Show all posts by user

Re: How to apply latency between specified IP addresses

3 years ago, by Ann in Connection Emulator Forum

It seems the issue is that your VLAN ID tag set to 1: <vlanid>1</vlanid> This feature is for rare cases where network packets carry VLAN tags. Normally these are stripped by switches and there is no need to specify one. Try setting the VLAN ID to zero in the filter settings, and you should be able to see the traffic.

Re: How to apply latency between specified IP addresses

3 years ago, by Ann in Connection Emulator Forum

Does the traffic between those IP addresses actually flow through the connection that you are using the Connection Emulator on? If you have device A and device B, and run the Connection Emulator software on device C, then A's and B's traffic must be routed via C. Otherwise the emulation will not work.

Re: How to get device information in different subnets

3 years ago, by Ann in Switch Port Mapper Forum

This is normal behaviour: When MAC address mapping is done in the same subnet, the software can ARP-scan the entire IP address range and map MAC addresses to their respective IP addresses. When MAC address mapping is done in a different subnet, the above method won't work because the ARP protocol is not routable and only works in the local subnet. To overcome this issue, it is possible to sp

Re: Unloading persistent log-on RAM disks at log-off

3 years ago, by Ann in RAM Disk Forum

Indeed the RAM Disk application is not exactly designed for the scenario where each user has their own RAM disk and image file. Like you mentioned, it can be automated with some command line parameters. Or simply consider an alternative product that allows per-user configuration.

Re: Unloading persistent log-on RAM disks at log-off

3 years ago, by Ann in RAM Disk Forum

What you describe sounds like normal behaviour if I understood your steps correctly: You created an image-based RAM disk as user A, then logged off. You logged on as user B and found that user's A RAM disk was there. The disk is not specific to any user, i.e. a logon-time disk will be mounted for any user that logs on. So what has happened is this: User A logged off, all data saved to the

Re: MAC and IP info is missing in Cisco Catalyst switches

3 years ago, by Ann in Switch Port Mapper Forum

Thank you for the output file. We have checked it, and this switch seems to only list a few MAC addresses, namely: .1.3.6.1.2.1.17.4.3.1.1.120.188.26.13.45.175,OctetString, 78 BC 1A 0D 2D AF .1.3.6.1.2.1.17.4.3.1.1.120.188.26.13.45.176,OctetString, 78 BC 1A 0D 2D B0 .1.3.6.1.2.1.17.4.3.1.1.120.188.26.22.160.175,OctetString, 78 BC 1A 16 A0 AF .1.3.6.1.2.1.17.4.3.1.1.120.188.26.22.160.176,Octe

Re: MAC and IP info is missing in Cisco Catalyst switches

3 years ago, by Ann in Switch Port Mapper Forum

This suggests the MAC address assignments may not be present in SNMP tables, or are in a format that the Port Mapper did not understand. Would you be able to run snmpwalk against your switch, dump the complete SNMP tree to a CSV file and send it to us?

Re: Unloading persistent log-on RAM disks at log-off

3 years ago, by Ann in RAM Disk Forum

Normally, if you have a logon-time RAM disk with an associated image, it is populated from that image when a user logs on. If the 'Save Contents to Image' option is enabled in the disk's properties, any changes are written back to the image file when the user logs off, and then the RAM disk is destroyed. It seems however that in some cases Windows may kill the RAM Disk application upon logoff b

Re: LAN transfer monitoring

3 years ago, by Ann in NetGenius Forum

That is correct: NetGenius ignores local file transfers (also knows as file sharing, Server Message Block, or SMB protocol), because: Windows does not assign this traffic to specific applications. This traffic does not consume Internet data. These transfers do not normally affect user privacy or security.

Re: Background transparency in the floating graph

3 years ago, by Ann in NetWorx Forum

To change the transparency of the graph background only, open the Hidden Options, scroll to the Transparent graph background and set it as you like. QuoteNetWorx User Manual Transparent graph background renders the graph background colour as transparent. Any mouse events in transparent areas will be passed through to the windows and objects underneath the graph.

Re: Background transparency in the floating graph

3 years ago, by Ann in NetWorx Forum

Do you mean a semi-transparent graph like this? If so, it can be achieved by adjusting the Window opacity, % value in the Graph Settings.

Re: How to get the switch name

3 years ago, by Ann in Switch Port Mapper Forum

If you mean that device names are blank after you discover new switches, please make sure you have ticked one or more columns in SNMP Device Discovery window. The ticked columns will be used to form device names. We added this selection functionality to provide flexibility and let users choose how they want to name their devices.

Re: RAM Disk for Windows XP

3 years ago, by Ann in RAM Disk Forum

You can download version 4.0.9. It is the last one that supports Windows XP. However please keep in mind that there have been several improvements and security fixes since then.

Re: Batch scripting for capturing timestamp

3 years ago, by Ann in Network Scanner Forum

In that case, still enable the Show last scan and last seen time option highlighted in the screen shot above, and optionally export the configuration to a file. Use that configuration file with your command-line scanning, and the 'Last scan' column will essentially be the time stamp: netscan.exe /auto:"z:\output.csv" /config:z:\last-scan-on.xml The output will be like this: "I

Re: How to get the switch name

3 years ago, by Ann in Switch Port Mapper Forum

In version 3.1 the switch name was moved to a separate column. It may first appear as the rightmost column, but you can move it anywhere within the view, as shown below. And if it isn't displayed for you for some reason, please check View - Columns - Switch in the main menu.

