Jump to content

Search the Community

Showing results for tags 'monitoring'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 9 results

  1. I had bought one from onespy.in which has expired. Is there a cheaper or free but effective solution/s available? Please help/suggest something useful. Thanks.
  2. However high-end a PC might be, it’s pretty common for Windows users to start complaining at some point about the sluggishness of the system. In some cases, the problem might be due to low specced hardware, but in many cases it turns out to be something else. Like most things in this world, Windows needs to be taken good care of and serviced regularly. No matter if you’re are a newbie or a veteran, your Windows system will eventually run into issues that are not usually easy thing to diagnose. When this happens, you have the option of hiring someone to troubleshoot the problem for you, but this should be your last resort. You always have a better alternative, so why pay someone to fix the trouble when you can easily figure out the issue on your own using tools you can download for free? We strongly recommend giving these following diagnostics tools and software for monitoring system performance a chance first. You might be surprised by how much you will be able to resolve using them! The best PC performance monitoring tools CPU-Z CPU-Z is a cool program that scans your system for internal hardware configurations. It’s a must have if you ever plan on upgrading your PC and want to avoid incompatibility issues. This tool is also useful when you forget which components you have installed, which can be the case when you build your own PC. It will also help verify the components when you’re buying a used PC from someone you may not trust completely. Performance Monitor As in older versions of Windows, Windows 10 has a Performance Monitor,but this time it’s in the form of an application. Once you launch it, you just have to look at the sidebar and under Monitoring Tools, you should find the Performance Monitor. By default, it will only show “%Processor Time” which will display how much of your system is used at any given time. You’re able to add more Counters including energy used, disk usage, paging file size, search index size and more. Speccy This is one of the best tools available for letting know about CPU and GPU temperature, for free. If you choose to buy it, you’ll be able to enjoy more features. It supports all the sensors integrated on your PC and it detects data accurately by using them. Open Hardware Monitor This one is free open source software that will help you monitor the temperature of your CPU and GPU. If you hate the issues that might come up when using this sort of tool, then this is your best bet. In addition, its interface is very simple and plain. CrystalDiskInfo If you ever wondered if your hard drive or solid state drive is in the best possible condition, you probably know by now how difficult this information is to find considering how new SSDs can die before you get a chance to figure out what’s wrong. CrystalDiskInfo can become your best friend in such cases. This tool will give you a complete overview of the state of all your data drives like HDDs, SSDs, and USB drives. Details will include temperature, uptime, start-up time, error states, and more. It will also calculate the overall Health Status. Windows Resource Monitor Windows has a feature called the Resource Monitor implemented back in Vista. You’d have to launch it through the Task Manager, but now it’s a separate app in Windows 10 and you can launch it via the Start menu. Resource Monitor is an advanced way to view real-time data about your entire system and is usually used together with Performance Monitor. However, it’s mostly used for viewing process details and memory usage. LeeLu Monitors AIO If you are not satisfied with the built-in Windows perform tool, that this one is your best pick. This monitoring tool can help you track folders, registry files and memory files on your system. The package contains more utilities to help you check folders and it issues warnings when the faulty activities exceed a certain number of times. Wise System Monitor This is one of the best system monitoring tools out now, offering you a simple and quick way of monitoring the memory usage, CPU usage and all the related processes running with the hardware components installed in your PC. It lets you know what is consuming the system’s resources and which part of the PC is overheating. HW Monitor Most of the programs that we have listed above will work perfectly if you are a regular user. But in case you’re a gamer and you really need to know the stats of your gaming rig, this will turn out to be the best tool for your needs. It monitors PC systems primary health sensors, displaying CPU temperature, power consumption, mainboard voltage, fan speeds, GPU voltage and other related details. EnhanceMySe7ev Free This is a tweaking and system enhancement program that allows you to see the system information of your PC and the current temperature of the CPU and GPU. The tool will show the minimum and the maximum temperature of your processor along with other vital information such as fan speed. In addition, you’ll enjoy some utility features including disk defragment, registry cleaning, start up manager and more. CPU Thermometer This is another tiny tool that can easily determine the temperature of your system with a basic and simple interface. You can find out the current temperature of each core and also the percentage of load, as well, along with changing the units of temperature. We hope that you find all these monitoring tools useful. You probably will not need all of them, so pick the ones that seem the most valuable to you for maintaining your Windows PC. Article source
