What Can Hackers Do With a Network Analyzer

A Network Analyzer in the wrong hands is a deadly weapon. A network analyzer is a real danger because it is a very powerful and difficult to detect tool.

Security breaches of all kinds are reported all the time. Everyday we hear of hackers who managed to steal sensitive data, of people who become victims of identity theft, etc. Very often the breaches are so incredible that you wonder if hackers have supernatural powers. Well, hackers hardly have supernatural powers but they don't need them –supernatural powers are not necessary when a networklacks security and one has the right tools to break in.

Hackers Monitor Networks With a Network Analyzer

The tools hackers use to break into networks are more or less the same tools network admins use to monitor and maintain their network with. For example, network analyzers are among the tools hackers love most. A network analyzer captures packets and shows you their contents.This means that with the help of a network analyzer running somewhere into the network, hackers can monitor all the unencrypted traffic to and from this network.
This is really scary – just imagine a malicious hacker who knows all the secrets of your company. It gets even more dangerous for networks, where hubs (and not switches) are used because in this case a network analyzer can be installed on any computer and the hacker will monitor all the traffic in that segment, not only the traffic to and from the host. The good news is that hubs are almost out of use today and because of that hackers can do less damage with a network analyzer.

Hackers Obtain Passwords and Credit Card Numbers With a Network Analyzer

When a hacker uses a network analyzer to monitor your network, this is not nice but when he or she steals passwords, credit card numbers and other types of sensitive data, this is a real danger. Unencrypted passwords, credit card numbers and other sensitive data are an easy target for a hacker with a network analyzer.

In many of the cases of mass theft of credit card numbers and passwords happen because hackers use a network analyzer on an unencrypted network. For truth's sake, it is important to mention that even if all the traffic is encrypted, there are still many other ways to obtain sensitive data. But when the traffic over a network is not encrypted and nobody monitors the network for unauthorized network analyzers, sooner or later data will be stolen.

One of the greatest achievements for hackers with a network analyzer is to capture the administrator's password. When the administrator's password is transmitted over the network in an unencrypted form, this is an easy target for hackers. If hackers manage to intercept the admin password, they have the power to do everything they want to on your network – delete data, modify data, etc. So, do you see why hackers don't need supernatural powers but only the admin password?

5 Things Our IT Department Have to Skip

In last blog, we have talked about the 5 items our IT department must do even in the big recession, in addition to the things we can't do without, there are many more things we had to skip. We are not exactly happy to stop doing these things but desperate times cry for desperate measures and since these activities are something we can do without we had to either quit them, or drastically reduce them:

  • No purchases of new hardware. Though it is not precise to say that we haven't bought a single piece of hardware in the last year, we have definitely cut hardware spendings. For the time being we do not plan to make major hardware purchases.


  • Capital expenditures. Capital expenditures are another budget item we had to drastically shrink. We had schedules projects but the current economic situation made us have second thoughts and now capital expenditures are on hold.


  • Software that is nice to have but we can do without it. Similarly to hardware and capital expenditures, some major software expenses had to be cut. Yes, there are many products, for instance accounting, HR, or ERP modules, which are great to have but we'll go for them when the economic outlook is less gloomy.


  • Standardization. You know that IT people generally hate when they have to deal with bureaucracy and standardization, so if there is an item, we are happy to skip, this is standardization. More or less we skipped all standardization-related activities except those, that are related to regulations compliance. Standardization is put on hold, especially if it requires investment or other resources.


  • No infrastructure upgrades. We are not exactly happy about this one but since there are more important items we can't skip, we had to significantly reduce the planned network upgrades. Some of the projects in this area are put on hold, while others are canceled.

It wasn't easy to decide what to skip and what to keep but when times are tough, it is not possible to pretend that everything is OK and go on as planned. We hope that we are right in our choices and time will show if we did wise choices or not.
James Ackland is Author of this article from http://www.colasoft.com/?prid=02060001.

About Colasoft Co., Ltd.
Ever since 2001, Colasoft has been dedicated in providing all-in-one and easy-to-use network analyzer software for network administrators and IT managers to monitor network activities, analyze network performance, enhance network security, and troubleshoot network problems. Up to now, more than 5000 customers in over 70 countries trust the flagship product – Colasoft Network Analyzer as their network monitoring and troubleshooting solution. Colasoft also offers four free network utilities: Colasoft Packet Builder, Colasoft Packet Player, Colasoft MAC Scanner, and Colasoft Ping Tool. Learn more about Colasoft and its solutions, please visit http://www.colasoft.com/?prid=02060001.

Best 101 Free Computer Software For Your Daily Use

Good things in life do not necessarily cost you a bomb. Below I have compiled a list of the top 101 free computer software you can make use of.

Enjoy!

