Capsa 6.9 R2 is Coming Very Soon
We are going to release Capsa 6.9 R2 very soon, stay close 🙂
We are going to release Capsa 6.9 R2 very soon, stay close 🙂
What Is an Email Worm
In networking, an email worm is a computer worm which can copy itself to the shared folder in system. And it will keep sending infected emails to stochastic email addresses. In this way, it spreads fast via SMTP mail servers.
What Is the Harm of Email Worm
An email worm can send lots of infected emails in a very short time and it will never stop unless it’s removed. It will cause a large traffic and make the system go slowly. Sometimes it even makes the mail server crash.
How to Detect Email Worm
If you are suspicious some host in your network is infected with an email worm, here is a process how we can detect email worm in network with Colasoft Packet Sniffer, step by step.
>Step1. Download a free trial and deploy it properly.
>Step2. Launch a Project and Start Capturing Some Traffic.
>Step3. Switch to “Diagnosis” Tab
Diagnosis tab is a view we can see all the network issues automatically detected by Colasoft Packet Sniffer, also some causes and solutions are suggested.
If there is a host infected with an email worm, we should be able to see SMTP events in the application layer like this:
>Step4. Locate the Source IP
Possibly the source IP is the host infected with an email worm as it is sending too many emails in a short period of time with SMTP. So let’s locate the source IP in the “Explorer” with the “Locate” shortcut in the right-click menu.
>Step5. Switch to “Logs” Tab
Check if the host is sending emails to a large number of recipients in a very short period of time. If so, we can determine the host is infected with an email worm and should be handled immediately. We should be able to see logs in the Tab like this:
No doubt the final step is to isolate the host and kill the email worm with some AV software
Also there will be some other process to detect email worm with Colasoft Packet Sniffer, this is the shortest one.
We are happy to see that keyloggers.org, which has a special appetite in reviewing and testing monitoring software, recently tested and reviewed Capsa Enterprise Edition, also gave it a very favorable comment.
Colasoft Capsa also has a lot of other advantages, but we think you already understood the two generic ones – first, the information analyzed by Colasoft Capsa is easy to access and view and, second, the program itself is very user-friendly and easy to understand. These qualities make Colasoft Capsa a perfect choice both for experts and novices in network administration.
To view to full review, you can click here.
Are you ready for this? We are. Say goodbye to the Free edition and get your license key for the Pro edition immediately!
What’s the difference anyway?
With MAC Scanner Pro Edition, you can:
Find the difference yourself as you can get it for free!
Cheers,
Colasoft Team
Good news for the users who need advanced features in MAC Scanner Pro:
Later this month we’ll announce an event which users can get MAC Scanner Pro (market price $99) completely Free.
So please keep up with our blog and be the lucky ones, subscribe our rss with the tool on the right top corner.
Good Luck! 🙂
BitTorrent Consumes Big Bandwidth
Based on the working principle of BitTorrent protocol, if somebody is downloading big files with BitTorrent software, it will be a disaster for other users who need bandwidth for business operations as the user will consume large amount of bandwidth, thus causing long time network slowness, intermittence, even disconnections; because meantime the user downloading files from others, others are downloading files from him.
So it is necessary for IT administrators to track BitTorrent user at first place to regain network bandwidth for business operations. Blocking BitTorrent protocol can be one way; this article is to discuss how to track BitTorrent users with Colasoft Packet Sniffer.
How to Track BitTorrent User?
>Step1. Download a free trial and implement it correctly
>Step2. Launch a project and start capturing data
>Step3. Find BitTorrent Protocol in the “Protocols” Tab
>Setp4. Locate BitTorrent Protocol in the “Explorer”
Use the “Locate” function to locate BitTorrent protocol in the “Explorer” to analyze dedicated data.
>Step5. Track BitTorrent User in LAN in the “Endpoint” Tab
This is the way how to track the BitTorrent user in our network and who are connected with him. There is a lot more we can see from this tab, such as how much data has been downloaded and uploaded via BitTorrent protocol.
View how many connections have been built in “Matrix”
You’ll be shocked to see how many connections have been built in the “Matrix” Tab. In this case, we can see this user has built more than 1000 connections with other hosts.
About BitTorrent
BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data. BitTorrent is one of the most common protocols for transferring large files.
The protocol works when a file provider initially makes his/her file (or group of files) available to the network. This is called a seed and allows others, named peers, to connect and download the file. Each peer that downloads a part of the data makes it available to other peers to download. After the file is successfully downloaded by a peer, many continue to make the data available, becoming additional seeds. This distributed nature of BitTorrent leads to a viral spreading of a file throughout peers. As more peers join the swarm, the likelihood of a successful download increases. Relative to standard Internet hosting, this provides a significant reduction in the original distributor’s hardware and bandwidth resource costs. It also provides redundancy against system problems and reduces dependence on the original distributor.
Next Step
>>Download a Free Trial
For some purposes we want to monitor MSN chat around the network, for example, parents want to monitor MSN chat of their kids to ensure their safety; bosses want to monitor MSN chat of employees for company assets security and to improve work efficiency by minimizing none-business chat during working hours. You may still remember Colasoft MSN Monitor, now it is called Unipeek MSN Monitor and it is distributed completely Free for none commercial users.