  3. If you own a company-sponsored laptop or connect to your company’s private network, there is a good chance that your employer is monitoring your Internet usage at work. It is not uncommon for companies to be known for employee monitoring. In fact, there are even guides online teaching employers how to effectively monitor their employees. Private things on your computer you would probably appreciate keeping it that way; private. Nobody really wants their employers or co-workers snooping about in there. So it is only natural to be interested in knowing as to who is watching you. How are your employers monitoring their employees? What are they looking at? Why do they do it? And is that even legal? WHAT CAN MY EMPLOYER SEE? So just how much is your employer able to see if they were monitoring your Internet access or laptops? Well, just imagine as if your boss was standing behind you and looking over your shoulder while you worked. THAT is what your employers can see. Given a company-supplied laptop device and Internet over the company’s network, your employer could monitor virtually almost anything and everything that goes in and out of your screen. Spending a little too much time shopping on Amazon? Your boss knows. Chatting with a friend about how sucky your boss is? He sees it. Sending a job application out through your email and then deleting it? Don’t think your employer cannot retrieve it. Your web surfing, emails, instant messages, downloads, files stored, display screen, keyboard strokes etc.; all these can and are probably being recorded. And if you were using a company mobile, that could be monitored too. HOW AM I BEING MONITORED? Two common ways employers monitor Internet usage are by: 1) Software on your computer. Software installed on your company-sponsored computer allows your employer to see what is on your screen or stored in your hard disks. There are numerous programs used by employers to track all your activity and sends reports to your boss or the IT department. The logs can show details from your web surfing habits, to time spent in specific software programs or your emails. 2) Monitoring over a corporate network. This method also allows an employer to track emails, websites and files but is harder to detect because it is done through a company’s private network. Even if you were using your company’s computer anywhere outside the office, a network analyser (aka. packet sniffer) that has been setup by network administrator to perform network troubleshoots can still be used as a ‘spyware’ as long as you are connected to the company’s network. WHY ARE COMPANIES MONITORING EMPLOYEES? It is unlikely that a boss would be monitoring their employees 24/7, as they would be ending up spending more time playing Big Brother rather than doing actual managing. It is also improbable of an employer to be actively monitoring each and every employee, and is more likely to do so only if a certain employee has given reason for them to question his/her behaviour. Employers may choose to monitor employees’ Internet usage for a variety of reasons. The company might be dealing with sensitive information and wish to prevent data misuse or leaks outside the company. Or perhaps a company wishes to hinder employees from performing malicious actions or downloading illegal content which could lead to malware compromising an entire network infrastructure. Employers may even use monitoring to gauge productivity of employees by means of keystroke monitoring (eg. How many keystrokes per hour each employee is performing). IS MY EMPLOYER ALLOWED TO DO ALL THIS? Yes and no. In the U.S., the Electronic Communications Privacy Act of 1986 (ECPA) states that it is against the law to “intercept” electronic communications like telephone, emails or computer. However, due to exceptions in this act, since your employer owns the equipment, they basically are free to access the equipment as they please. The exception in the law states that given employer-owned systems, they are allowed to access emails, phone message systems and instant messages as the company owns the computer network and terminals. Another exception is that the employer may monitor employees using their systems for “legitimate business needs”, which ultimately leaves it open to interpretation and misuse. In Malaysia, there are not many laws (if none) pertaining to workplace right to privacy. The closest we have is said to be the Personal Data Protection Act 2010 (PDPA) which focuses on the processing of personal data in commercial transactions, but probably less in regards to privacy rights. WHAT CAN YOU DO Some companies allow for ‘Bring Your Own Device (BYOD) Policies. This is a good solution to counter monitoring software that may be implanted on a company’s device. If bringing your own computer to the workplace seems a bit drastic, even bringing your own tablet is handy for checking a quick personal email or stealthy surfing. Got a smartphone? Or a mobile broadband? Great. These can be alternatives to using your company’s Wifi. Use a wireless tethering device and your cellular data if lack trust of your company’s network. Because you can still be tracked outside of the office whenever you connect to the company’s virtual private network, the simple way to offset this would be to disconnect from the company’s VPN any time you do not need to use it. Companies can see what you are doing online when the traffic on the corporate network is unencrypted. Using anonymizers like a VPN, such as BolehVPN, or a proxy can encrypt your traffic. Creating your own secure VPN tunnel hides your traffic from the local unencrypted network, which is something you should be using anyway especially if you are surfing over public Wifi. Be smart about your online habits when you are at work. If privacy is your concern, it is best to just keep your work and personal life separate if you're concerned about your privacy. Article source
