Show all posts by user

Re: How to get MAC-addresses displayed

4 years ago, by Ann in Network Scanner Forum

Unfortunately you didn't provide much details about what you are doing, so I can only give you a general advice. If you are scanning the current subnet, make sure the ARP query lookup method is enabled under MAC resolution in the Options, on the Additional tab: If you are scanning a different subnet, try ticking Allow ARP outside current subnet on the General tab: Also, you may l

Re: Monitoring the performance of the RAM Disk

4 years ago, by Ann in RAM Disk Forum

This depends on what you want to get: If you just need some once-off performance figures, you can simply run any regular disk speed test, like CrystalDiskMark or HDTune, and then compare the figures with your regular HDDs. If you want to monitor the real I/O throughput of your applications with Performance Monitor, you need to enable the Hard Disk Emulation in the RAM Disk's settings. This will s

Re: Measuring bandwidth between IP address ranges

4 years ago, by Ann in Bandwidth Manager Forum

You may want to try our Bandwidth Manager product. It can monitor the throughput between any sets of IP addresses, ports, etc. It will not however report latency, as it cannot be measured without periodic active testing.

Re: What would happen if a device changes its IP address?

4 years ago, by Ann in WiFi Guard Forum

WiFi Guard identifies devices by MAC addresses. So if you mark a device as "known", it should retain its status even if it later uses a different IP address. WiFi Guard displays IP addresses to help users to distinguish devices, but, depending on your device and network settings, IPs may change quite frequently. Some devices can even have multiple IP address at the same time - WiFi Gu

Re: "Not a valid ISO datetime" error

4 years ago, by Ann in Bandwidth Manager Forum

It looks like there was a bug that only manifested on certain locales (like Javanese) where the time separator is a dot, or some other locally-specific symbol, instead of the commonly used colon. We have just fixed that in the latest build. Please download, install over your current installation, and the problem should be gone.

Re: The RPC Server is Unavailable

4 years ago, by Ann in Network Scanner Forum

The RPC (Remote Procedure Call) server error appears when some of the RPC-related services are not functioning properly. This is not caused by network scanning per se. It is usually related to disabled file or printer sharing, network connection interruptions, RPC-requested traffic being blocked by the firewall, or corrupted registry files. Here a quick overview of what can be wrong and how it

Re: RAM Disk for Linux

4 years ago, by Ann in RAM Disk Forum

Our RAM Disk supports Windows only. Linux has built-in RAM disk features. Please see this article for details: How to create RAM disk in Linux.

Re: Can't find the window to enter my licence key in

4 years ago, by Ann in RAM Disk Forum

Unfortunately versions 3.4.7 and the latest (4.0.9) are not compatible for installing one over another. The simplified update procedure, which allows users to update RAM Disk by simply installing a newer version over an older one and rebooting, has been added to RAM Disk from version 4.0 onwards. Installing new RAM Disk software without uninstalling an older version below 4.0 leads to the s

Re: Entry Point Not Found (api-ms-win-crt-runtime-l1-1-0.dll)

4 years ago, by Ann in Network Scanner Forum

Our Network Scanner is not written in C++ and has no run-time dependencies. In fact, it doesn't depend on anything other than the standard system DLLs, and wpcap.dll for WinPCap packet capture used only in certain features. The issue you describe is a very infrequent one. I can recommend the following to resolve it: (Re)Install Visual C++ 2015 run-time. If that doesn't help, run Dependency

Re: List of proxies with port numbers

4 years ago, by Ann in Network Scanner Forum

Yes, the asterisks are a limitation of the free demo version. You would need to purchase a licence to remove this restriction. As I said before, our product is not exactly a proxy discovery tool. The setting you mentioned will find open ports, but those are not guaranteed to be proxy ports, or that they will accept proxy connections. You could either use the Remote Script feature and use a

Re: List of proxies with port numbers

4 years ago, by Ann in Network Scanner Forum

Network Scanner is not exactly a proxy discovery tool. Yet if you are simply scanning public addresses for certain open ports, this can be done as follows: Run a scan of an address pool, to check whether TCP ports of interest are open. Once the scan is completed, filter out devices without open ports: open Setup Filter (Ctrl + I), and there set "TCP Ports" as "Not Empty". S

Re: High spikes of CPU and RAM usage

4 years ago, by Ann in NetWorx Forum

It sounds like you are using the "Ignore local traffic within the LAN" setting. When it is enabled, NetWorx has to filter every network packet and keep a list of connections for tracking. This may result in higher processor and memory usage. In your case, when, as you said, a lot is going on your Windows 7 computer, the CPU and RAM demands are very high. When pushed to extreme, towar

Re: Application data usage reporting on macOS

4 years ago, by Ann in NetWorx Forum

If you had only computers running Windows, you could install NetWorx on them and activate the "Ignore local traffic within the LAN" option (only Windows version has this functionality). This would enable per-application reporting and give you a good idea what's using most of your data. If you have other devices, like macOS computers, phones, tablets, gaming consoles or smart TV, unfo

Re: Large size of database/log file NetWorx.db

4 years ago, by Ann in NetWorx Forum

Alex, I'm sorry to hear that the preliminary build fix did not fix the issue for you. Database in excess of 7GB is a very large file to process, and it is possible that either you or some process on your computer terminated the optimisation before it completed, causing the error you see. We will see what other approach we can take for the next release. Your situation is a bit unusual, as NetWor

Re: Feature suggestion: report requested IP or website for each application

4 years ago, by Ann in NetWorx Forum

That's an interesting idea. Please allow us some time for implementation. We will let you know when a test version is ready.