Office Suite

  • OpenOffice.org - OpenOffice.org is a viable alternative to Microsoft Office – even for professional use. It can do just about anything Office can.
  • AbiWord – A lightweight version of Microsoft Office. Simple, straightforward interface; easy to use.
  • Jarte - A word processor based on the Microsoft WordPad. It can be run directly from a USB flash drive.
  • Notepad++ - A free source code editor and Notepad replacement, which supports several programming languages, running under the MS Windows environment.
  • EditPad Lite - A general-purpose text editor, designed to be small and compact, yet offer all the functionality you expect from a basic text editor.
  • Security

  • avast! 4 Home Edition - A complete antivirus solution that is able to find computer viruses, create and check the integrity of programs installed, test executed programs and opened documents, to test and check email and other functions.
  • AVG Anti-Virus - A free security solution that is easy to use, has low system resources, automatic update functionality and ability to protect as files are opened and programs are run.
  • Comodo Firewall – A free firewall that constantly monitors and defends your PC from internet attacks. It is a fully functional product that comes with continual updates that are free forever!
  • McAfee SiteAdvisor - A plugin for Firefox and IE browser that shows safety rating as you browse the Web.
  • SpyCatcher Express - A free anti-spyware program that allows novice PC users to remove aggressive spyware, stops next-generation, mutating spyware, blocks reinstallation of aggressive spyware and removes spyware safely and automatically.
  • StartupMonitor - A small monitoring program that keeps a constant eye on your system’s startup entries. When ever a change is made, you will be notified and given a choice to either allow the change or not to change.
  • SuperStorm Freeware – This software allows you to hide your confidential files and folders in a wide variety of media files such as pictures, audio, video, executable programs among many other file types.
  • Windows Defender - A free program that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software.
  • HijackThis - A malware remove tool that makes a detailed log of what’s going on in your Registry and gives you the opportunity to remove things that might be suspect.
  • Zone Alarm – This software lets you block uninitiated and unwanted traffic, even while your PC is unattended or while you’re not using your connection.
  • Desktop management

  • Google desktop - A desktop search application that gives you easy access to information on your computer and from the web.
  • Yahoo Desktop - Yahoo Desktop enables you to search and instantly find information, preview it in its native format, and take action on it immediately.
  • TweakUI – This software reduces the Windows annoyance without having to meddle with the registry. It gives you access to system settings that are not exposed in the Windows XP default user interface, including mouse settings, Explorer settings, taskbar settings, and more.
  • Pretty run - A small program that can search your start menu, desktop or any other folder for shortcuts.
  • RoboForm - RoboForm memorizes and securely stores each user name and password the first time you log into a site, then automatically supplies them when you return.
  • AutoHotkey - This open-source utility can automate almost anything by sending keystrokes and mouse clicks. You can write macros by hand or use the macro recorder. You can also create hotkeys for keyboard, mouse, joystick, and handheld remote controls.
  • Keepass safe - A password manager which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key-disk.
  • Clipomatic - A clipboard cache program that remembers what was copied to the clipboard and allows you to retrieve it, even after you’ve copied something else to the clipboard.
  • Browser

  • Firefox - Firefox includes tons of useful features such as tabbed browsing, built-in and customizable search bars, a built-in RSS reader and a huge library of extensions developed by thousand of developers.
  • Opera - Opera introduces Speed Dial which vastly improves navigation to your favorite sites. In addition, there’s Fraud protection, an anti-phishing detection keeps browsing safe and secure.
  • Crazy browser – A browser that allows users to collect tabs into groups and then load an entire group at once. This feature is very useful for research, as you can summon a set of related sites as needed, without manually opening each one.
  • Fun and Games

  • Banshee Screamer Alarm - A snoozeable alarm clock designed to wake you up. Play MP3s, execute programs, or shut down your computer at the time you set.
  • BZFlag - An online multiplayer cross-platform open source 3D tank battle game. It runs on Irix, Linux, BSD, Windows, Mac OS X, and many other platforms. It’s one of the most popular games ever on Silicon Graphics machines.
  • ConWare IconArt - An easy-to-use icon & cursor editor that allows your to design your own, edit previous icons, create cursors, capture icons from programs and DLL files or import an image for your icon.
  • Google Earth - Google Earth combines the power of Google Search with satellite imagery, maps, terrain and 3D buildings to put the world’s geographic information at your fingertips.
  • Tux Racer - Getting bored and sick of the Windows game? Tux Racer lets you take on the role of Tux the Linux Penguin as he races down steep, snow-covered mountains. Enter cups and compete to win the title!
  • ZSNES - A Nintendo emulator on your desktop. ZSNES is built to run on Windows, DOS, Linux and FreeBSD Unix and it is by far the best SNES emulator available.
  • Cartes du Ciel – A sky map that allows you to find out what constellations and planets are visible tonight.
  • Graphics Editing

