Net-Peeker Group Edition 3.50.1177

Net-Peeker Group Edition 3.50.1177

Net-Peeker Group Edition Full Download Summary

User Rating: 1.2 (11 votes)

  • File size: 10.40 MB
  • Platform: Windows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64
  • License: Trialware
  • Price: $50.00
  • Downloads: Total: 949 | This Month: 2
  • Released: Apr 15, 2014
  • Publisher: Ming Jin's Software
  • Publisher URL:

Net-Peeker Group Edition 3.50.1177 Full Description

Net-Peeker Group Edition is a handy application designed to secure and to analyze the traffic from a computer network. You can use it for a home network but also for a medium-sized company. With this application you can view the traffic speed for each computer in the network and limit the network speed on certain computers. You can also prevent the computers from performing certain operations that can infect them with malware.

Main Features

Distributed network traffic monitor

Display real time network traffic speed for every computer in the network.
Display all active network applications on any computer in the network.
Display all sessions and listen to all ports for any active network application on any computer.
Display application properties and loaded modules.
Support "Internet Connection Sharing (ICS)", and can monitor network usage of ICS clients without installing the NetPeeker agent in the clients.
Can monitor NETBIOS file transfer, which is copying shared files inside a local network.
Use "WHOIS" service to get detailed information on selected remote IP addresses and domain names.

Desktop based firewall on all computers

Integrated system firewall and application firewall.
Support rules on applications, IP addresses/port numbers, remote country, DNS names, protocol types, and even HTTP URLs.
Rule-Exception mode rule structure for easier setup and understandable rule relations.
Support rule schedule, and can specify the effective time range for every firewall rule.
Fast firewall engine which can handle thousands of rules at the same time.
Drop invalid network packets.
Detect and block port scans, SYN floods, and DOS attacks.
Stealth mode to hide your computer from hackers.
Support importing spyware rules from BlueTack or Sponge, which have excellent anti-spyware rule lists

Limit network speed on all computers

Rule based network speed shaping. Rules can be specified on applications, IP addresses/port numbers, remote country, DNS names, protocol types, and even HTTP URLs.
Support rule schedule, can specify the effective time range for every speed limit rule.
"throttle priority" feature, which allow you to give critical applications or remote sites more bandwidth.
Network traffic quota, specify monthly/daily network usage quota before block or limit speed

Protect system against "Malwares"

Protect system by monitoring system operations, deny operation by rules. Can be used to prevent malware from running
Rule on registry operations can specify detailed access type
Rule on execution operations can specify the command line argument
For all rules, "actor"(parent process) can be specified to refine the rule.

Log and analyze network traffic

Log every session, including start/stop time, applications, remote addresses/ports, total transferred bytes and average speed.
Generate network traffic statistics report, and display period network usage for every application and every remote IP.
Store log information in compact mode to save disk space.
Support archiving on the fly, archive log files from remote agents, and save the files in .ZIP format.
Load archived log files without uncompressing the archive.
Support exporting log information into text format.

Release notes:

New Release
Optimized priority based throttle to be more smart and try to not waste network bandwidth.
Clean the Throttle setting page, move settings into extra dialog, to make settings clear.
Re-written the DOS detection code. Now it can detect DOS in period of "minute" or "hour" instead of "second" only.
Re-written the SYN flood protection code, actively force windows TCP/IP stack to release resources for the half-open sessions, to be able to accept more incoming connections
"System Guard" feature added ability to block .NET executibles.
Optimized BlueTrak rule importing, to be able to import more than 300000 records in short time. Also limited GUI ruleset tree to display only first 100 imported item, to improve dialog loading speed.
Personal Edition: Show different toaster title color for triggered allow/deny/ask rules.
Personal Edition: When close main window to the tray icon, display the "still running" balloon only twice (keep slient after twice display)
[ Net-Peeker Group Edition full changelog ]
free download

Net-Peeker Group Edition 3.50.1177 Bookmark

Hyperlink code:
Hyperlink and Intro code:
Hyperlink for Forum code:

Net-Peeker Group Edition 3.50.1177 Free Download Notice

Top 4 Download periodically updates software information of Net-Peeker Group Edition 3.50.1177 full version from the publisher, but some information may be slightly out-of-date.

Using warez version, crack, warez passwords, patches, serial numbers, registration codes, key generator, pirate key, keymaker or keygen for Net-Peeker Group Edition 3.50.1177 license key is illegal and prevent future development of Net-Peeker Group Edition 3.50.1177. Download links are directly from our mirrors or publisher's website, Net-Peeker Group Edition 3.50.1177 torrent files or shared files from free file sharing and free upload services, including Rapidshare, HellShare, HotFile, FileServe, MegaUpload, YouSendIt, SendSpace, DepositFiles, Letitbit, MailBigFile, DropSend, MediaMax, LeapFile, zUpload, MyOtherDrive, DivShare or MediaFire, are not allowed!

Your computer will be at risk getting infected with spyware, adware, viruses, worms, trojan horses, dialers, etc while you are searching and browsing these illegal sites which distribute a so called keygen, key generator, pirate key, serial number, warez full version or crack for Net-Peeker Group Edition 3.50.1177 download. These infections might corrupt your computer installation or breach your privacy. A keygen or key generator might contain a trojan horse opening a backdoor on your computer. Hackers can use this backdoor to take control of your computer, copy data from your computer or to use your computer to distribute viruses and spam to other people.

Net-Peeker Group Edition 3.50.1177 - Post Your Review