Wireless Network Tools and Utilities
  Products
 
Bluetooth Auditor

ShareAlarmPro is a network tool that allows network administrators and users easily perform network shares monitoring.

 

 

 

 

 

Download Now!Buy Now!

Version 1.4
2/7/10
1587 KB
Windows 7/XP/2003/Vista
19.50 $
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring Bluetooth devices in a wireless network. It can discover and track any Bluetooth device within a distance between 1 and 100 meters and display key information about each device being detected as well as the services device provided. With the growing popularity of the Bluetooth technology, BlueAuditor will enable network administrators to effectively audit their wireless networks against security vulnerabilities associated with the use of Bluetooth devices. BlueAuditor enables the user to save the data of the detected Bluetooth devices in an .xml file and supports the most Microsoft Bluetooth drivers available on the market. All the mentioned features are provided with a user friendly graphical interface.
Last Changes:
• Added remote Bluetooth device scan and discovery.
• Added Bluetooth Voice and Net Send notification.
• Added Bluetooth sessions events log.
System Requirements:
• Windows XP SP2 or 2003 Server.
• Windows XP-compatible Bluetooth adapter.
• Microsoft Windows Bluetooth driver.
What's New:
BlueAuditor Japanese. We are proud to announce BlueAuditor, Japanese version. Based on the current English version, it is adapted, translated and distributed by nextEDGE Technology, Inc.
Author : Nsasoft llc.
 
 
 
SmartLogAnalyzer
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring Bluetooth devices in a wireless network
 
 
 
What Is Bluetooth?

Bluetooth is an industrial specification for PANs "wireless personal area networks". Bluetooth provides a way to connect and exchange information between devices like personal digital assistants (PDAs), mobile phones, laptops, PCs, printers and digital cameras via a secure, low-cost, globally available short range radio frequency.

Bluetooth devices transmit on the 2.4 gigahertz (GHz) radio frequency. Bluetooth devices operate on frequency band between 2.4 to 2.4835 GHz. To avoid interference with other devices operating on the same band, the technology uses a frequency hopping algorithm with 1600 frequency hops per second. The time during which devices operate in a certain frequency is called a time slot and is 625 microseconds in duration. Units in a piconet change frequency at the same time on command from the master unit, based on a pseudo-random hopping sequence. The frequency band is broken up into 79 channels spaced 1 MHz apart. Data is transmitted in frames, which can span 1, 3 or 5 slots.

There are many programs available today that are designed to communicate with devices through COM ports (also called serial ports). With Bluetooth COM ports, Windows XP can allow these programs to communicate using Bluetooth wireless technology. For example, you can synchronize your calendar and contact information on your personal digital assistant (PDA) with your computer by using Bluetooth COM ports.

Many Bluetooth devices are not automatically discoverable. To make each device discoverable, you must attach or turn on the Bluetooth radio adapter for your Windows XP computer, and then set up your device so that Windows XP can find it.

When you make a Bluetooth enabled device discoverable, the device sends radio signals to advertise its location, which enables your computer to recognize the Bluetooth device.

 
 
 
 
Wireless Network Tools and Utilities

NetStumbler
NetStumbler displays wireless access points, SSIDs, channels, whether WEP encryption is enabled and signal strength. NetStumbler can connect with GPS technology to accurately log the precise location of access points.

ApSniff
ApSniff is a wireless (802.11) access point sniffer for Windows 2000. It enables you to list all access points broadcasting beacon signals at your location. Useful for helping you set new access points making sure you do not have interfering APs, and helping you set-up wireless clients by providing you with the client configuration information. Requires WLAN cards of Prism 2 chipset. It works with a DLINK DWL-650 and linksys WPC11.

PrismStumbler
Prismstumbler is a wireless LAN (WLAN) discovery tool which scans for beacon frames from access points. Prismstumbler operates by constantly switching channels and monitors any frames received on the currently selected channel.

WEPCrack
WEPCrack was the first of the WEP encryption cracking utilities. WEPCrack is an open-source tool used to break 802.11 WEP keys. You can also download

Airsnort
Airsnort is a wireless LAN (WLAN) tool which cracks WEP encryption keys. AirSnort passively monitors wireless transmissions and automatically computes the encryption key when enough packets have been gathered.

WifiScanner
WifiScanner is a tool that has been designed to discover wireless node ( i.e access point and wireless clients). It is distributed under the GPL License. It work with CISCOR card and prism card with hostap driver or wlan-ng driver. An IDS system is integrated to detect anomaly like MAC usurpation.

Wellenreiter
Wellenreiter is a GTK / Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. All three major wireless cards (Prism2 , Lucent, and Cisco) are supported. It has an embedded statistics engine for the common parameters provided by wireless drivers. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects ssid broadcasting or non-broadcasting networks in every channel. Non-broadcasting networks could be uncovered automatically. The manufacturer and WEP is automatically detected.