  • GIMP – A complete image editing software with capabilities not found in any other free software product. It can be used as a simple paint program, an expert-quality photo-retouching program, a mass production image renderer, or an image-format converter.
  • Paint.net - A free image and photo editing software that features an intuitive and innovative user interface with support for layers, unlimited undo, special effects, and a wide variety of useful and powerful tools.
  • Google sketchup - A powerful yet easy-to-learn 3D software tool that combines a simple, yet robust tool-set with an intelligent drawing system that streamlines and simplifies 3D design.
  • IrfanView - A fast and compact image viewer/converter that is simple for beginners and powerful for professionals.
  • Video and Audio

  • Audacity – A complete recording and sound editing software that is available for Mac OS X, Microsoft Windows, GNU/Linux, and other operating systems.
  • Media Monkey - A music manager and jukebox for serious music collectors and iPod users. It offers an intelligent tag editor which looks up missing Album Art and track information via Freedb and the Web.
  • CDex - An application that records audio tracks from CDs and saves them to a disk as regular WAV files or as encoded sound files.
  • iTunes - One of the highest downloaded digital-jukebox software. Comes with the iTunes Music Store that offers music at 99-cents-per-song.
  • Winamp - A multimedia player that supports numerous audio and video formats. It also plays streamed video and audio content, both live and recorded, authored worldwide.
  • VLC - A highly portable multimedia player for various audio and video formats (MPEG-1, MPEG-2, MPEG-4, DivX, mp3, ogg, …) as well as DVDs, VCDs, and various streaming protocols.
  • QuickTime Alternative - This application let you play QuickTime or Real videos without Apple or Real’s bloated, in-your-face proprietary players.
  • PDF creator

  • PrimoPDF - A free tool for high-quality PDF creation, comprising a user-friendly interface that enables printing to PDF from virtually any Windows application.
  • PDF creator - A simple PDF creation tool for those who just want to skip the technical steps and produce a PDF file. If you know how to print, then you know how to use this software.
  • doPDF - Using doPDF, you can create searchable PDF files from virtually any application. You can search for text within the created PDF file, and search engines will also index the text from the PDF.
  • Virtual Server

  • VMware Server - VMware Server installs on any existing server hardware and partitions a physical server into multiple virtual machines by abstracting processor, memory, storage and networking resources, giving you greater hardware utilization and flexibility.
  • LogMeIn Hamachi – A VPN that allows you to access your home PC from work (or vice versa) as though you’re sitting right in front of it.
  • OpenVPN - OpenVPN is a tried and true VPN solution. It is totally secure and infinitely configurable. You can install and run this software without relying on a third party.
  • Instant Messaging

  • Windows Live messenger - The next generation MSN Messenger. It comes with everything that were already available in Messenger, and a new i’m Initiative that makes helping your favorite charity as easy as sending an instant message.
  • Pidgin - A multi-protocol Instant Messaging client that allows you to use all of your IM accounts at once. Pidgin can work with: AIM, Bonjour, Gadu-Gadu, Google Talk, ICQ, IRC, MSN, Yahoo!, MySpaceIM and many more.
  • Trillian - A fully featured, stand-alone, skinnable chat client that supports AIM, ICQ, MSN, Yahoo Messenger, and IRC.
  • Skype - A software that enables you to make free calls anywhere in the world.
  • Download manager

  • Download Accelerator Plus - A download manager that can enhance your download experience. Features include a search tab, security check for every site and application you download, more speed per connection, resume broken download and preview file when you download.
  • Internet download manager - A tool for increasing download speeds by up to 5 times, and for resuming, scheduling, and organizing downloads. The program will resume unfinished downloads due to network problems, or unexpected power outages.
  • Getright – As a download manager, GetRight supports BitTorrent downloads too. In addition, you can use GetRight to schedule your downloads for later; it can dial your modem (if needed), download the files you want, then hang up or even shut down your computer when it is done.
  • DownThemAll - A powerful yet easy-to-use Mozilla Firefox extension that adds new advanced download capabilities to your browser.
  • Flashgot - A Firefox extension that allows you to handle single and massive downloads using the external download managers of your choice.
  • File Management

  • Eraser - An advanced security tool for Windows that allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
  • Restoration - An easy to use and straight forward tool to undelete files that were removed from the recycle bin or directly deleted from within Windows (we were able to recover photos from a Flash card that had been formatted).
  • Torrent Manager

  • Azureus - A popular torrent manager that allows you to install plug-in and tweak your own settings.
  • µTorrent - A very, very tiny BitTorrent client that packs enough features into that small package to compete with beefier applications like Azureus.
  • Bitcomet – A bit torrent manager that allows videos files to be previewed while they’re still being downloaded, and there’s a built-in chat tool that lets users chat with other peers in the swarm.
  • Backup Program

