even knowing about this may certainly have unwanted consequences. If you share your computer with family members or you administer computers in your office, knowing the Internet traffic details becomes essential. Network load balance, security reasons and more...
Recently I've come across a wonderful utility that serves just this purpose. IP Traffic Monitor sits in your system tray and monitors all your network connections. You can either monitor the active connections in real-time or browse historical logs. The program shows extensive information about each connection: remote host IP, remote host name (if available), amounts of incoming and outgoing traffic through this connection, timestamps of the first and last activity of this connection, name of the process that initiated or accepted this connection, full path to the application the process belongs to, etc. The traffic summary indicator shows an upload and download speed graph and traffic totals. In addition it draws pie chart diagrams that illustrate the percentage of certain hosts in the total incoming and outgoing traffic.
It would be naive to expect packet sniffer functionality from a $20 utility. Yet, IP Traffic Monitor includes a full-featured sniffer. You can easily capture and analyze TCP packets. Captured packets can be saved to a log file or analyzed in place. For example, you can analyze HTTP requests including passwords and other data that is sent to servers from your PC.
Загрузить IP Traffic Monitor 2.2 на softforfree.com
Winpulse 0.5.3 - Windows resources monitor. Indicators: Drives space, RAM size, Swap size, CPU load, GDI/USER resources, Audio volumes, User name, Host name, Clock, Operating System name, System live time, Screen resolution, Battery Meter, Quick Run, Keyboard Language, Pi
Network Monitor Lite - Network Monitor - network monitoring software packet sniffer, traffic data analyzer, network data logger and protocol analyzer utility for windows. Software tool can capture internet protocols performing tcp/ip, udp/ip communication traffic analysis
Network Monitor Professional - Network Monitor - network monitoring software packet sniffer, traffic data analyzer, network data logger and protocol analyzer utility for windows. Software tool can capture internet protocols performing tcp/ip, udp/ip communication traffic analysis
TCP/IP. Для профессионалов. 3-е изд. - Главной особенностью этой книги является то, что материал в ней изложен с позиций, не связанных с программированием. Авторы рассказывают о том, как работает протокол
IP Sub-networking - Этот документ описывает зачем и как сделать подсеть IP сети - которая использует свои адреса класса A, B или C, чтобы корректно работать с несколькими взаимосоединенными
Microsoft Network Monitor 3.0.372.1 - Релиз новой версии программы для мониторинга и анализа сетевой активности от компании Microsoft. Microsoft Network Monitor 3.0.372.1 позволяет производить сбор данных
Interface Traffic Indicator 22.214.171.124, Just Monitoring - Theres a really simple idea lying under the Interface Traffic Indicator software, yet the software built on the idea is excellent. The idea is: You have a computer, or a network, where youd want to monitor the amount of the network traffic. It can be done in many different ways with
Connection Monitor - all you need to know about your network traffic - Although most people don’t care about their Internet connection until it goes down, there are users out there who need to know everything about incoming and outgoing traffic. These people may have their own servers or services that consume paid traffic or may be using Internet access plans with bandwidth or traffic limitations