Author Archive

Great offers on now!

November 7th, 2016 No comments

We are pleased to announce that a Special Offer in November starts now.

This Special sale will last until November 30th, please find more information at:

Categories: News & Events Tags:

Colasoft Announces Release of nChronos v5.2

October 19th, 2016 Comments off

October 19, 2016 – Colasoft, an innovative provider of powerful and affordable network analysis and application performance analysis solutions, today announced the release of its flagship product Colasoft nChronos Network Performance Analysis Solution v5.2. nChronos v5.2 comes with new types of alarms and adds TCP transaction analysis.

nChronos v5.2 provides a baseline analysis feature. Choose a baseline type, and then the baseline will be generated and displayed automatically. Furthermore, users can configure baseline alarms by setting a deviation threshold from the baseline. Also provided are whitelist and blacklist alarms, which allow users to customize whitelist and blacklist. Baseline analysis, together with blacklist and white alarms, makes it easy for network administrators to find out abnormal network traffic and abnormal net

Colasoft Announces Release of UPM v5.1

August 23rd, 2016 Comments off

August 23, 2016– Colasoft, a leading provider of innovative and affordable network analysis solutions, announces the release of a new version of Colasoft UPM today. With the release of Colasoft UPM V5.1, just by a glance, users can know network running status, business running status and whether there are alarms triggered. In addition to business monitor and analysis, UPM 5.1 provides direct traffic monitor and analysis, and automatic network performance analysis. Besides new features, this release brings a lot of improvements, which will help users a lot on both network performance analysis and application performance analysis.

This new version of Colasoft UPM comes with a New Home Page, which could display the overall monitor status in real-time.Also, UPM Center provides a Probe Traffic Monitor page to display traffic trend charts for each probe. And a Probe Traffic Analysis page is add

Categories: News & Events, Uncategorized Tags:

How to Analyze Network Traffic Based on Local Processes

August 10th, 2016 No comments
Categories: Tips & How-tos Tags: ,

Case Study: Carvajal Technology & Services

August 10th, 2016 No comments

Colasoft Announces Release of Capsa Network Analyzer v9.0

June 24th, 2016 Comments off

June 21, 2016 – Colasoft LLC, a leading provider of innovative and affordable network analysis solutions, today announced the availability of Colasoft Capsa Network Analyzer v9.0, a real-time portable network analyzer for wired and wireless network monitoring, bandwidth analysis, and intrusion detection. Together with the new release of Capsa, Colasoft MAC Scanner, Ping Tool, Packet Player and Packet Builder are all enhanced and released to the public.

Network traffic could be analyzed based on local processes in Capsa v9.0. The new release provides a Process View and a Process Explorer, with which users could easily find the network conversations for a local process, listing process name, process ID and bytes. By only a few clicks, packets data for proc

Categories: News & Events Tags:

Free Mac Scanner Software: Colasoft Mac Scanner Reviewed By ilovefreesoftware

May 17th, 2016 No comments

Below is the Colasoft Mac Scanner review from

Colasoft MAC Scanner is a free network scanner software for Windows. It can scan all the ports of your local network for connected devices. It can provides you the details such as: IP Address, MAC Address, Host Name, Workgroup, and Manufacturer.

It provides the details in tabular format, and you can easily export the data to txt or csv format. The program is helpful for Network Administrators to maintain a list of Network assets. You can easily check who is using your network.

How to Scan Network for Connected Devices using Colasoft MAC Scanner:

It is very easy to use this tool to scan the entire network, and find details of all the connected devices.

You can click Start button on the main toolbar or press F5 key from your keyboard to start the scanning process. You can run it from Start Menu Run command also by typing “csmac” and pressing Enter key. It automatically detects all the Local Subnet list or you can click Refresh from the Local Subnet dropdown. It takes just a few seconds to scan the entire network, and keeps showing details of the devices while scanning.

Once the scanning is complete, you can export the list of connected devices. You can export the list in  .TXT, or .CSV  format, and also in its native .CSCNTAB (Colasoft Name Table File).

The size of the program is just 6.79 MB and it can works with almost every Windows version.

If you want to export only some records for later reference; you can do this too by selecting the records you want and click the Export Selected button on the main toolbar or use context menu command to do so.


More commands like Copy, Delete, Find are also there in the Default toolbar and in the Edit menu. Also if the scanning process is taking much time, you can then Pause or Stop the process any time by pressing the desired button.

Another interesting feature of this software is that it also lets you specify number of threads that can be used for scanning. You can choose between 1 to 100 threads. More the number of threads, faster will be the scanning performance.

Limitations of this software:

Despite being good at what it does, this software comes with its limitations and drawbacks as well. First of all, the documentation of this software talks about some features, which are actually not available in the free version. Secondly, I tested this software multiple times, but it never gave me the “Manufacturer” information.