  • Cobian Backup - A multi-threaded program that can be used to schedule and backup your files and directories from their original location to other directories/drives in the same computer or other computer in your network.
  • Back4Win – A backup program that uses industry standard ZIP compression to ensures that your data will be accessible regardless of which PC operating system. Does not have 4Gb and 65535 file limit of other ZIP backup programs.
  • DriveImage XML – This software allows you to backup logical drives and partitions to image files, browse these images, view and extract files, restore these images to the same or a different drive and copy directly from drive to drive.
  • JaBackup - JaBackup allows advanced automation features. You can schedule backup tasks by the second or minute, or on a hourly, daily, weekly, or monthly basis.
  • Xdrive Desktop - Xdrive gives you 5GB of online storage space to store and backup your files. The Xdrive desktop software allows you to backup and synchronize your data with the web server with few mouse clicks.
  • Gmail Space - Use your Gmail account as storage by uploading and downloading files through a browser-based interface.
  • File Compression

  • 7-zip – This software compresses files in new 7z format with LZMA compression. It supports multi formats, including 7z, ZIP, GZIP, BZIP2 and TAR, RAR, CAB, ISO, ARJ, LZH, CHM, Z, CPIO, RPM, DEB and NSIS.
  • Winzip - Using WinZip, you can quickly and easily compress and decompress files, folders, and entire folder trees to save storage space and reduce e-mail-transmission time, as well as encrypt and decrypt your sensitive documents.
  • AutoUnpack - This is designed to unpack your compressed file in a single quick step. You merely point to a folder containing your ZIP or RAR files and choose an output directory. Press one button to start a process that ends with your archive perfectly unpacked, or let the program automatically unpack that directory every set number of minutes.
  • ExtractNow - A simple program allows you to extract more than one archived file at a time, with one click of a button, making extracting files quicker and easier.
  • System Optimization and Diagnostic Tool

  • CCleaner - A system optimization and privacy tool that removes unused files from your system and allowing Windows to run faster and freeing up valuable hard disk space.
  • Security Process Explorer - An enhanced task manager, that provides advanced information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating.
  • Network Analyzer – Capsa is network analyzer software designed for network monitoring and troubleshooting purposes. It performs real-time packet capturing, 24/7 network monitoring, advanced protocol analyzing, in-depth packet decoding, and automatic expert diagnosing. By giving users insights into all of the network's operations, Capsa makes it easy to isolate and solve network problems, identify network bottleneck and bandwidth use, and detect network vulnerabilities, external attacks and insecure applications.
  • EULAlyzer - This takes your EULA agreement and analyze it in seconds, and provide a detailed listing of potentially interesting words and phrases. Discover if the software you’re about to install displays pop-up ads, transmits personally identifiable information, uses unique identifiers to track you, or more. It is great for picking out privacy issues.
  • Process Explorer - An advanced process management utility that picks up where Task Manager leaves off. It will show you detailed information about a process including its icon, command-line, full image path, memory statistics, user account, security attributes, and more.
  • Auslogics Disk Defrag – This software was designed to remedy system sluggishness and crashes caused by disk fragmentation. It is fast, simple to easy and what’s more, it is effective.
  • SmartDefrag - SmartDefrag boasts a system checker that continually defrags the files that you use the most, and does it without becoming a persistent drag on your system resources. The “Install It and Forget It” feature works automatically and quietly in the background on your computer and it only eats up 14MB of RAM, so it’s possible to run it smoothly on older machines.
  • Local Cooling - Fight global warming from your desktop! Local Cooling automatically optimizes your PC’s power consumption by using a more effective power save mode.
  • Belarc Advisor - Belarc Advisor builds a detailed profile of your installed software and hardware and analyzes elements such as whether antivirus software is up to date, or whether all the security flaws in Windows have been patched.
  • Email Client

  • Thundrebird - Thunderbird makes e-mailing safer, faster, and easier than ever before with the industry’s best implementations of features, such as intelligent spam filters, a built-in RSS reader, and quick search.
  • Eudora - A robust e-mail client whose features include multiple address-book-formatting options and the ability to filter, redirect, and forward mail. It supports QuickTime- and HTML-enriched e-mail, letting you include stylized, formatted text and in-line graphics in your messages.
  • Opera Mail - Opera Mail is integrated with the Opera browser, and lets you send, receive, sort and search your e-mails quicker and easier than with conventional e-mail programs.
  • Sylpheed - A surprisingly versatile email client. ‘Surprisingly’ because it has a friendly, easy to use interface to its many useful features.
  • PopTray - The premier pop-up mail checker for standard POP3 and IMAP mail accounts, including Gmail, and it can be coaxed to work with HTML-only mail such as Hotmail by following the instructions at the PopTray site.
  • Photo Organizer

  • Google Picasa - A free software that helps you locate and organize all the photos on your computer, edit and add effects to your photos with a few simple clicks and share your photos with others through email, prints and on the web.
  • Xnview - A fast multi-format graphics browser, viewer, and converter. It has an Explorer-like browser that allows quick and simple browsing of directory contents.
  • FxFoto – This software provides a single tool for automatically organizing, enhancing, annotating, e-mailing, printing, uploading, and archiving your digital photos.
  • Adobe Photoshop Album Starter Edition 3.0 – This software makes it easy to find, fix, and share your digital photos. Instantly fix photo flaws in just a click or two.
  • Jalbum - A gallery software that makes web albums from your digital images.
  • Video Converter

