images/news/internet.jpgNetwork Magic
If you're looking for a simple, free, all-in-one network management tool for a small peer-to-peer network, this is the one to get. It handles all the basic network chores, including adding new devices to the network, fixing broken network connections, setting up wireless encryption and protection, sharing printers and folders, reporting on the state of the security of each PC, and much more. Read More
Spiceworks IT
This freebie can help small or one-person shops with small and medium-size networks, although the complexity of its interface and some anomalies don't make it particularly useful for home networks. It's an all-in-one network inventory and management tool with a surprising number of features for a free piece of software. The program will inventory your network and provide information about each device on it. Read More
Netlimiter
What's the biggest problem on many small networks? Bandwidth hoggers -- applications that suck up all or most of the available Internet and network bandwidth. Typically, it's tough or impossible to track down which applications or PCs are using all that bandwidth and harder still to do anything about it. That's where NetLimiter comes in. It monitors bandwidth use so that you can identify the hoggers. The free version of the software, though, won't let you actually set bandwidth limits. For that, you'll need to buy one of the paid versions. The paid versions let you set bandwidth limits, including total amount of data downloaded or uploaded, on a per-application or per-connection basis. You can fine-tune it quite a bit, for example, by setting different limits for uploading and downloading. Read More
Advanced IP Scanner
This little free utility is a great way to get a quick list of all the devices connected to your network, listed by IP address, along with information about each. It does a lightning-fast scan of all IP addresses in a range that you specify, then specifies whether a device is present at each address. For each device, it lists the status, the machine name, NetBIOS information, ping information and MAC address. he program will do more than just scan your network. It also gives you a set of tools that lets you shut down PCs remotely, use the "Wake on LAN" feature for any PC whose network card supports that capability, and connect to remote PCs via Radmin, if it's installed. You can also apply some operations, such as shutting down remote PCs, to a group of computers, not just individual ones.
Advanced Net Tools
This freebie puts a whole suite of tools at your fingertips, including ones for conducting ports scans, DNS lookups and pings, and scanning for network shares, checking on routing tables and more. The security modules are especially useful for quick-and-dirty network scans. There's a network port scanner that can scan all computers on your network and report on their open ports, and a share scanner that reports on all the shared drives on your network.
Technitium MAC Address Changer
Allows you to change Media Access Control (MAC) Address of your Network Interface Card (NIC) or Wireless Network Card (WiFi), irrespective of the NIC's drivers or its manufacturer. Current user-friendly version has many new features which allows you to change IP Address, Gateway, DNS Servers, enable/disable DHCP in one click and many more features.
Rogue Scanner
Here's an even better way to find out whether your network has any intruders on it: Run this program. Before you run it, put together a list of every PC and device on your network. Once you have that in hand, run RogueScanner. It lists every device on your network, including routers, printers, PCs and others. For each device, it lists the IP and MAC addresses. In addition, it peers deeper and tries to find other information, such as whether the device is a workstation, printer, server, router or PC, as well as the manufacturer and model number. Compare what the program finds with the list of devices that you know are safe and secure. If you find a device on the network that's not on the list you drew up, you've got an intruder.
Thanks Computerworld for this information
If you're looking for a simple, free, all-in-one network management tool for a small peer-to-peer network, this is the one to get. It handles all the basic network chores, including adding new devices to the network, fixing broken network connections, setting up wireless encryption and protection, sharing printers and folders, reporting on the state of the security of each PC, and much more. Read More
Spiceworks IT
This freebie can help small or one-person shops with small and medium-size networks, although the complexity of its interface and some anomalies don't make it particularly useful for home networks. It's an all-in-one network inventory and management tool with a surprising number of features for a free piece of software. The program will inventory your network and provide information about each device on it. Read More
Netlimiter
What's the biggest problem on many small networks? Bandwidth hoggers -- applications that suck up all or most of the available Internet and network bandwidth. Typically, it's tough or impossible to track down which applications or PCs are using all that bandwidth and harder still to do anything about it. That's where NetLimiter comes in. It monitors bandwidth use so that you can identify the hoggers. The free version of the software, though, won't let you actually set bandwidth limits. For that, you'll need to buy one of the paid versions. The paid versions let you set bandwidth limits, including total amount of data downloaded or uploaded, on a per-application or per-connection basis. You can fine-tune it quite a bit, for example, by setting different limits for uploading and downloading. Read More
Advanced IP Scanner
This little free utility is a great way to get a quick list of all the devices connected to your network, listed by IP address, along with information about each. It does a lightning-fast scan of all IP addresses in a range that you specify, then specifies whether a device is present at each address. For each device, it lists the status, the machine name, NetBIOS information, ping information and MAC address. he program will do more than just scan your network. It also gives you a set of tools that lets you shut down PCs remotely, use the "Wake on LAN" feature for any PC whose network card supports that capability, and connect to remote PCs via Radmin, if it's installed. You can also apply some operations, such as shutting down remote PCs, to a group of computers, not just individual ones.
Advanced Net Tools
This freebie puts a whole suite of tools at your fingertips, including ones for conducting ports scans, DNS lookups and pings, and scanning for network shares, checking on routing tables and more. The security modules are especially useful for quick-and-dirty network scans. There's a network port scanner that can scan all computers on your network and report on their open ports, and a share scanner that reports on all the shared drives on your network.
Technitium MAC Address Changer
Allows you to change Media Access Control (MAC) Address of your Network Interface Card (NIC) or Wireless Network Card (WiFi), irrespective of the NIC's drivers or its manufacturer. Current user-friendly version has many new features which allows you to change IP Address, Gateway, DNS Servers, enable/disable DHCP in one click and many more features.
Rogue Scanner
Here's an even better way to find out whether your network has any intruders on it: Run this program. Before you run it, put together a list of every PC and device on your network. Once you have that in hand, run RogueScanner. It lists every device on your network, including routers, printers, PCs and others. For each device, it lists the IP and MAC addresses. In addition, it peers deeper and tries to find other information, such as whether the device is a workstation, printer, server, router or PC, as well as the manufacturer and model number. Compare what the program finds with the list of devices that you know are safe and secure. If you find a device on the network that's not on the list you drew up, you've got an intruder.
Thanks Computerworld for this information