Show all posts by user

Re: Launching an executable on detection

2 months ago, by Ann in WiFi Guard Forum

At the moment no parameters are passed, and the executable is only launched once per scan regardless how many devices were detected, as long as there is at least one detection. We haven't found a clever way of passing multiple rows of data, but it's possible to extract and use it with sqlite3 from sqlite-tools. You could execute a batch script with something like this, which will dump all unkno

Re: Phone repeatedly being detected as an unknown device

2 months ago, by Ann in WiFi Guard Forum

If WiFi Guard has detected a device, it means the device is connected already. It looks like in your case the device randomly changes its MAC address, which is common for mobile phones. Both iOS and Android devices randomise their MAC addresses for privacy reasons. So in your Samsung Galaxy phones the MAC address is by default randomised and this address is used instead of the device MAC address.

Re: Exported device list: true/false in Info column

2 months ago, by Ann in WiFi Guard Forum

In the CSV file export the "Info" column contains values that are either TRUE or FALSE: 'True' means the device has been marked as known (shown in green in the application interface). 'False' means the device is unknown (shown in red). We have just renamed that column into "Known Devices", to make its meaning clearer. Now the exported device list looks like this: Known

Re: Advantages of SoftPerfect RAM Disk

2 months ago, by Ann in RAM Disk Forum

Thank you for the compliments Alfredo. It is always nice to hear that users appreciate our efforts.

Re: LAN transfer monitoring

2 months ago, by Ann in NetMaster Forum

This is not a bug. The LAN file copy is not monitored by NetMaster intentionally. The way Windows is designed, this type of traffic originates from the SYSTEM process and is usually local (not Internet). So we decided to ignore it in NetMaster, as it can't be attributed to a specific application.

Re: Suggestion: Limit the quantity of email notifications

2 months ago, by Ann in WiFi Guard Forum

Thank you for your feedback. We have updated WiFi Guard so that it does not send duplicate e-mails. Now, if WiFi Guard detects the same set of unknown devices over several runs, it will only send one e-mail. If the set of unknown devices changes, it will send another e-mail. The update can be downloaded here.

Re: Using WiFi Guard in multiple locations

2 months ago, by Ann in WiFi Guard Forum

To use WiFi Guard in multiple locations, you can simply use its portable edition. In this case, the application itself and its database (including the known devices list) could sit in a folder in your Google Drive or a USB flash drive, and you would be able to use it anywhere you go.

Re: Different disk size when created by RAM Disk and when formatted by Windows

2 months ago, by Ann in RAM Disk Forum

Great, we will include these changes in the next release. Once again, thanks for helping us make the product better.

Re: Different disk size when created by RAM Disk and when formatted by Windows

2 months ago, by Ann in RAM Disk Forum

The reason for this space discrepancy is that the exFAT support was implemented in our RAM Disk before Microsoft published exFAT specs. So the implementation was mainly based on educated guesswork and experience, and to be on the safe side we allocated more space for file system structures. Now that MS has published the specs, we reviewed the code and implemented a more compact FAT table. In ou

Re: Maximum throughput limit

2 months ago, by Ann in Bandwidth Manager Forum

There are many factors that affect the maximum throughput, from CPU performance to network card drivers and the number of rules. It is best if you test the software in your environment to see what can be achieved in your particular case. Generally you can expect up to 300 Mbps per server, and this cannot be parallelised. Having said that, in the latest version 3.2.11 we have done a number of op

Re: Large disk with small allocation unit size cause corrupt exFAT file system

2 months ago, by Ann in RAM Disk Forum

Thank you for reporting this. The exFAT formatting issue has been fixed, for both 2K and 4K clusters. You can download the update here. The problem was due to incorrect FAT bitmap creation for larger FAT tables -- exactly what happen in the case of a large drive with a small cluster size.

Re: WiFi Guard settings location

2 months ago, by Ann in WiFi Guard Forum

It's in C:\Users\<UserName>\AppData\Local\WiFi Guard\ Alternatively, you can create a backup via All Devices - Export and save it to an XML file. This backup can be restored via the corresponding Import command.

Re: NetworX Security Alarm Help

2 months ago, by Ann in NetWorx Forum

We are a software development company called SoftPerfect. We create software applications for network administrators, business professionals and home users, and we have no connection to security alarms or any other goods or services outside of the software development field. NetWorx is the name of one of our software products, created almost 20 years ago for keeping track of Internet traffic us

Re: Choosing size and file system for RAM disk and/or RAM disk image

2 months ago, by Ann in RAM Disk Forum

When you are creating a volatile RAM disk (i.e. the one that will be used without an image file and will have all its contents lost every time you reboot or power off your computer), you should leave the image file name field empty in its settings, and instead specify its size and the file system. The disk will be created based on the set size and file system. When you are creating a persistent

Re: Netstat information

2 months ago, by Ann in NetWorx Forum

Most likely, you are using the portable version of NetWorx. This feature does not work in the portable version as it requires a driver to be installed. Using the installer version instead should fix this issue. Also, if you are mainly interested in Netstat-like functionality, check our NetMaster product. It is designed specifically for tracking applications and connections.