Now let’s see how we can monitor MSN chat with Unipeek MSN Monitor, the free tool.
Step1. Download Unipeek MSN Monitor
Download Unipeek MSN Monitor, the free edition; from the website. As a matter of fact there is no function difference between Unipeek MSN Monitor the free edition and the commercial edition. The only difference is Unipeek MSN Monitor Free Edition only supports 10 MSN accounts maximum, but quite enough for family users.
Step2. Install and Deploy Unipeek MSN Monitor
The installation is quick and simple, just click “next” all the way to complete the installation. But the deployment is somewhat different. As Unipeek MSN Monitor is designed based on Colasoft’s packet capturing technology, so it has to be deployed properly like a packet sniffer if you want to monitor all MSN chat around the network. Of course, you don’t have to do it if you only want to monitor MSN chat of a single computer. To monitor multiple computers, you can install multiple copies.
Setp3. Run it and Start Monitor MSN Chat
After proper installation and deployment, we can start monitoring MSN chat right away.
About Unipeek MSN Monitor
Unipeek MSN Monitor (MSN sniffer) is Free MSN monitoring software for MSN chat monitoring and MSN message archiving. Based on Colasoft’s packet analysis technology, Unipeek MSN Monitor is able to deliver the most accurate MSN monitoring statistics, and automatically record data for future reference. You need only install Unipeek MSN Monitor once to monitor all MSN chats over the local network.
Key Features include:
• Real-time and 24/7 MSN chat monitoring
• Automatically archive MSN messages for future reference
• Export messages of a custom time range
• Customize MSN account list to be monitored
• Unique Conversation Matrix showing account relations
• Support emotion icons, message font size and color.
Download Now
Download Unipeek MSN Monitor
Some people may doubt if it is legal to monitor email of employees with an email monitor software (aka. email spy or email checker), but this is not the topic of this article. We are going to discuss how we can monitor email with some technical methods, especially how we can monitor email with this packet sniffer – Colasoft Capsa.
Step 1. Still we need to download a free trial and deploy it correctly.
Step 2. Launch a project
If we have not set Capsa to save email logs to a local disk, we’ll not be able to monitor email contents but we can monitor all email logs. So we must set the log settings to save email logs to a local path in order to monitor email contents. Also there will be a notice when start a new project.
Setp3. Set Email Logs Settings
View full image to set the email logs setting correctly.
Advanced Email logs settings to split email logs and keep the most recent email logs to save disk space.
Step 4. Start Capturing and Monitoring Email in “Logs” Tab
After email log settings is finished, we can do a test to see if we can get some email monitoring logs. Let’s launch Outlook and start sending and receiving emails. We can see that we’ve received many spam email in my email box. We can see a lot of information in the logs Tab, such as date and time, client name, email subject, sender and receiver name, size, and more.
Step 5. Monitor Email Contents
In order to view the original content of an email, the process is quite simple, just double-click on the logs, then Capsa will call an email software to display the email content, basically Outlook.
Now this is the entire process how we can monitor email with Colasoft Capsa, we hope you enjoy this article.
Next Step
>>Download a Free Trial
Colasoft is saving you from financial crisis!
10% off discount for Colasoft Network Analyzer
Save at least $55 to purchase Capsa in May!
Buy Now with this Coupon Code:
MAYOFF10
If you have not yet downloaded Colasoft Capsa, Click the button and try it Now!
Note: this coupon applies to Single Seat License only.
In computer networking, a Media Access Control address (MAC address) is a unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification, and used in the Media Access Control protocol sublayer. If assigned by the manufacturer, a MAC address usually encodes the manufacturer’s registered identification number. It may also be known as an Ethernet Hardware Address (EHA), hardware address, adapter address, or physical address.
Since a MAC Address is unique for most network adapters or network interface cards (NICs), it is important for IT administrators to know all the MAC addresses in LAN so as to quickly locate a network device when a network issue arises. Luckily we have tools to help us out. Let’s see how we can easily find MAC address in LAN with Colasoft MAC Scanner.
Colasoft MAC Scanner is a Free software to find MAC address and IP address. It can automatically detect all subnets according to the IP addresses configured on multiple NICs of a machine and find MAC addresses and IP addresses of defined subnets as your need. Users can custom own scan process by specifying the subsequent threads.
Step 1. Download Colasoft MAC Scanner
Step2. Install Colasoft MAC Scanner
The installation of Colasoft MAC Scanner is quick and easy, it is suggested to install Colasoft MAC Scanner on a laptop as it only scans and finds MAC addresses and IP addresses in the subnet to which the laptop is connected.
Step3. Start a Scan
It’s easy and quick, just press the start button, the Colasoft MAC Scanner will scan and find MAC addresses and IP addresses in the subnet and list them out. The results can be “copy and paste” or exported for future reference.
Now the problem is: if a LAN is divided into several subnets, we’ll have to move the laptop around and scan each subnet in order to find all MAC addresses and IP addresses. Then what’s the solution?
Find MAC Address and IP Address with Colasoft Packet Sniffer
Colasoft Packet Sniffer allows us to find MAC addresses and IP addresses both local and remote in the network as long as there is network communication initiated.