WepLab
WepLab is a tool designed to teach how WEP works, what different vulnerabilities has, and how they can be used in practice to break a WEP protected wireless network. So far, WepLab more than a Wep Key Cracker, is a Wep Security Analyzer designed from an educational point of view.

BTScanner
BTscanner is a tool that extracts as much information as possible from a Bluetooth device without the requirement to pair. A detailed information screen extracts HCI and SDP information, and maintains an open connection to monitor the RSSI and link quality. BTScanner is based on the BlueZ Bluetooth stack, which is included with recent Linux kernels, and the BlueZ tSolset. Using the information gathered from these sources, it is possible to make educated guesses as to the host device type.

FakeAP
The polar opposite of hiding your network by disabling SSID broadcasts- Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. As part of a honeypot or as an instrument of your site security plan, Fake AP confuses Wardrivers, NetStumblers, Script Kiddies, and other scanners.

Kismet
Kismet is an 802.11 wireless network detector, sniffer, and intrusion detection system. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and inferring the presence of nonbeaconing networks via data traffic.

Mognet
Mognet is a free, open source wireless ethernet sniffer / analyzer written in Java. It is licensed under the GNU General Public License. It was designed with handheld devices like the iPaq in mind, but will run just as well on a desktop or laptop.

 
 
 
Nsauditor Network Security Auditor
Nsauditor Network Security Auditor is a network security scanner that allows to audit and monitor remote network computers for possible vulnerabilities Nsauditor Network Security Auditor is a network security scanner that allows to audit and monitor remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Nsauditor is a complete networking utilities package that includes a wide range of tools for network security auditing, scanning, monitoring and more. The program includes more than 45 network tools for scanning, sniffing, enumerating and gaining access to machines and contains a built-in database of known network security vulnerabilities, which allows you to select the items for scanning and add custom entries. Nsauditor can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios, RPC, SQL and SNMP information, open ports. Reports can be generated in HTML
and XML format. Overall, this is a very complete package for a surprisingly low price.
  Buy Now | Download Now | More Information  
 
 
Product Key Explorer
Product Key Explorer displays product key for Windows, MS Office, SQL, Exchange Server and over 500 other software products installed on your local or remote network computers. In order to install or reinstall Microsoft Office, Windows, or other commercial software, you must have access to a product key (CD Key) for that product Product Key Explorer displays product key for Windows, MS Office, SQL, Exchange Server and over 500 other software products installed on your local or remote network computers. In order to install or reinstall Microsoft Office, Windows, or other commercial software, you must have access to a product key (CD Key) for that product. Product Key Explorer retrieves product keys from network computers and allows to protect your company from having pirated software on your network. With this software you will be able to track the number of software licenses installed in your business, find and recover a lost or forgotten product keys, save and keep an up-to-date backup of all your software product keys in a central location. You can also save all your product keys to a text file for printing or copy the serial number to windows clipboard. Excellent tool for network administrators, or businesses undergoing a software license compliancy.
  Buy Now | Download Now | More Information  
 
 
Backup Key Recovery
Backup Key Recovery retrieves product keys for Windows, MS Office, SQL Server, Adobe products and more than 500 popular software products installed on your crashed hard disk drive. Backup Key Recovery retrieves product keys for more than 500 popular software products installed on your crashed hard disk drive. Before using software you should recover registry files in your crashed hard drive if they are damaged, then connect it to your computer as secondary hard drive and using Backup Key Recovery browse find software registry file located in Windows\System32\config\software and recover installed major software products activation keys. Backup Key Recovery supports more than 500 software packages. Backup Key Recovery supports more than 500 software packages. Excellent tool for system administrators and computer repair service providers. You can save product keys as Tab Delimited Txt File (.txt), Excel Workbook (.xls), CSV Comma Delimited (.csv), Access Database (.mdb), Web Page (.html) or XML Data (.xml) file, Print or Copy to Clipboard.
  Buy Now | Download Now | More Information  
 
 
SpotAuditor
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. SpotAuditor recovers Windows Live Messenger, Windows Messenger, MSN messenger lost or forgotten passwords, RDP, ICQ, &RQ, Trillian, Miranda IM, Google Talk, Google Desktop, Camfrog Video Chat, Easy Web Cam, VNC, Total Commander ( Windows Commander ), Far ftp client, WS_FTP, FileZilla, SmartFTP, CuteFTP, CoreFTP, CoffeeCup Direct FTP, FlashFXP ftp client, SecureFX ftp client, WebDrive ftp, FTP Voyager, AutoFTP, FTP Control, 32bit FTP, FTP Navigator, Dial up, RAS, WinProxy Administrator, VPN and Outlook Express passwords, recovers passwords saved in Mozilla Firefox, Opera, Internet Explorer, IE Auto Complete Fields and reveals passwords stored behind the asterisks (*****) in password text-boxes, web pages and ActiveX controls. You can recover and restore any lost or forgotten password ever entered in Internet Explorer.SpotAuditor aloows to save retrived information as Tab Delimited Txt File (.txt), CSV Comma Delimited (.csv), Excel Workbook (.xls), Access Database (.mdb), Web Page (.html) or XML Data (.xml) file, print or copy to clipboard.
  Buy Now | Download Now | More Information  
 