Re: Windscribe VPN

4 years ago, by Ann in NetWorx Forum

This happens because Windscribe installs its own virtual adapter. So if you have set NetWorx to monitor All Connections, the traffic is recorded twice, resulting in double usage figures. To resolve this issue: Either choose your specific network adapter under Monitored interfaces (generally this option is preferable, as it works regardless VPN being connected or not); Or choose the Windscrib

Re: Using variable IP address in OID

4 years ago, by Ann in Network Scanner Forum

This isn't possible in the current official release, but it has been added to the latest preliminary build. For IP address and MAC address substitutions, use the following in OIDs: %0 for IP address bytes %1 for MAC address bytes If you wish to use this feature right now, simply download the latest build, add 1.3.6.1.2.1.4.20.1.3.%0 as your OID, and the Network Scanner should retrieve the

Re: Scanning WMI for TPM

4 years ago, by Ann in Network Scanner Forum

Fantastic! Thank you for the feedback.

Re: Handling output for multiple error messages

4 years ago, by Ann in Network Scanner Forum

It would not be easy to use a regular expression here since there are many possible error messages. What you could do instead as add the following line at the beginning of your script: On Error Resume Next This will silently absorb all execution errors. You may still need to handle some errors in the code, depending on what exactly the script is doing. Alternatively, you could set up a di

Re: What do "2 x USER" and "2 x SID" mean?

4 years ago, by Ann in Network Scanner Forum

This simply means there was more than one logon session (which is common when a service process runs under a user account). You can use this utility to see all logon sessions.

Re: Scanning WMI for TPM

4 years ago, by Ann in Network Scanner Forum

It looks like access to that namespace requires an encrypted connection (with PacketPrivacy enabled). We added it in the latest release. Please try ticking the new Encrypted connection setting as shown in the screenshot below. It should now be able to extract TPM information.

Re: Right click on the tray icon displays the graph window

4 years ago, by Ann in NetWorx Forum

Thank you for the feedback. Regarding the bug when 'Always on top' is disabled, it seems to be some kind of a side effect, in that right-clicking the icon also brings up the graph (something that Windows does behind the scenes). A right-click is only supposed to open the menu and nothing else. The best way around probably would be to have "Always on top" enabled, and assign "Usage g

Re: Some applications are not shown in logs

4 years ago, by Ann in NetWorx Forum

In its default configuration NetWorx displays top 20 apps and web-sites by usage, but you can easily change that to a higher number or to show them all. To do that, open the Hidden Options. There is Top applications and web-sites parameter near the bottom of the list. You can set it either to a higher number, or to 0 to see all recorded applications and web-sites.

Re: Setting priority for VoIP traffic

4 years ago, by Ann in Bandwidth Manager Forum

While Bandwidth Manager doesn't support prioritisation, you may be able to handle all VoIP traffic in a separate rule with unlimited bandwidth. You could try making a rule like this and placing it at the top of your ruleset (it has to be the first rule): Source: IPv4 Range: 192.168.100.1 - 192.168.100.254 Destination: Any Rate: Unlimited Protocol: IPv4 based In the Add/Edit Rule window f

Re: Connection Emulator for Android or iOS

4 years ago, by Ann in Connection Emulator Forum

No we don't have Connection Emulator for Android or iOS. I don't think it's even possible without root since all apps run in a sandbox. However if you are looking into testing a mobile app with latency and poor networking conditions, it's usually done with the Windows version set up like this: <Internet> - <PC with Windows and Connection Emulator> - <WiFi Access Point> - &

Re: How to clear out MAC addresses

4 years ago, by Ann in Bandwidth Manager Forum

Yes, there is. Simply select Rules - Reset All Rules in the main menu. This will delete all usage records and all learnt MAC addresses, and give you a fresh start.

Re: How to get a missing/hidden column back

4 years ago, by Ann in WiFi Guard Forum

When you were shrinking the column, the column's width could have been set to zero, and the column thus became invisible. This should be easy to fix. Close WiFi Guard if it's running. Download SQLiteSpy. This will allow you to open and edit WiFi Guard's database file. Launch SQLiteSpy and go to File - Open Database and enter %LOCALAPPDATA%\WiFi Guard\WiFi Guard.DB You will see four table

Re: Can't update MAC-address database

4 years ago, by Ann in Network Scanner Forum

There is probably an issue with the Internet connection or a proxy server. You can instead download that file here or here and and place it in %APPDATA%\SoftPerfect Network Scanner

Re: How to make NetWorx display download/upload numbers in the taskbar

4 years ago, by Ann in NetWorx Forum

That's pretty odd as NetWorx is generally well-tested and should work on any machine. I am guessing the reason your NetWorx icon shows nothing is in how it was configured. There two related options: A setting under Settings - Graph - Graph in tray icon. Once activated, the static icon will be replaced with animated bars or lines representing traffic usage. An extension called a desk band, and t

Re: Difference between image types: Volume and Hard Disk

4 years ago, by Ann in RAM Disk Forum

The Volume image can be used with RAM Disks that have the "Hard Disk Emulation" option OFF. This will create a simple volume image. The Hard Disk image can be used with RAM Disks that have the "Hard Disk Emulation" option ON. This will create an image with partitions required for hard disk emulation. If you aren't planning to use hard disk emulation, choose the Volume image