is a handy application designed to secure and to analyze the traffic from a computer network. You can use it for a home network but also for a medium-sized company. With this application you can view the traffic speed for each computer in the network and limit the network speed on certain computers. You can also prevent the computers from performing certain operations that can infect them with malware.
Distributed network traffic monitor
Display real time network traffic speed for every computer in the network.
Display all active network applications on any computer in the network.
Display all sessions and listen to all ports for any active network application on any computer.
Display application properties and loaded modules.
Support "Internet Connection Sharing (ICS)", and can monitor network usage of ICS clients without installing the NetPeeker agent in the clients.
Can monitor NETBIOS file transfer, which is copying shared files inside a local network.
Use "WHOIS" service to get detailed information on selected remote IP addresses and domain names.
Desktop based firewall on all computers
Integrated system firewall and application firewall.
Support rules on applications, IP addresses/port numbers, remote country, DNS names, protocol types, and even HTTP URLs.
Rule-Exception mode rule structure for easier setup and understandable rule relations.
Support rule schedule, and can specify the effective time range for every firewall rule.
Fast firewall engine which can handle thousands of rules at the same time.
Drop invalid network packets.
Detect and block port scans, SYN floods, and DOS attacks.
Stealth mode to hide your computer from hackers.
Support importing spyware rules from BlueTack or Sponge, which have excellent anti-spyware rule lists
Limit network speed on all computers
Rule based network speed shaping. Rules can be specified on applications, IP addresses/port numbers, remote country, DNS names, protocol types, and even HTTP URLs.
Support rule schedule, can specify the effective time range for every speed limit rule.
"throttle priority" feature, which allow you to give critical applications or remote sites more bandwidth.
Network traffic quota, specify monthly/daily network usage quota before block or limit speed
Protect system against "Malwares"
Protect system by monitoring system operations, deny operation by rules. Can be used to prevent malware from running
Rule on registry operations can specify detailed access type
Rule on execution operations can specify the command line argument
For all rules, "actor"(parent process) can be specified to refine the rule.
Log and analyze network traffic
Log every session, including start/stop time, applications, remote addresses/ports, total transferred bytes and average speed.
Generate network traffic statistics report, and display period network usage for every application and every remote IP.
Store log information in compact mode to save disk space.
Support archiving on the fly, archive log files from remote agents, and save the files in .ZIP format.
Load archived log files without uncompressing the archive.
Support exporting log information into text format.