  4. Monitoring SSL Traffic Now Everyone's Concern: A10 Networks As the uptake of SSL grows, Tim Blombery, systems engineer at A10 Networks, said threat actors are increasingly leveraging SSL-based encryption to hide malicious activity. As usage of Secure Sockets Layer (SSL) moves beyond the login page or banking website and out into the wider web, Tim Blombery, Systems Engineer at security firm A10 Networks, believes monitoring SSL traffic should now be a concern for almost every company. Blombery believes that encryption is necessary to protect online data in transit from being compromised, but noted threats are always evolving. With over half of the traffic on the internet now encrypted with SSL, he said bad actors are leveraging SSL-based encryption to hide malicious activity from existing security controls and technology. Consequently, Blombery said this means enterprises have lost the ability to look at the traffic that is traversing their network, opening themselves up to attack. "This is becoming an increasing vector for attacks and compromises of networks," he said. "I think SSL offers a very pertinent threat at the moment." Blombery said attacks often arrive via the likes of a Gmail account, which is encrypted to the desktop, with someone unwittingly opening a file containing a cryptolocker. "Off they go, they've compromised that particular system and potentially the entire network," he said. "Having SSL visibility is vital for Australian enterprises and I think they're just starting to get that idea." As it often takes a breach for someone to jump on board with a specific security solution, Blombery said more and more Australian businesses are starting to become aware of the need to monitor SSL traffic because they have either been affected or heard of someone who has been affected by this sort of attack. "There are serious breaches regularly, but everyone's breach is serious for them," he said. "Even the smallest of companies needs to be security conscious these days." The hardware for SSL inspection is a device sitting on the perimeter taking the SSL offload, the company said, which decrypts traffic and then passes it on to the firewall or IPS. "Once those devices do their job, they hand the traffic back to our device to re-encrpyt and send on to the destination -- that's traffic coming in or out," Blombery said. With mandatory breach reporting laws not yet in place in Australia, Blombery noted that even if there was an abundance of breaches due to SSL traffic not inspected, the public might not even know about it. "For the individuals affected, you certainly want to know if your account or any account is being breached -- you should be informed," he added. "A lot of people silly enough have the same password for everything or the same subset of passwords, so if a company you're working with has been breached and you don't have that visibility, then potentially all of your online identity can be compromised." A10 Networks recently completed its first acquisition, scooping up cloud application delivery firm Appcito. "It really expands us into not just the cloud but as a cloud native company as well," Blombery said. "Appcito brings load balancing as-a-service, in the cloud functionality that we'll be able to tie in with our own existing infrastructure based functionality, and allow for common policy to support the applications whether they're in the datacentre or in the public cloud somewhere." Blombery said Appcito is already embedded within A10 and are essentially the cloud decision of the organisation. Source
  5. Every day anti-piracy outfits monitor millions of unauthorized BitTorrent transfers. Among other things, the data collected is used to sent stark warnings to alleged pirates. However, according to a torrent site owner the tracking methods of these companies are not all foolproof. Nearly a decade ago, research from the University of Washington revealed that some piracy tracking outfits were painfully sloppy. The researchers found that not all anti-piracy companies actually check if someone’s sharing a file, before sending out their DMCA notices. As a result, a local printer at a university was branded a serial pirate. This mistake is the result of passive monitoring, where tracking outfits don’t verify if an IP-address in a BitTorrent swarm is actually trading pieces of a copyrighted file. This results in many false accusations, not least because many trackers insert random IP-addresses. While this practice has become more rare in recent years, tracking methods at some companies are still not perfect. TorrentFreak was recently approached by a torrent site operator who regularly scrapes trackers and BitTorrent’s DHT to discover new metadata. While his system is setup specifically to gather information (not to share any content), he is still accused of doing so by copyright holders. “In less than 24 hours of indexing we’ve received more than a dozen DMCA notices from IP-Echelon, claiming that we are ‘distributing copyrighted video files’,” the site owner explains. The odd part is that these notices we’re not meant for the website, but targeted the server that gathered the torrent information. These are similar to the warnings regular downloaders receive through their ISP, and list the IP-address and port that was allegedly used to “distribute” the files. TorrentFreak has seen copies of the notices in question, which are sent on behalf of major movie studios including Paramount Pictures. They were not sent to the torrent site directly, but to its hosting provider instead. “IP-Echelon has become aware that the below IP addresses have been using your service for distributing video files, which contain infringing video