Re: Batch scripting for capturing timestamp

3 years ago, by Ann in Network Scanner Forum

You can enable the Show last scan and last seen time in Options - General tab, as shown in the picture below. After you do that, there will be two extra columns with time stamps, which will be also exported to a CSV file.

Re: Launching an executable on detection

3 years ago, by Ann in WiFi Guard Forum

At the moment no parameters are passed, and the executable is only launched once per scan regardless how many devices were detected, as long as there is at least one detection. We haven't found a clever way of passing multiple rows of data, but it's possible to extract and use it with sqlite3 from sqlite-tools. You could execute a batch script with something like this, which will dump all unkno

Re: Phone repeatedly being detected as an unknown device

3 years ago, by Ann in WiFi Guard Forum

If WiFi Guard has detected a device, it means the device is connected already. It looks like in your case the device randomly changes its MAC address, which is common for mobile phones. Both iOS and Android devices randomise their MAC addresses for privacy reasons. So in your Samsung Galaxy phones the MAC address is by default randomised and this address is used instead of the device MAC address.

Re: Exported device list: true/false in Info column

3 years ago, by Ann in WiFi Guard Forum

In the CSV file export the "Info" column contains values that are either TRUE or FALSE: 'True' means the device has been marked as known (shown in green in the application interface). 'False' means the device is unknown (shown in red). We have just renamed that column into "Known Devices", to make its meaning clearer. Now the exported device list looks like this: Known

Re: Advantages of SoftPerfect RAM Disk

3 years ago, by Ann in RAM Disk Forum

Thank you for the compliments Alfredo. It is always nice to hear that users appreciate our efforts.

Re: LAN transfer monitoring

3 years ago, by Ann in NetGenius Forum

This is not a bug. The LAN file copy is not monitored by NetGenius intentionally. The way Windows is designed, this type of traffic originates from the SYSTEM process and is usually local (not Internet). So we decided to ignore it in NetGenius, as it can't be attributed to a specific application.

Re: Suggestion: Limit the quantity of email notifications

3 years ago, by Ann in WiFi Guard Forum

Thank you for your feedback. We have updated WiFi Guard so that it does not send duplicate e-mails. Now, if WiFi Guard detects the same set of unknown devices over several runs, it will only send one e-mail. If the set of unknown devices changes, it will send another e-mail. The update can be downloaded here.

Re: Using WiFi Guard in multiple locations

3 years ago, by Ann in WiFi Guard Forum

To use WiFi Guard in multiple locations, you can simply use its portable edition. In this case, the application itself and its database (including the known devices list) could sit in a folder in your Google Drive or a USB flash drive, and you would be able to use it anywhere you go.

Re: Different disk size when created by RAM Disk and when formatted by Windows

3 years ago, by Ann in RAM Disk Forum

Great, we will include these changes in the next release. Once again, thanks for helping us make the product better.

Re: Different disk size when created by RAM Disk and when formatted by Windows

3 years ago, by Ann in RAM Disk Forum

The reason for this space discrepancy is that the exFAT support was implemented in our RAM Disk before Microsoft published exFAT specs. So the implementation was mainly based on educated guesswork and experience, and to be on the safe side we allocated more space for file system structures. Now that MS has published the specs, we reviewed the code and implemented a more compact FAT table. In ou

Re: Maximum throughput limit

3 years ago, by Ann in Bandwidth Manager Forum

There are many factors that affect the maximum throughput, from CPU performance to network card drivers and the number of rules. It is best if you test the software in your environment to see what can be achieved in your particular case. Generally you can expect up to 300 Mbps per server, and this cannot be parallelised. Having said that, in the latest version 3.2.11 we have done a number of op

Re: Large disk with small allocation unit size cause corrupt exFAT file system

3 years ago, by Ann in RAM Disk Forum

Thank you for reporting this. The exFAT formatting issue has been fixed, for both 2K and 4K clusters. You can download the update here. The problem was due to incorrect FAT bitmap creation for larger FAT tables -- exactly what happen in the case of a large drive with a small cluster size.

Re: Where WiFi Guard settings are stored

3 years ago, by Ann in WiFi Guard Forum

It's in C:\Users\<UserName>\AppData\Local\WiFi Guard\ Alternatively, you can create a backup via All Devices - Export and save it to an XML file. This backup can be restored via the corresponding Import command.

Re: NetworX Security Alarm Help

3 years ago, by Ann in NetWorx Forum

We are a software development company called SoftPerfect. We create software applications for network administrators, business professionals and home users, and we have no connection to security alarms or any other goods or services outside of the software development field. NetWorx is the name of one of our software products, created almost 20 years ago for keeping track of Internet traffic us

Re: Choosing size and file system for RAM disk and/or RAM disk image

3 years ago, by Ann in RAM Disk Forum

When you are creating a volatile RAM disk (i.e. the one that will be used without an image file and will have all its contents lost every time you reboot or power off your computer), you should leave the image file name field empty in its settings, and instead specify its size and the file system. The disk will be created based on the set size and file system. When you are creating a persistent