  • Free FLV Converter - This free software let you search youTube and dailyMotion videos without opening your browser and you can even watch the videos using the built-in video player.
  • Free Video To iPhone Converter - Convert video files to Apple iPhone MP4 video format. Convert the whole movie or select a partition from the movie to convert (trim video).
  • Any Video Converter - An all-in-one video converting freeware with easy-to-use graphical interface, fast converting speed, and excellent video quality.
  • iPod Video Converter - Free iPod Video Converter provides an easy and completed way to convert all popular video formats to iPod video.
  • FTP client

  • Filezilla - A full-featured FTP client that supports Secure FTP, SSL, and other protocols in a slick interface, complete with a tree-structured site manager that lets you store settings for multiple sites.
  • SmartFTP - An FTP client which allows you to transfer files between your local computer and a server on the Internet. SmartFTP offers secure, reliable and efficient transfers that make it a powerful tool.
  • FireFTP - FireFTP turns your browser into an FTP client, with a two-pane file manager for uploading and downloading.
  • EyeCandy

  • Yahoo Widget - A small, specific applications that you can run on your Windows or Mac OS desktop. You can download tons of useful widget from the widget gallery.

  • Thanks to Frank for recommending another free software. Here is it:
  • Process Scanner - This application gives you a complete analysis of all the processes running on your PC, along with a risk analysis of each one.
  • How To View MSN Chat Logs Through Network Analyzer

    With the development of internet, it currently has become a must for network administrators to monitor MSN information in some comparatively more confidential networks due to the increasing divulging of information through network. Though plenty of analysis on MSN can be found on net at present, many of them only introduce a kind of thread not an practicable way to solve this and consequently lead us to some quandaries. Under this situation, we proved that MSN chat logs can be viewed through Network Analyzer through our recent analysis on MSN communication. Details are as follows:

    Three most popular Network Analyzer, Sniffer Pro, Omnipeek and Colasoft Network Analyzer, are adopted with customizing a filter as the first step only to capture the data communication of MSN Protocol. In Omnipeek and Colasoft, we can directly select MSN in protocol filter, while in Sniffer Pro, no MSN Protocol can be found, but we can customize a Port filter of 1863port since TCP 1863 Port is the default operation route for MSN. Then, synchronously run three software sniffing and test MSN in local computer. Later, some data packets of MSN will be captured and then stop capturing to analyzing packets captured. According to some material, we found that MSN is encoded during Password Authentication phase, while all other information are not, and messages will begin with “X-MMS-IM-Format”. Search “X-MMS-IM-Format” in these analyzers adopted, results are listed below.



    Messages captured by all three analyzers are shown to be unanimous. The highlighting part in the picture is the chat logs of MSN. And you can see corresponding ASCI data.

    Chatting Specifics are still unavailable from the above shown data (For English and Numbers, chat logs can be found directly through ASCI decoding.), they need format converting with a tool named SmartConvert is add to the operation and the contents after converting are as follows through which a clear chat log of MSN is visible.

    Meanwhile, there is still another way of viewing original messages, from MIME-Version: 1.0 we can see the data using the MIME format, that is, Mail Format, thus, exporting this data packet (any format), then converting it to eml and finally running it with Outlook or Foxmail.

    All steps introduced above are the whole course for the test of capturing and analyzing of MSN, through these easy steps, one can have a thorough perspective of MSN communication in internet.

    Colasoft Network Analyzer - Capsa

    What is Capsa?

    Capsa is an easy-to-use Ethernet Network Analyzer (packet sniffer or network sniffer) for network monitoring and troubleshooting purposes.

    It allows you to monitor network operations, isolate & solve network problems, identify network bottleneck & bandwidth use, and detect vulnerabilities.

    It performs real-time packet capturing, 24/7 network monitoring, advanced protocol analyzing, in-depth packet decoding, and automatic expert diagnosing.

    KeyFeatures

    Traffic Statistics & Bandwidth Use

    With Capsa's network traffic monitor feature, we can quickly identify network bottleneck and detect network abnormities.

    Advanced Network Analyzer

    Being able to support more than 300 protocols in the latest version, Capsa make it easy to analyze protocols in network and understand what is happening.

    In-depth Packet Decoding

    As a Network Analyzer, Capsa is able to capture all network packets transmitted on network and displays detailed packet decoding information in Hex, ASCII and EBCDIC.


    By giving you insights into all of your network's operations, Capsa makes it easy to isolate and solve network problems, identify network bottleneck and bandwidth use, and detect network vulnerabilities

    Monitor Multiple Network Behaviors

    Colasoft Capsa can record global or scope-specific network events, containing many types of log primarily generated by the advanced analyzers: HTTP requests, email messages.

    Automatic Expert Network Diagnosis

    Capsa is able not only to automatically detect and clearly identify network events but also suggest corresponding solutions. You may also set your own thresholds according to your network's characteristic.