content that is exclusively owned by Paramount,” the tracking company writes. “We are requesting your immediate assistance in removing and disabling access to the infringing material from your network. We also ask that you ensure the user and/or IP address owner refrains from future use and sharing of Paramount materials and property,” the notice adds. The torrent site owner doesn’t deny that he is fetching information from the same BitTorrent swarms IP-Echelon is monitoring, but says that his systems are specifically configured not to share any infringing content. In fact, he also received notices for a server that only fetches torrent metadata from the DHT. “This server just fetches infodata, never starts any piece transfers. It was setup specifically as a ‘clean’ box and never participated in any torrent transfers,” he says. According to the site owner this shows that IP-Echelon doesn’t really bother to check if the people they accuse are actually sharing any substantial copyrighted data, unless they see metadata as “infringing” too. “To qualify for ‘sharing’ you have to actually share content. That is, have a piece of data, advertise that as available, and then send at least a valid piece of data when asked to. That would be proper actionable evidence. “IP Echelon just seems to spam anyone who turns up in peer lists,” he adds. When asking for additional details the site owner explained that his DHT fetching method uses libtorrent’s ‘disabled_storage’ storage setting. This means that no data is stored on the server, so there would be no infringing pieces to upload either. TorrentFreak contacted IP-Echelon to hear their side of the story, but the company preferred not to respond in detail. Instead, they left the following comment. “We do not comment in the press regarding IP-Echelon’s technology and operations. However, we can assure you that all statements made by IP-Echelon in dispatched notices are accurate,” the company replied. “Any recipient of a notice who has concerns about its legitimacy is welcome to get in touch with us direct,” the company added. Without a comprehensive audit on both ends it’s hard to conclusively say which side is right. However, this is certainly not the first time that torrent tracking methods have been called into doubt. Earlier this year researcher Aymeric Vitte TorrentFreak revealed extensive research showing that very few DHT tracking outfits actually check whether a BitTorrent user is actively uploading content. Article source
  6. The various privacy concerns surrounding Windows 10 have received a lot of coverage in the media, but it seems that there are ever more secrets coming to light. The Threshold 2 Update did nothing to curtail privacy invasion, and the latest Windows 10 installation figures show that Microsoft is also monitoring how long people are using the operating system. This might seem like a slightly strange statistic for Microsoft to keep track of, but the company knows how long, collectively, Windows 10 has been running on computers around the world. To have reached this figure (11 billion hours in December, apparently) Microsoft must have been logging individuals' usage times. Intrigued, we contacted Microsoft to find out what on earth is going on. If the company has indeed been checking up on when you are clocking in and out of Windows 10, it's not going to admit it. I asked how Microsoft has been able to determine the 11 billion hours figure. Is this another invasion of privacy, another instance of spying that users should be worried about? "I just wanted to check where this figure came from. Is it a case of asking people and calculating an average, working with data from a representative sample of people, or it is a case of monitoring every Windows 10 installation?" You think that Microsoft -- keen as it is on transparency -- would be quite happy to explain how it came about the information, and why it is being collected in the first place. But no. A Microsoft spokesperson provided BetaNews with the following statement: Microsoft's spying is intrusive enough to reveal how long you have been using Windows 10, but the company is not willing to be open about the collection of this data. Cause for concern, or is this just another example of what we have come to expect from Microsoft? Article source Windows 10 is reason enough for people to keep fun of Microsoft
  7. ProcessHackerPortable_2.34.0.5601_32bit_64bit_English.paf.exe Format: PortableApps.com Stealth: Yes Dependencies: KProcessHacker service requires elevated privileges. CRC32: BA0AE5AA 1.63 MB (1,711,339 bytes) Synopsis: now that i am running Windows 8 as my main OS.. i can more properly test to ensure full compatibility. Windows 8 Task Manager is rather proper.. but this provides additional advanced tools for developers/debuggers/etc. PortableApps.com's version forces x32/x86 mode. - which is problematic under Windows 8. - in addition, they do not support KProcessHacker service. Windows 8 - UAC must be enabled for x86 mode. (EnableLUA must be set to 1 in registry) - x86 mode is incompatible with elevated privileges. Changelog: (January 15, 2014) Improved error-checking Improved Windows 8 supportReplaceTaskManager has been removed from launcher Instead.. .reg files are included in Other directory. Installer will auto-populate .reg files w/correct location. Simply merge with elevated privileges. Source
