Show all posts by user

Re: How to display unused IP addresses only

5 years ago, by Ann in Network Scanner Forum

The easiest way would be: Go to Options - Program Options - General and tick Display inactive devices. Run a scan. Press Ctrl + I to open the filter pane, then choose Response time: Empty. This will filter out all devices with a response time, leaving only those that did not respond (i.e. not being used).

Re: How to get management information (ILO, iDRAC, IMM)

5 years ago, by Ann in Network Scanner Forum

It should be possible. The newer implementations of ILO and iDRAC are based on the so-called Redfish API, which is essentially an HTTP-JSON interface. Below is a screenshot of Network Scanner's Remote JSON for extracting ILO IP address. There should be a similar way for iDRAC and IMM. You can use the Redfish query builder to explore the JSON tree and find in what node the IP address is.

Re: Network speed data logger

5 years ago, by Ann in NetWorx Forum

Yes NetWorx does provide automatic logging of Internet connection speeds at set intervals. This feature is called Speed Meter and is located in the main pop-up menu. You can run a once-off test, or schedule the tests to run at a set intervals.

Re: MacOS app file appears to be "damaged"

5 years ago, by Ann in WiFi Guard Forum

After investigation, we have found that OS X Yosemite somehow doesn't like our digital signature despite it being issued by Apple, and as a result thinks the application has been tampered with. There is however absolutely nothing wrong with the app itself. To run WiFi Guard, simply open System Preferences, go to Security & Privacy and set allow apps downloaded from to anywhere, as shown in

Re: Suggestion: make "Rescan device" update a single WMI column

5 years ago, by Ann in Network Scanner Forum

Thank you for your feedback. You are right: when rescanning one column, all columns in the group are rescanned. It was just designed this way for implementation simplicity. But as you pointed out, it may not be what a user expects and the rescan could take longer than it should. We have improved this in the latest preliminary build: now only a specific column is rescanned (unless a virtual

Re: Resolving MAC addresses in a non-local subnet

5 years ago, by Ann in Network Scanner Forum

It is basically how MAC address resolution works in networking. As you know, there are 4 related settings in the Network Scanner: ARP query (address resolution protocol). This method always works in a local subnet, but does not work with a non-local subnet. The reason is that routers do not pass ARP messages from one subnet to another. NetBIOS query. This method sends a special NetBIOS packet t

Re: Unidentified Inprocomm device in my WiFi network

5 years ago, by Ann in WiFi Guard Forum

WiFi Guard does not collect or keep lists of websites that devices visit. It is not one the Guard's functions, nor is it what it was designed for. It is quite possible that the Inprocomm device is one of yours. As explained above, Inprocomm manufactures network cards. If a device has one of those cards, it may report its presence in the network using its network card vendor name rather than the

Re: How to get more host names resolved

5 years ago, by Ann in Switch Port Mapper Forum

Please try the latest preliminary build of the Port Mapper: in addition to DNS names it now also attempts to resolve NetBIOS names. If some names still don't show up, it is most likely because those devices either don't have names or don't reveal them via standard protocols. To check, you can open a command prompt and type an IP that has a resolved name, for example: tracert 192.168.17.2

Re: Operating system detection

5 years ago, by Ann in Network Scanner Forum

Assuming you are using the "Lookup Windows version" setting, it unfortunately cannot tell whether it's Windows client or server as both have version "10.0" and there is no additional information available. Instead, you can use WMI under Options - Remote WMI and choose Windows Name, which should tell you the OS installed. Alternatively, create a new WMI query and use this

Re: App for blocking unrecognised devices connected to the network

5 years ago, by Ann in WiFi Guard Forum

Thank you, we know about Netcut but it's hardly a solution. As you may know, it uses a technique called "ARP spoofing" where the application generates a number of fake ARP responses that poison the target's ARP cache and effectively disconnect it from the Internet. A target can easily avoid that by using either a firewall, in which case the fake ARP responses are dropped, or static AR

Re: RAM disk contents not saved to image file on shutdown

5 years ago, by Ann in RAM Disk Forum

It is definitely not because you are using a trial (the trial has all the features of the licensed software, and the only limitation is the 30-day period). This is likely to be some kind of system issue, most probably related to Windows Hybrid Boot. As suggested above, we recommend disabling the hybrid boot either by typing in the elevated command prompt REG ADD "HKLM\SYSTEM\CurrentCont

Re: How to clear MAC-address database and refresh error counters

5 years ago, by Ann in Switch Port Mapper Forum

The MAC address database is kept in %APPDATA%\SoftPerfect\Switch Port Mapper. You can simply delete the .DB file from that folder: this will prompt the creation of a a new database. Regarding the error counters, it looks like the switch might have cached them somehow or hasn't updated the data that is reported via SNMP. I recommend checking the current contents of columns ifInErrors and ifOutEr

Re: Compatibility with Synology router

5 years ago, by Ann in NetWorx Forum

That's where you may need to experiment a little. The list represents all network interfaces of the router: some are network jacks at the back of the modem, and one of those should be the interface connected to the Internet. Try choosing each of them one by one, and then downloading something from the Internet or opening some website. Once the correct interface is selected, you will see your us

Re: Compatibility with Synology router

5 years ago, by Ann in NetWorx Forum

According to Synology RT2600ac datasheet, it supports SNMP. Not having that router physically here we are not sure where exactly the relevant settings are, but if you enable SNMP you should be able to use it instead of UPnP. Generally SNMP works better for monitoring purposes. Could you perhaps check your router's SNMP settings and if you find them, set the SNMP version to "1" and com

Re: Auto-hide and click-through options

5 years ago, by Ann in NetWorx Forum

Regarding disabling click-through with the Shift, thank you - it's an interesting idea. We will check if it can be easily implemented and if so, you will see it in the next update.