Get Colasoft Mac Scanner.

Free MAC Scanner Software: Colasoft MAC Scanner reviewed by Arun Kumar on April 15, 2016 rated 4.0 of 5

Categories: Reviews Tags:

Colasoft Announces Release of nChronos Network Performance Analysis Solution v5.1

April 27th, 2016 Comments off

April 26, 2016 – Colasoft (, an innovative provider of powerful and affordable network analysis solutions, today announced the release of its flagship product Colasoft nChronos Network  Performance Analysis Solution v5.1. With the packets of user-defined applications can be stored with truncated length now, the storage and retrieval performance are greatly improved. In addition, HTTP packets reconstruction and packets replay link are now available in nChronos 5.1, allowing network managers to easily monitor network activities and replay packets for abnormality diagnosis.

People have attached more and more importance to the security of the web information. While as the central protocol of web’s application layer, HTTP forms the founda

Categories: News & Events Tags:

Detect Brute-Force Attacks With nChronos Network Security Forensic Analysis Tool

March 29th, 2016 No comments

Brute-force attacks are commonly known attack methods by which hackers try to getaccess to restricted accounts and data using an exhaustive list/database of usernamesand passwords. Brute-force attacks can be used, in theory, against almost any encrypted data.

When it comes to user accounts (web based or system based), the first sign of a brute-force attack is when we see multiple attempts to login to an account, therefore allowing us to detect a brute-force attack by analyzing packets that contain such events. We’ll show you how Colasoft’s nChronos can be used to identify brute-force attacks, and obtain valuable information that can help discover the identity of the attacker plus more.

For an attacker to obtain access to a user account on a website via brute force, he is required to use the site’s login page, causing an alarming amount of login attempts from his IP address. nChronos is capable of capturing such events and triggering a transaction alarm, warning system administrators of brute-force attacks and when the triggering condition was met.


First, we need to create a transaction analysis to specify the pattern/behavior we are interested in monitoring:

From the nChronos main page, first select the server/IP address we want to monitor from the Server Explorer section.

Next, from the Link Properties, go to the Application section and then the Analysis Settings as shown below:


Figure 1. Creating a Transaction Analysis in nChronos (click to enlarge)

Now click the button of New Web Application (second green button at the top) to set a Web Application, input Name and HTTP Hostname, then check the box labeled Enable Transaction Analysis and add a transaction with URL subpath e.g “/login.html”.

Proactively monitor your network 24/7 for attacks, suspicious network traffic and problems – Download nChronos now!

At this point we’ve created the necessary Transaction Analysis. All that’s required now is to create the Transaction Alarm.

To create the alarm, click Transaction Alarms in the left window, input the basic information and choose the parameter of Transaction Statistics in Type, and then set a Triggering Condition as needed, for example, 100 times in 1 minute. This means that the specific alarm will activate as soon as there are 100 or more logins within a minute:


Figure 2. Creating a Transaction Alarm (click to enlarge)

Finally, you can choose Send to email box or Send to SYSLOG to send the alarm notification. Once complete, the transaction alarm fordetecting brute-force attack is set. When the alarm triggering condition is met an email notification is sent.

Note that the specific alarm triggering condition does not examine the amount of logins per IP address, which means the alarm condition will be met regardless if the 100 login attempts/min is from one or more individual IP addresses. This can be manually changed from theTransaction Analysis so that it shows the login attempt times of each individual IP address.

Below is a sample output from an alarm triggered:


Figure 3. nChronos Brute-Force alarm triggered – Overall report (click to enlarge)

And below we see the same alarm with a per-IP address analysis:


Figure 4. nChronos Brute-Force alarm triggered – IP breakdown (click to enlarge)

The article shows how nChronos can be used to successfully detect a Brute-Force attack against any node on a network or evenwebsites, and at the same time alert system administrators or IT managers of the event. If you’re a network administrator, network engineer or IT manager, we strongly suggest you try out Colasoft nChronos today and see how easily you can troubleshoot network problems, proactively obtain alerts on unusual network traffic and monitor your network around the clock.



Colasoft Capsa Network Analyzer v8.3 is Available Now!

March 29th, 2016 No comments

We are very pleased today to announce that a new version of Colasoft Capsa Network Analyzer, a real-time portable network analyzer for wired and wireless network monitoring, bandwidth analysis, and intrusion detection, is now available.

Capsa Network Analyzer v8.3 comes with the following improvements and fixed bugs:

  • The Windows 10 operating system logs off from time to time when starting Capsa.
  • Added name table cannot be auto-saved.
  • Packet files with capitalized extension cannot be replayed.
  • Log View settings in Analysis Profile cannot be auto-saved.
  • For wireless analysis, no packets are shown on the Packet view when a MAC address is selected in the Node Explorer.

A free trial of Capsa network analyzer v8.3 is available for download at: