Show all posts by user

Re: Installation via CLI

2 years ago, by Ann in NetGenius Forum

You see those Windows UAC dialogs because the uninstaller (same as the installer) needs administrative privileges for writing in C:\Program Files. This can be solved by launching the uninstaller as administrator.

Re: Lookup monitor information

2 years ago, by Ann in Network Scanner Forum

It could be the firewall or WMI settings, but for some reason the client computer can't connect to the target WMI system. Here is a troubleshooting guidance for "WMI - the RPC server is unavailable".

Re: Lookup monitor information

2 years ago, by Ann in Network Scanner Forum

You can extract information about connected monitors by enabling the Lookup monitor information option at the Additional tab in Options: Alternatively, monitor information can be extracted from the WmiMonitorID class in the WMI namespace, in WMI Query Builder: This is a sample output:

Re: Installation via CLI

2 years ago, by Ann in NetGenius Forum

For unattended uninstall please use this command: C:\Program Files\NetGenius\unins000.exe /SILENT /NORESTART Note that there will be a user prompt about removing settings and data. To prevent this message box from being displayed, please install over the latest build. In that latest build, you can use the /SUPPRESSMSGBOXES parameter like this: "C:\Program Files\NetGenius\unins000.ex

Re: Access violation error when trying to connect remotely

2 years ago, by Ann in NetGenius Forum

That's an odd error and the referenced memory address doesn't seem valid. It is likely that the EXE file was corrupted. Try downloading a fresh copy of NetGenuis and installing it over.

Re: Installation via CLI

2 years ago, by Ann in NetGenius Forum

It would be this command line: netgenius_setup.exe /COMPONENTS="svc" /SILENT This will only install the service component, i.e. without GUI.

Re: Reasons for a low speed of a RAM disk

2 years ago, by Ann in RAM Disk Forum

We will run some tests with our Xeon-based machine in a few days to see if there is a way to improve the performance. In the meantime, would you be able to run CrystalDiskMark and PassMark PerformanceTest on your machine to compare? Below are the test results from a modern laptop where our RAM Disk demonstrated speeds of 80-90% of the maximum rates from PassMark, but we are still interested in

Re: How to turn off display of inactive IPs

2 years ago, by Ann in Network Scanner Forum

It is the Display inactive devices checkbox, accessible by going to Options - Program Options in the main menu, and then the General tab.

Re: How to create a ping delay for online gaming

2 years ago, by Ann in Connection Emulator Forum

This must be because your game is using so-called ICMP to measure ping rather than UDP as transport protocol. NetGenius only applies latency to TCP and UDP, whereas Connection Emulator applies latency to everything, including ICMP. Which means you are right, the Connection Emulator is the product you need for your game.

Re: Reasons for a low speed of a RAM disk

2 years ago, by Ann in RAM Disk Forum

To exclude the chance that this issue is caused by hardware or the operating system, would you be able to try a different RAM Disk product on your system, as suggested above, and let us know how it performs?

Re: How to create a ping delay for online gaming

2 years ago, by Ann in Connection Emulator Forum

I would recommend a different tool we have, it's called NetGenius. Its licence is cheaper, and it comes with a free 30-day trial, and it has the feature you want. Please see the 'Download and upload delay' section in NetGenius user manual.

Re: Batch file for uninstalling RAM Disk

2 years ago, by Ann in RAM Disk Forum

For uninstalling SoftPerfect RAM Disk, simply execute: "C:\Program Files\SoftPerfect RAM Disk\unins000.exe" /SILENT /NORESTART The last parameter instructs the uninstaller not to restart the system even if necessary. If you want to reinstall the application later, the system must be rebooted before that.

Re: Number of background scanning threads

2 years ago, by Ann in Network Scanner Forum

Thank you for your feedback and suggestion. We have added a new setting that allows you specify a custom number of threads for background scanning. You can download the new builds here. The new Max. threads setting is under Options - Browsing - Live Display:

Re: Memory/size limit for a RAMdisk

2 years ago, by Ann in RAM Disk Forum

As mentioned earlier, it wasn't physically possible for us to test RAM disks larger than 200 GB. If you have the hardware for 300GB-1TB RAM disks, the best way to test it is to download the free trial of the RAM Disk. It will give you a fully-functional application for 30 days, which should be enough for ensuring that everything works well with your setup.

Re: Browser cache location reverts from RAM disk back to HDD

2 years ago, by Ann in RAM Disk Forum

Cache Relocator works by creating a symbolic link that makes Firefox use a different location for its cache. It is possible that you mistake the symlink for a real cache folder. Its icon can look identical to that of a folder, and it will be in the original cache location on your C drive. But there is no reason for the cache data to be "duplicated". It is possible it reverted to the hard

Re: Scan settings to detect Chromebooks

2 years ago, by Ann in Network Scanner Forum

Chromebooks are like regular computers, so a standard scan should detect them just like any other device, i.e. no specific settings are required. However, Chromebooks do not expose Make/Model and Serial number information in any standard way like SNMP, SSH or WMI, as far as I know. It is likely there is no way extract that information remotely.