Re: Interaction of RAM Disk with Windows SuperFetch

5 years ago, by Ann in RAM Disk Forum

The RAM Disk driver doesn't tell the OS anything specific about SuperFetch or ReadyBoost. I am guessing that since a RAM disk is faster than an SSD, Windows should choose to ignore it automatically. To be sure, if you are exclusively using SSD drives, it may be worth disabling SuperFetch system-wide.

Re: Exempting online games from bandwidth limits

5 years ago, by Ann in Bandwidth Manager Forum

If you know the server address(es) that are used in your game (or the server you choose to connect to), this exemption can be easily organised by creating an unrestricted rule that applies to that IP address. For example, if the server you play CSgo on has the address 1.2.3.4, you could simply add a rule like this: Source: local host Destination: 1.2.3.4 Rate: Unlimited Place this rule abo

Re: Auto-hide and click-through options

5 years ago, by Ann in NetWorx Forum

We are glad to hear that you are using a range of our products and find them well-made and useful. The reason licensing conditions are different for NetWorx and Network Scanner/WiFi Guard is due to how they are normally used: NetWorx only monitors the usage on the computer where it is installed. As you mentioned, a modern home has numerous networked devices and we expect customers to install Net

Re: Software for gathering data on Internet dropouts

5 years ago, by Ann in NetWorx Forum

The NetWorx app includes a feature called Connection Monitor. It pings a few sites periodically and if none respond, the connection is assumed to be off-line and a log record is made. When at least one site becomes available again, the connection is assumed to be on-line and another log record is made. This tool can be used to detect outages over 1 minute, but shorter outages are likely remain

Re: Computers with Windows 10 1809 missing in scan results

5 years ago, by Ann in Network Scanner Forum

It sounds like there is a firewall issue in Windows 10 1809, as only those computers don't respond to ping. Not responding to ping obviously leaves those machines undetected by scanning. We found a similar discussion on microsoft.com where the admin needed to be able to ping machines running v1809 - Pinging Windows 10 machine: Quote I've got some basic Windows 10 boxes at remote sites used for

Re: How to reinstall RAM Disk after a clean OS installation

5 years ago, by Ann in RAM Disk Forum

That message suggests that some leftovers of a previous installation are still remaining. Please check in the registry (regedit.exe) whether these keys are present: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SPVDPort HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SPVVEngine If they are, just delete them and the installer should proceed normally. You may also like to have

Re: Updating, backing up and copying an image file

5 years ago, by Ann in RAM Disk Forum

Technically, you can copy a mounted image file: the file is not locked for exclusive access. However, it is worth noting that the image is a random access file, while the copy operation is sequential. This means that if writing to the image coincides with copying it at the same moment in time, the copied file will likely be corrupted. Otherwise, it should be Ok to copy a mounted image file if

Re: Updating and backing up an image file

5 years ago, by Ann in RAM Disk Forum

If you unmount the image file, nothing will be changed in it unless you have the Save Contents to Image option enabled. If that option is checked, any changes you made will be written to the image upon unmounting. To access a backed up image, choose Image - Mount Image from the main menu and select your image file. Then you can copy data from and to that image via a drive letter. Once finished

Re: Can SoftPerfect Connection Emulator target a specific port?

5 years ago, by Ann in Connection Emulator Forum

Yes, there is a filter that can be configured to apply simulations to a specific IP address or port only. This filter is accessible via the Setup Filter button on the main window.

Re: How to identify IP or MAC addresses of devises connected to the network

5 years ago, by Ann in Bandwidth Manager Forum

Yes, you would need to create a tracking rule by choosing an appropriate option under Tracking mode at the Advanced tab of the Add/Edit Rule window: This way you will have so-called streams associated with MAC or IP addresses:

Re: Magellan SQLite vulnerability

5 years ago, by Ann in NetWorx Forum

The latest build of NetWorx v6.2.3 comes with SQLite 3.26.0, which is not vulnerable, according to Tencent Team that discovered the issue. Previous versions of NetWorx, including 5.x.x, are likely to contain a vulnerable version of SQLite, but it is not exploitable because NetWorx does not allow user SQL to be executed in any way, especially remotely.

Re: Displaying different types of devices in different windows/views

5 years ago, by Ann in Network Scanner Forum

While there isn't a view concept, Network Scanner has a set of filters you could use. For example, you could tag (assign friendly names to) your devices, e.g. DESKTOP, SERVER, CAMERA and so on. Then you would be able to quickly filter what's displayed via menu View - Setup Filter. In addition, you will be able to mark some filters as your favourites and quickly apply them from View - Quick Hos

Re: Installing other programs on RAM disk

5 years ago, by Ann in RAM Disk Forum

Generally, it possible to install other software on a RAM disk. However, it is highly inadvisable to do that, as RAM disk contents are volatile in nature and disappear on every reboot or shut down, which would delete the installed software. RAM disks are normally used for temporary data that doesn't need to be kept beyond switching the computer off. If you haven't already done so, you may l

How to get Hardware Vendor information

5 years ago, by Ann in Network Scanner Forum

To display hardware vendors, you need to enable Lookup network card vendor in the Options - Additional tab. Then run a regular network scan once, to force the application to download the MAC-to-vendor database. After that, hardware vendors should be displayed.

Re: Duplicate IP addresses and 0.0.0.0 subnet mask

5 years ago, by Ann in Network Scanner Forum

We have seen a similar behaviour with Win10Pcap. It looks like for some adapters (or in some circumstances) the WinPCap library doesn't return the network mask. Instead it returns an empty string, which is the 0.0.0.0 that you see. The Network Scanner has an in-build workaround: if it is unable to get the netmask, it uses the default value of 255.255.255.0. That's why it works, though the displ