Network Monitor 3.3 is available in ia64, x64, and x86 versions and can run on Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Windows 7, Windows Vista, and Windows XP systems.
Network Monitor 3.3 expands on the capabilities of the previous versions of Network Monitor by including several more features and fixes for issues that were discovered in the 3.x versions. Network Monitor 3.3 is very flexible and can even stop a capture based on an event log entry in Event Viewer.
The previous versions of Network Monitor included the following:
. An optimized interface that included network conversations and an expandable tree view of frames for the conversation(s)
. A real-time display and updating of captures
. The ability to capture traffic on multiple network cards simultaneously
. The ability to run multiple capture sessions simultaneously
. A script-based protocol parser language
. Support for Windows Server 2008, Windows Vista, Windows XP, and Windows Server 2003 on 32- or 64-bit platforms
. The ability to capture wireless traffic, scan one or all wireless channels supported by the network card, and view signal strength and transfer speed of the connection
. The ability to trace traffic inside of a Windows Vista virtual private network (VPN) tunnel by capturing remote access server (RAS) traffic
. The ability to right-click in the Frame Summary pane and click Add to Filter
. Support for the Windows Update service by periodically checking for updates to the Network Monitor program
. A redesigned filter toolbar
. A redesigned engine for supporting more protocol schemes
. New public parsers like ip1394, ipcp, PPPoE, and more
Some of the new features in Network Monitor 3.3 include the following:
. Support for Windows Server 2008 R2, Hyper-V, and Windows 7
. The ability to capture WWAN and tunnel traffic on Window 7 computers
. Support for both IPv4 and IPV6
Source of Information : Sams - Windows Server 2008 R2 Unleashed
Subscribe to:
Post Comments (Atom)
Cloud storage is for blocks too, not just files
One of the misconceptions about cloud storage is that it is only useful for storing files. This assumption comes from the popularity of file...
-
Many of the virus, adware, security, and crash problems with Windows occu when someone installs a driver of dubious origin. The driver suppo...
-
The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. T...
-
Modern computers contain a significant amount of memory, and it isn’t easy to know whether the memory is usable. Because of the way that Win...
No comments:
Post a Comment