Re: How to deliver OEM product/licence

2 years ago, by Ann in RAM Disk Forum

It depends on what product you embed the RAM Disk application into, and what your customer expects to receive. You can either pass the licence key to the customers, or provide them with a system where the licence key is already entered. You can also automatically deploy the software and licence.

Re: How to configure email alerts

3 years ago, by Ann in WiFi Guard Forum

Most likely, sending emails fails because by default Google doesn't allow plain text authentication over SMTP, even over SSL. There are three ways to make it work: Enable less secure apps to log in to your account (not recommended); or Create a specific app password for sending emails from WiFi Guard; or Use your ISP's own SMTP server (you will need to know your ISP settings for their SMTP).

Re: Memory/size limit for a RAMdisk

3 years ago, by Ann in RAM Disk Forum

In theory, there is no limit on RAM disk size on 64-bit systems. The maximum size we have tested was about 200 GB, as we don't have the equipment with more RAM than that. If for any reason you are having troubles creating a very large drive, try creating a few smaller drives instead.

Re: Should I select one or all adapters?

3 years ago, by Ann in WiFi Guard Forum

One selected adapter is sufficient. WiFi Guard will scan your entire network through it.

Re: Maximum speed capability

3 years ago, by Ann in Connection Emulator Forum

In general, our software can't handle more than 1 Gbps due to the implementation of packet processing in user mode. I am not aware of any tools that support latency emulation at such high speeds. It would require some highly specialised purpose-built hardware, so it is unlikely that there is any software in existence that can do it.

Re: License for pentesting

3 years ago, by Ann in Network Scanner Forum

In this case, as the Network Scanner is always used by your company and only on one device at any given time, you can purchase a single-device business licence. Also, I recommend using the portable edition of NetScanner in this scenario. It will allow you to have all its settings, licence, and any external tools like nmap in a single folder, which is easy to move, deploy on the target computer,

Re: How to create a whitelist of user MAC addresses

3 years ago, by Ann in Bandwidth Manager Forum

From version 3.2.4 onwards, any comments assigned to a group entry will also be shown in the main view and the real-time monitor. This is the case even if the group is not used as such, so it can be used to add comments to individual IP and MAC addresses, as shown below. Regarding the User Info column, it displays any enabled notifications for that rule. User-defined comments for MAC and IP add

Re: Browser cache location reverts from RAM disk back to HDD

3 years ago, by Ann in RAM Disk Forum

It looks like occasionally the new versions of Chrome/Edge delete the symbolic link and re-create a regular cache directory. It is unclear why they do that; maybe because their cache format changes from version to version. One way to deal with this would be to run the Cache Relocator periodically, to check if the redirection is in place. Alternatively, you can edit the shortcut that you use

Re: How to create a whitelist of user MAC addresses

3 years ago, by Ann in Bandwidth Manager Forum

Generally yes, you can make a whitelist of permitted MAC addresses: 1. Create a group named Whitelist and add all the allowed MAC addresses to it. 2. Create this rule at the top of the ruleset: Source: NOT Whitelist Group : Any Port Destination: Any Address : Any Port Protocol: IPv4 TCP/UDP Rate: Blocked 3. Tick the Invert the condition, so it becomes "Source NOT Group". Th

Re: Upload bandwidth is not showing on the usage graph

3 years ago, by Ann in NetGenius Forum

It is likely that there is another network filter installed on your laptop. It could be a VPN client, antivirus, firewall, or other security software. Those applications usually intercept network traffic for encryption (VPN) or analysis (antivirus, firewall). In such case, the traffic simply does not reach the NetGenius driver, so upload data cannot be recorded by it.

Re: How to export host names that did not respond

3 years ago, by Ann in Network Scanner Forum

If there is no host name found in a scan, then it will be cleared. If you want some static names that are not removed, you can assign friendly names to each device. These are basically user-supplied names that are linked to an IP or MAC address for easy device identification. Otherwise, if this is what you wish to achieve: you have a list of devices with host names, and you want to separate the

Re: How to create dynamic volumes

3 years ago, by Ann in RAM Disk Forum

No, sorry, we don't plan to add this feature. The reason for that is in it requiring a much more complex memory management, and a much higher chance of getting a corrupted file system when the driver needs more memory than is available. Our position here is that there isn't much joy in conserving extra space if it leads to errors, crashes, or instability of operation. With static memory allo

Re: How to create dynamic volumes

3 years ago, by Ann in RAM Disk Forum

That is dynamic memory allocation. I'm afraid it is not supported in our RAM Disk. If you require a product that does it, there is one by the name of ImDisk.

Re: How to create dynamic volumes

3 years ago, by Ann in RAM Disk Forum

Assuming you are referring to Dynamic Disks, you can create these by first creating a RAM disk with HDD emulation, and then converting it to a dynamic disk in Windows Disk Management (diskmgmt.msc). There is however little point in doing so, because the configuration will be lost after a reboot. Normally, dynamic disks are used for aggregated and fault-tolerant storages, neither of which really