  ShareAlarmPro  
ShareAlarmPro is a network tool that allows network administrators and users easily perform network shares monitoring. ShareAlarmPro is a network tool that allows network administrators and users easily perform network shares monitoring. Using ShareAlarmPro you can monitor users attempting to access secured shares and confidential files, detect and log network access to shared folders, monitor security events, monitor accessed files, disconnect users from open files or deny network users access, monitor sharing permission changes. ShareAlarmPro includes intrusion detection system based on security events log analyzer. Security Event Log Monitor monitors the security event logs of Windows NT/2000/XP servers or workstations and notifies user on selected events detection. This software also provide you ability to manage and monitor all shares on your workstation, disable or enable default administrative shares, hide your workstation in network, view how many users are currently connected to each shared resource on your workstation. ShareAlarmPro also allows you to easily browse your LAN and view all shared resources no meter they are hidden or not and connections to shared resources on remote workstations.
  Buy Now | Download Now | More Information  
 
 
NetworkSleuth
NetworkSleuth is a fast file search tool, that allows search for files located on local or network computers and supports searches for documents, image, MP3, music and video files, allows to search for files in Local Area Network(LAN) based on various criteria. NetworkSleuth is a network file searching utility, that allows you to quickly locate files across a network. You can search for specific file names or for specific file types (e.g. all MP3 files). Network Sleuth provides a lightning fast search engine and includes the ability to search hidden network resources, restricted access resources, IP subnets and much more. It comes with a built-in password manager to store your network logins for resources with restricted access. NetworkSleuth can scan hidden resources and automatically login to restricted shares, using the provided login information. The found files can be copied, moved etc. just as if you were working with Windows Explorer. NetworkSleuth also enables you to schedule search tasks to be executed automatically. Additional features include result sorting, filtering, search within results, minimize to tray, scanning inside zip files and exporting of results to TXT, HTML and CSV format.
  Buy Now | Download Now | More Information  
 
 
RemShutdown
RemShutdown allows remotely shutdown or restart network computers. In addition, RemShutdown offers the user the option to cancel the shutdown. RemShutdown allows shutdown or restart network computers remotely. You can specify a delay during which a message you specify can be displayed and applications running on the remote computer at the time of shutdown can be allowed to close. In addition, RemShutdown offers the user the option to cancel the shutdown. The tool is designed with a user-friendly interface and is easy to use.
  Buy Now | Download Now | More Information  
 
 
BlueAuditor
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring Bluetooth devices in a wireless network. It can discover and track any Bluetooth device within a distance between 1 and 100 meters and display key information about each device being detected as well as the services device provided. With the growing popularity of the Bluetooth technology, BlueAuditor will enable network administrators to effectively audit their wireless networks against security vulnerabilities associated with the use of Bluetooth devices.
  Buy Now | Download Now | More Information  
 
 
NetShareWatcher
NetShareWatcher is network security improvement software and allows network administrators to monitor network shares, permissions and identify shares which are violating data access policy in their organization. NetShareWatcher Find shares which are violating to your company data access policy and Fix it! NetShareWatcher is network security improvement software. It allows network administrators to monitor network shares and identify shares which are violating data access policy of their organization. NetShareWatcher is very handy. Once you configure it a first time, you can forget about network sharing problems. You only need to select restricted groups or users and every time NetShareWatcher will automatically detect network shares with an access list containing those restricted groups and perform a configured action. NetShareWatcher allows you to easily monitor network shared folders and permissions and alerts anytime a user sets a share ACL to "Everyone" or some other global group that violates your data access policy as well as disables this shared folders automatically if you have selected the appropriate feature in the settings.
  Buy Now | Download Now | More Information  
Nsauditor
Product Key Explorer
Backup Key Recovery
SpotAuditor Password Recover
BlueAuditor
ShareAlarmPro
RemShutdow
NetShareWatcher
NetworkSleuth
 
Testimonials
"Very broad collection of network audit tools. We think this is one of the best integrated network multi-tools we have looked at."

SC Magazine

More Testimonials »
Awards
Nsasoft Awards
More Awards »
  Support
 
Free 24 / 7 Support
Free Lifetime Upgrades
Visit Our Site
Email us Here
 
 
   
Home Ordering Products Contact Us Support Resellers
Copyright © 2004-2010 Nsasoft llc 2/7/2010