  8. NetInfo 8.3 Build 915 / NetGong 8.3 Build 915 Eng + Keygen NetGong is a sophisticated network monitoring solution that allows network administrators, webmasters, and Internet service providers to monitor any networked device on the Internet, corporate intranet, or TCP/IP LAN and receive alerts immediately via audible alarm, message, e-mail, or third-party software when a connection fails. It is a powerful personal monitoring product delivering low cost, simplicity of operation, and round-the-clock coverage. Main Features: System service - Runs as a system service automatically on startup.Agentless monitoring - Allows you to monitor network devices or services without installing an agent on each machine. Independent parameters - Allows all parameters to be set independently for each network resource.Maintenance mode - Permits you to temporarily disable monitoring of certain resources.Robust alerting - Alerts you to failures using a variety of techniques ranging from audible alarms to third-party software.Alert schedule - Allows you "fine tune" the alerting functions to avoid unnecessary alerting during an extended failure.Failure and recovery alerts - Alerts can be enabled for any combination of failure and recovery notices.Custom alerts - Allows custom alerts to be created for each monitored resource.Test alert configuration - Each alert type can be tested in order to verify that the alert is configured correctly prior to going live.E-mail notification - Allows e-mail notification via SMTP with the server of your choice.SSL encrypted connections - Provides significant security benefits during authentication with mail server and data communication.Custom messages - Supports keyword values and customized message information.Integrated reporting - Offers real-time and historical reporting capabilities to assist you in tracking network resources availability.HTML report output - Provides reports in HTML format to help keep track of network resources availability in an easy to view list.Remote access - Provides remote access to the monitoring results using a Web browser. NetInfo is a collection of 15 different state-of-the-art network tools on a single, easy-to-use interface. Designed from first-hand experience, NetInfo allows businesses to more effectively combat network downtime by allowing network administrators, webmasters, and Internet service providers to more accurately isolate faults, simplify processing of diagnostic data and increase internal network security. Main Features: Local Info - Displays system IP addresses and MAC addresses.Connections - Displays all local TCP/IP connections and their foreign connection IP address.Ping - Allows you to quickly verify network connectivity to another IP address on the network.Trace - Displays a list of routers between your system and the destination system.Lookup - Allows you to perform DNS forward and reverse lookup queries.Finger - Displays information about users currently logged on to a specified server.Whois - Allows you to query contact information for domains registered with a Whois server.Daytime - Displays the local time of day for any remote host specified.Time - Allows you to query the time value from a remote time server and synchronize the time value with your local system clock.Quote - Allows you to view quotations from a remote Quote server.HTML - Displays the HTML header code and the page data for any Web page address specified.Scanner - Scans for host names for a particular range of IP addresses and displays the state of each IP address in the range.Services - Lists the available network services (HTTP, Telnet, DNS, SMTP, and so on) for a particular host.E-mail - Allows you to verify any e-mail address by simply entering a full user principal name ([email protected]).Web Center - Displays available online tools, how-tos, tips, and news.System Requirements: Windows XP/2003/Vista/2008/7/2008 R2/8/2012 (32-bit or 64-bit versions).Internet Explorer 6 or later.NetInfo 8.3 (Build 915) September 15, 2013 The final release of NetInfo 8.3 is now available for download. It includes improved E-mail tool - your powerful solution for the standard "message delivery error", improved Web Center that helps you find the most useful tools, how-tos, and tips available online, and Windows 8.1 (the next version of Windows for PCs) compatibility. NetGong 8.3 (Build 915) September 15, 2013 The final release of NetGong 8.3 is now available for download. It includes improved Web server that provides authenticated access to the monitoring results using a Web browser, improved alert system that let you to send customized notification once network connectivity is lost or restored, and Windows 8.1 (the next version of Windows for PCs) compatibility. Website: http://netinfo.tsarfin.com/ Website: http://netgong.tsarfin.com/ Language: Eng Medicine: Keygen Size: 7,34 / 5,54 Mb.
  9. CrystalDiskInfo 6 Alpha 1 ML Portable CrystalDiskInfo monitors the status of hard drives that support SMART technology The program monitors and provides an overall assessment of the "health" of your drive. Displays detailed information about the hard drives installed in the PC (firmware, serial number, interface standard, the total time and so on), displays the attributes of the parameters of the system self-SMART (Productivity, read errors, start / stop spindle, the number of on-off cycles, seek time, error sectors and many more). With the CrystalDiskInfo can view detailed information about the drives installed in the computer, as well as a list of parameters of the system self-SMART The program supports localization, and interchangeable themes. In addition, the utility keeps track of dynamically changing parameters for all the drives in the system and allows you to display it on the chart. There is support for external drives, USB and IEEE 1394. A complete list of supported chips and controllers can be found on the official site (learn more). It is also implemented to control AAM and APM for external devices. Key features: Supports a part of external USB disksMonitoring health status and temperatureAlert MailGraph of S.M.A.R.T. informationControl AAM / APM settings Website: http://crystalmark.info OS: Windows XP / Vista / 7 / 8 Language: Multi Size: 2,4 Mb.
×