    Visualize all Connections in Matrix

    "Matrix" is a view that visualizes all network connections and traffic details in one single graph. The nodes around an elongated ellipse display the hosts in your network....

    Who use Capsa?

    Network administrators can directly monitor http requests, email messages, DNS queries, as well as real-time activities and message details for the four most popular instant messengers: MSN, AIM, ICQ, and Yahoo Messenger.

    Capsa is designed to be used by both IT professionals and novice users.

    Whether you're a network administrator who needs to identify, diagnose, and solve network problems quickly, an IT professional who wants to monitor user activities on the network, a security manager who needs to ensure that the corporation's communications assets are safe, or a consultant who has to quickly solve network problems for clients, Capsa has the tools that you need.

    Capsa has the tools that you would not find in other network analyzers, including tools to create and replay packets, and ping and scan IPs and MACs across the LAN.

    What separates Capsa from other network analyzers is its unique ability to conduct quick drilldown analysis on a single workstation, protocol or packet.

    Why Choose this Network Analyzer?

    Quick Drilldown Analysis
    Unique ability to conduct quick drilldown analysis on a single workstation, protocol or packet, allowing you quickly isolate network problems.
    Pure Software Solution
    Easy to install and deploy, regular and beneficial updates, no need to purchase expensive hardware devices.
    Easy to Use
    No training needed, no profound background required, data are displayed in intuitive tables and graphs; almost all customers comment Capsa as "easy to use".
    Timely Support
    Colasoft technical support team and customer service team are constantly dedicated to answering your questions regarding network troubleshooting and network analysis, for free.

    Latest User Opinions

    • Recommended Software by User yayaya
    The price is reasonable for this product has the perfect functions, such as real-time capturing and expertise diagnosis for our network which really meet our requirements!
    • Good performance and capability of diagnosing and troubleshooting by User Guferer
    After using Colasoft Capsa, we found that this product can not only support the real-time capturing and continual monitoring for our network, furthermore, it has the excellent capability of protocol analyzing (approximately 300 types) and packet decoding! So incredible performance it is! Well, the most exciting part is the automatic expert diagnosing! That really saves so much money and time for me, and I do not worry about the solution of failure again!
    • Download Colasoft Trial and Try by tgh12
    The software is good

    Top 5 Items Our IT Department Must Do

    Even though it is a basic economic fact that recessions happen once or twice in a decade, when the economy is in a good shape, like it was a couple of years ago, people, including IT managers, tend to forget that the summer will be over and hard times will come soon. On the other hand, recessions might be bad but the current one is certainly worse than many of the ones before. Actually, this is the worst recession since the Great Depression in the 1930s and even the most optimistically-minded managers have really serious reasons to fear and be cautious.

    We can't say that the recession took us by surprise but certainly we didn't expect it to be that fierce. However, recession or no recession, life must go on and if a company wants to make it, there are many things which can't be skipped. So, no matter that IT budgets are tight, there are items a company can't save on. Here are the top 5 items our IT department will not sacrifice:

    1, Network security and security in general. Being in the network security business themselves, we know that network security and security in general is paramount and no matter how hard the economic situation might be, this is not an item to save on because the price is too high. Certainly, we are not buying the most expensive solutions, even though they are incredibly great but we also do not make compromises with the quality either.

    2, Going green. Going green is also an item we can't skip. Green technology saves money and now this benefit is more important than ever. So, if we buy new IT stuff, we definitely go for the green items.

    3, Compliance. Regulations compliance is another item we can't afford to skip, unless we really want to go out of business (and we don't). So, when there are steps in this direction to be taken, we do them – no way!

    4, Training. Training is also important and even though our training budget has shrunk, we still try to keep our staff qualified.

    5, Outsourcing. Outsourcing has been a successful strategy for our company at all times and now, when money issues start to surface, we are happy that outsourcing helps us cut cost with no sacrifice of quality.


    Kevin Chou is Author of this article from www.Colasoft.com.

    About Colasoft Co., Ltd.
    Ever since 2001, Colasoft has been dedicated in providing all-in-one and easy-to-use network sniffer software for network administrators and IT managers to monitor network activities, analyze network performance, enhance network security, and troubleshoot network problems. Up to now, more than 5000 customers in over 70 countries trust the flagship product – Colasoft
    network analyzer as their network monitoring and troubleshooting solution. Colasoft also offers four free network utilities: Colasoft Packet Builder, Colasoft Packet Player, Colasoft MAC Scanner, and Colasoft Ping Tool. Learn more about Colasoft and its solutions, please visit http://www.colasoft.com/.


    Network Analyzer,Basic Tools of Network Administrators

    colasoft sniffer distributionNetwork Analyzers are a valuable tool for both network administrators and hackers. There are many network analyzers on the market and one of the most sophisticated is the network analyzer from Colasoft

    Network Analyzers are one of the best tools a network administrator has at his or her disposal to analyze network traffic and to troubleshoot problems. On the other hand, when a network analyzer is in the wrong hands – i.e. hackers use it – this can cause quite a lot of damage to a company or an individual, especially if the victim hasn't taken the required protective measures. You see, as with many things in life, network analyzers can be a great tool to maintain a network, yet they can be very destructive, if misused.

