Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

NetPeeker

Stop those endless popup windows when you surf on the Internet. It works with all web browser. It can even kill those "flying little windows". No change to proxy setting.

Distributed network traffic monitor:

  • Display real time network traffic speed for every computer in the network (Group Edition).
  • Display all active network applications on any computer in the network (Group Edition).
  • Display all sessions and listen to all ports for any active network application.
  • For service shared in svchost.exe, display real service name instead of just "svchost.exe"
  • Display application properties and loaded modules.
  • Support "Internet Connection Sharing (ICS)", and can monitor network usage of ICS clients without installing the NetPeeker agent in the clients.
  • Can monitor NETBIOS file transfer, which is copying shared files inside a local network.
  • Use "WHOIS" service to get detailed information on selected remote IP addresses and domain names.

Desktop based firewall on all computers:

  • Integrated system firewall and application firewall.
  • Support rules on applications, IP addresses/port numbers, remote country, DNS names, protocol types, and HTTP URLs.
  • Rule-Exception mode rule structure for easier setup and understandable rule relations.
  • Support rule schedule, and can specify the effective time range for every firewall rule.
  • Fast firewall engine which can handle thousands of rules without performance impact.
  • Drop invalid network packets.
  • Detect and block port scans, SYN floods, and DOS attacks.
  • Stealth mode to hide your computer from hackers.
  • Support importing spyware rules from BlueTack or Sponge, which have excellent anti-spyware rule lists
Rating
0 vote
Favoured:
0

Listing Details

Vendor
eMing Software Inc
Website
Visit the Product Site
Pricing Model
Freeware
Modified
2015-01-23
Owner
michelemjordan
Created
2006-05-12
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
    • - Endpoint Anti Spam
    • - Endpoint Anti Spyware
    • - Endpoint Anti-Virus
    • - Endpoint Forensics
    • - Endpoint Device Control
    • - Full Disk Encryption
    • - Desktop Firewall Software
    • - Host IDS
    • - Host IPS
    • - Host DLP
    • - Application IDS
    • - File Integrity Checkers
    • - VPN Clients
    • - Content Filters
    • - Mobile Devices
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message