Qosmos NI_DUMP (“Network Intelligence Dump”) is Linux-based tool inspired by the popular tcpdump, enabling you to read, print, or save packet data related to traffic traveling over your network. Qosmos NI_DUMP is a light and versatile packet capture tool that recognizes 120 of the most commonly used protocols and applications, including SMTP, HTTP, MySQL, and NFs. This represents a small but useful sample of the full Qosmos Protocol Portfolio, comprising over 300 protocols and 4000 metadata. Unlike conventional packet dump tools, Qosmos NI_Dump can identify protocols using non-standard TCP or UDP ports, and incorporates an easy-to-use advanced filter expression language that enables users to zoom in on data of most interest to them, such as FTP transfers matching a particular filename or HTTP requests containing a particular keyword.
Fing is a command line tool for network and service discovery. It provides you a complete view of any network in a very short time. Its smart discovery automatically detects the network type and uses the best technique to scan it. The best results are achieved on Ethernet networks (including Wireless ones), where Fing is able to detect all network hosts, firewalled ones included. The service discovery feature quickly detects active TCP services on a target host or network. Fing is based on Look@LAN.
GroundWork Monitor Community Edition can give you insight into your computing infrastructure, allowing you to see the current and historical states of all your computers: servers, desktops, and laptops, all of your network devices, all of your services (like TCP/IP and Web services), and all of your applications (like mail servers and database apps). You can choose to be alerted when something goes awry via pager, SMS, email, or phone, and even set up automatic restarts or fall-overs.
CensorNet Professional is a Web filtering and Internet management tool that is designed to protect, control, and monitor individuals accessing Internet resources on a local area network. It features the ability to control users and machines, group policies, time quotas, realtime content filters (by file extension or image/MIME type), modules, comprehensive reporting with audit trails and management reports, access schedules, and bandwidth limitations. Transparent authentication with Active Directory is available for ease of deployment. Administration can been done using a Web interface.