    Network Analyzers are very common, choose a best network analyzer for you. There are many network analyzers on the market and they range from free, to cheap, to expensive, from very simple, to advanced, to packed with features. Each type of network sniffers has its purposes and if you need a simple tool for quick results on a small network, you don't have to buy the most expensive network sniffers, no matter that they have tons of features. But in reality, if you need a network analyzer for professional use, low-end sniffers are not the answer and you need something more sophisticated, for example Colasoft Network Analyzer. Colasoft Network Analyzer is built around packet sniffing but includes many other useful features as well.

    As any other network analyzer, the network analyzer from Colasoft, intercepts and logs traffic, transmitted within a network (or a network segment). A network analyzer can be really invisible because it monitors the network (almost) unobtrusively. Since a network analyzer just sniffs the packets without modifying them, it doesn't cause disturbances to alert the administrator that something is going on. Unless the administrator doesn't run an anti-sniffer, the traffic can be eavesdropped and nobody will know about it.

    Of course, a good network administrator knows how to detect a network analyzer, so if you plan to get Colasoft network analyzer and use it in a malicious way, don't expect that this will go unnoticed. The network analyzer in the Colasoft Network Analyzer is not stealth but since anyway Colasoft Network Analyzer is intended for network troubleshooting, not network hacking, there is no reason to worry that the network sniffer is not hidden. When a network administrator uses a network analyzer in order to legitimately monitor network traffic, he or she doesn't need cover.

    One of the most important features of a network analyzer is the protocols it can sniff. In this aspect Colasoft Network Analyzer is an unbeaten network analyzer because it can monitor over 300 protocols. Colasoft knows that when the packets of major protocols are not captured, this gives a wrong impression about the traffic in the network and that is why Colasoft Network Analyzer supports so many protocols. And no, the protocols Colasoft Network Analyzer can sniff are not exotic ones – they are protocols used frequently in networks.

    Additionally, new and new protocols are added to the network analyzer from Colasoft, so even if your network uses some really rare protocols, which are currently not supported by Colasoft Network Analyzer, they could be added in the future. Well, if you expect that the network sniffer from Colasoft will sniff encrypted traffic, this will not happen because no network sniffer can do it!

    How to sniff all images of a webpage?

    In case we want to sniff all images of a webpage, here is a detailed process how we can do it with Colasoft network analyzer’s "Logs" feature. I will take the CNN.com home page as an example.

    Step 1. Open Log Settings

    Log settings allows us to set up some conditions or exceptions whether or not record some logs in the Logs tab. If we want to display just images in the Logs tab, we must enable the HTTP Log conditions.

    How to Sniff Images Screenshot 1

    Step 2. Enable Http Log Conditions

    We must tick before Conditions to enable it

    How to Sniff Images Screenshot 2

    Step 3. Input "Image" into Content Type

    On the right hand, lets’ input the content type in order to filter contents

    How to Sniffer Images Screenshot 3

    Here is an explanation of Content Type

    How to Sniff Images Screeshot 4

    Step 4. "OK" to Activate the Setting

    Now we’ve done with the Log Settings, let’s see whether we can sniff all images of CNN.com index page. First of all, let’s start capturing with Colasoft network analyzer, then let’s input the URL into the address bar and start browsing.

    Results start showing in the Logs Tab – Http Request Option, we can see all results are in image formats. We have successfully sniffed all the images on this webpage.

    How to Sniff Images Screeshot 5

    To view the image, we can click on the record, and it will be shown in a browser.

    How to Sniff Images Screenshot 6



    How to Protect Your Network with Network Analyzer?

    A Network analyzer (also called a network sniffer) can help you make your network more secure by identifying what's going on in it

    Networks are large entities, even if they don't consist of thousands of machines. Large networks are especially vulnerable because they are a fruitful ground for attacks and hacking of all kinds. Even if a system administrator is a genius, he or she can't fight network security threats with bare hands.

    Why Do You Need to Protect Your Network?

    One of the major principles in network security is that a network is as secure as its weakest part is. In other words, it makes no sense to invest tons of money and spend many hours to secure some of the parts of a network, when there are small vulnerabilities that can be easily abused.

    With networks small vulnerabilities are very common and even though one can never be sure that his or her network is secure, when no efforts in that direction are made, it is as sure as hell that this network is at risk. That is why it is absolutely clear that nobody can afford to leave a network unprotected. Fortunately, there are many tools, which help to protect a network and network analyzers are one of them.

    How a network analyzer Can Protect Your Network?