Re: Monitoring VirtualBoxes (VMs)

3 months ago, by Ann in NetWorx Forum

It depends how they are connected to the network. You can either install NetWorx in the guest OS, or run it on the host. If installed on the host, you can choose which adapter(s) to monitor.

Re: VPN and connection monitoring

3 months ago, by Ann in NetMaster Forum

It is likely that the VPN service is the cause of the problem. Normally, your applications send and receive data directly, which enables NetMaster to capture and display their activity. However, when a VPN service comes into play, it alters the traffic processing path. Applications send and receive data as usual, but the VPN service intercepts that data, encrypts it and sends it over a tunnel.

Re: How to configure shared folder permissions

3 months ago, by Ann in Network Scanner Forum

If you are running the Network Scanner as domain admin, you don't need to specify any account details. It will automatically assume your current user's context, and as a domain admin you should be able to access WMI on remote computers. It's all about WMI configuration in your network. It is not related to who is allowed to access a share. If you get WMI queries working on your network computer

Re: Linux version downloads and licence purchase

3 months ago, by Ann in NetWorx Forum

Unfortunately we had to discontinue Linux builds, at least for the time being. There were very few purchases, while preparing and testing Linux releases takes a lot of time, especially to maintain compatibility between a range of distros and their versions. All this made the Linux support unviable. The unmaintained Linux packages can still be downloaded here: DEB, TAR.GZ. If you want to purc

Re: Detection and monitoring of 5GHz WiFi traffic

3 months ago, by Ann in NetWorx Forum

Please see this forum thread. It is likely to be the same issue and the same solution.

Re: How to configure shared folder permissions

3 months ago, by Ann in Network Scanner Forum

You will need to write a VBScript that extracts the list of shares, gets the security settings of each share, and then outputs that information. Below is a sample script for getting share security info. You may want to modify it further to suit your needs, then load it into NetScanner via Options - Remote Scripting and, if WMI access is enabled and configured, run the script against your device

Re: How to rename computer back to its original name

3 months ago, by Ann in NetMaster Forum

To revert the renamed computer to its original name, simply use the Rename right-click menu again, but this time leave the name empty (do not enter anything).

Re: Bandwidth monitoring in a workgroup

3 months ago, by Ann in NetMaster Forum

We have added the Rename option for devices in the latest build:

Re: How to configure shared folder permissions

3 months ago, by Ann in Network Scanner Forum

In Windows, when NTFS permissions and shares are used together, the most restrictive permissions prevail. For example, if "Everyone's" NTFS permissions allow modifications while the share permissions only allow reading, the share permissions apply, because Read is more restrictive than Modify. It is possible to simplify things and work with just one set of permissions: the NTFS share per

Re: How to configure shared folder permissions

3 months ago, by Ann in Network Scanner Forum

The lock icon suggests that access was denied when the scanner attempted to list the share's contents. As you are also getting the access denied error, please check that folder's NTFS permissions (locally on the server, on the Security tab in the folder's properties). The effective permissions are computed from NTFS and share permissions combined, so it it likely "Everyone" isn't allo

Re: Date or time since the last port state change

3 months ago, by Ann in Switch Port Mapper Forum

Yes, we have just added this feature. Please download the latest build, install it, and go to menu View - Columns - Last Change. This will add a column that displays how long ago the interface changed its state.

Re: Bandwidth monitoring in a workgroup

3 months ago, by Ann in NetMaster Forum

We don't use encryption in NetMaster. All settings and the access password are kept in a local database in C:\ProgramData\SoftPerfect\NetMaster. The password is Base-64 encoded. For added security in a corporate environment you may want to revoke the Users group access to this folder. No specific permissions are required to save the settings. I am not sure why in your case the GUI did not displ

Re: Bandwidth monitoring in a workgroup

3 months ago, by Ann in NetMaster Forum

The answers to your questions: Once the service has been installed, its default password is blank. You can then connect to the service from the main PC and set a new password. You can also connect to multiple services and set a new password at once. Simply selected all connected services in the user interface, then choose Settings and set a new password; and it will be set on all of them. There

Re: Bandwidth monitoring in a workgroup

3 months ago, by Ann in NetMaster Forum

Yes, there is. NetMaster should suit your requirements quite well. Simply install NetMaster service on every computer that you want to monitor, and you will be able to access all the reports from the main PC.

Re: Packet manipulation chart and network flow graph are empty

4 months ago, by Ann in Connection Emulator Forum

It sounds like you have a filter enabled. Perhaps, the current connections don't match the filter? The graph only shows what matched the filter and was processed rather than just forwarded.