    Network analyzers (or network sniffers, as they are also called) can be one of the best tools you can use to protect your network. There are many types of network threats and there is no universal tool that can help you protect your network against all of them, so if you expect that a packet sniffer can safeguard your network against all kinds of threats, this is not so but it is a fact that a network sniffer can help you against many threats, both internal and external.

    colasoft network analyzer

    A network analyzer captures all the packets which go to and from your network and shows you their contents. While a network analyzer is helpless against encrypted traffic, with unencrypted traffic a network analyzer is an indispensable tool. When you have the chance to know what's going on in your network, you can easily spot the activities, which shouldn't be taking place.

    colasoft network analyzer

    For instance, if somebody is downloading files with BitTorrent, or is generating any other kind of substantial traffic, a network analyzer, such as Colasoft Network Analyzer, will display this immediately and you will know that you should take the adequate measures to stop it. Actually, a network analyzer allows to monitor all incoming and outgoing traffic and keep logs of this, so even if you don't react immediately when suspicious traffic occurs, all the traffic is logged and you can view it later.

    Depending on the features of the network analyzer you have selected, you will have different options to protect your network. Some of the network sniffers with a rich feature set, for instance Colasoft Network sniffer, offers a lot in terms of traffic monitoring. Generally, even the network sniffers with less features allow to monitor suspicious activity at least from a given host or protocol.

    One of the cases when network analyzer's don't offer much help is with encrypted traffic. This is a technical limitation and even though network analyzers can intercept encrypted packets, they can't break the encryption and show the actual content of the packet. However, when you are monitoring a network and you notice that there is unauthorized encrypted traffic (for instance from a given host), this should ring a bell that something not nice is probably going on and you should take the adequate measures to investigate what exactly is happening.

    Colasoft network analyzer, The hottest Network Tools of IT administrators

    Overview
    Not so hard for a freshman.
    Auto diagnosis.
    Real time capture.
    If it's cheaper, I will definitely buy it!
    After using Colasoft Network Analyzer, I found 3 features of this product:

    a.supports the real-time capturing and monitoring
    b.excellent capability of protocol analyzing (approximately 300 types) and packet decoding
    c.Well, the most exciting part is the automatic expert diagnosing! That really saves so much money and time for me,and I do not worry about the solution of failure again!

    Cost and performance are in desired level .

    What It Is and What It Can Do

    Colasoft network analyzer is an expert network analyzer designed for packet decoding and network diagnosis; it monitors the network traffic transmitted over a local host and a local network, with the ability of real time packet capture and accurate data analysis. Colasoft network analyzer makes your network operations completely transparent before you, letting you isolate and troubleshoot network problems quickly and efficiently. The flexible and intuitive user interface lets either IT professionals or novice users skilfully handle it in a few moments.

    Easily understand how to use this network analyzer with samples provided with the Tool. Sample packets helps me a lot for my first time deployment by avoiding contacting the Technical Support during my initial days of using this tool.

    For a Small Business Enterprise, This tool’s network diagnosis helps me to detect slow network and upgraded speed for better utilization.

    I prefer this for a Medium Business Enterprise as troubleshooting network issues is simply superb.

    For Medium and a Large Business Enterprises, Security is an issue .This network analyzer enhances Network Security by monitoring the network with Logs. As every packet is recorded and analyzed, loopholes can easily detect.

    For every organization, security is a major concern. By using this tool Monitoring of Email Contents and Monitoring IMs, Chats is easy. Every information in Messegers, chats, HTTP Requests is logged .

    Can easily find where the problem from the Packet Analysis without letting the user to report about his huge traffic.

    For Internet Service Provider, this is very very useful tool. ISPs have problems of Server down issues due to huge traffics. By diagnosing with this tool, Server down issues can be reduced.
    Prevent hibernation while capturing and view both IP Addresses and Hostnames. This is a good feature in upgraded version.

    Colasoft network analyzer Supports Windows Vista-64 bit Edition. Able to identify and Analyze 300+ Network Protocols.

    By going through the site www.colasoft.com, I came to know that Colasoft network analyzer Professional Edition available and used it for Analyses. It really good to use and operate. Everything is logged and my network usage is monitored.

    Videos in the website help me to understand the ARP Attacks, Monitoring Network traffic. So I can protect my network now by identifying the deceived hosts and by identifying who is consuming maximum bandwidth in a Local Segment.

    I can monitor the traffic either by protocol, IP or MAC Address. So much flexibility in using this network analyzer.

    Internet Service Providers can use this tool for quick issue troubleshooting. Easy to identify problems and minimizes the time to service the customer.

    The reports are displayed with Graphs and Tables .Viewing the connection in a matrix is wonderful and it is something special in Colasoft network analyzer. This pictorial epresentation is really good to sort out the issue by easily detecting.

    Colasoft network analyzer has the tools that would not find in other network analyzers, including ping and scan IPs and MACS across the LAN.

    Summary
    Colasoft network analyzer is an easy-to-use and all-in-one tool for IT Network Administrator, IT Consultant and for a Security Manager in IT Company.