SlideShare a Scribd company logo
Lizard Systems Network Scanner
• Network Scanner is an IP scanner for
  scanning both large corporate networks
  with hundred thousands of computers and
  small home networks with several
  computers. The program can scan both a list
  of IP addresses or computers and ranges of
  IP addresses. The number of computers and
  subnets is not limited.
• Network Scanner will show you all
  resources, including system and
  hidden NetBIOS resources
  and FTP and web resources. Not only
  network administrators can use Network
  Scanner to audit network computers, but
  also regular users can use it to search for
  available network resources.
• Network Scanner will not only find network
  computers and resources, but also check
  access rights to them (read/write). You can
  mount the found resources as a network
  drive or you can open them in Explorer or in
  your browser.
• Easy to use. Even an inexperienced user will
  be able to scan the network with just several
  mouse clicks.
• Good performance. The program uses multi-
  threaded scanning. The network scan rate
  achieves thousands of computers per
  minute.
• Scalability. You can scan either several
  computers from the list or whole subnets
  the number of which in the list is not limited.
• Flexible filtering options. You can filter the
  results by type of resource or access rights.
• Customizable computer status check. The
  program checks if the computer is on/off not
  only with a ping, but also with a connection to
  the ports specified by the user.
• Retrieving the NetBIOS or domain computer
  name (defined by the user).
• You will see all available computer
  resources. Not only getting NetBIOS
  resources, but also scanning for FTP and web
  servers.
• Network resource audit. The program will
  check access rights to resources (read/write)
  both for the current user and for any
  specified user.
• Available to all users. No administrator
  privileges are required for scanning.
• Exporting the scan results. You can export
  them to html, txt or xml.
Interface of Network Scanner
The End

More Related Content

What's hot

Burp suite
Burp suiteBurp suite
Burp suite
penetration Tester
 
Free OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoringFree OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoring
ManageEngine, Zoho Corporation
 
Network and server performance monitoring training
Network and server performance monitoring trainingNetwork and server performance monitoring training
Network and server performance monitoring training
ManageEngine, Zoho Corporation
 
CNIT 128 3. Attacking iOS Applications (Part 1)
CNIT 128 3. Attacking iOS Applications (Part 1)CNIT 128 3. Attacking iOS Applications (Part 1)
CNIT 128 3. Attacking iOS Applications (Part 1)
Sam Bowne
 
Network Maps & Reporting [Free OpManager Training - Part 5]
Network Maps & Reporting [Free OpManager Training - Part 5]Network Maps & Reporting [Free OpManager Training - Part 5]
Network Maps & Reporting [Free OpManager Training - Part 5]
ManageEngine, Zoho Corporation
 
Wireshark
WiresharkWireshark
A NEW CONCEPT FOR SYSTEMS OF HOME REMOTE CONTROL
A NEW CONCEPT FOR SYSTEMS OF HOME REMOTE CONTROLA NEW CONCEPT FOR SYSTEMS OF HOME REMOTE CONTROL
A NEW CONCEPT FOR SYSTEMS OF HOME REMOTE CONTROL
Nguyễn Thái Bình
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring Rationale
Sam Bowne
 
CNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsCNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating Applications
Sam Bowne
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
cmstiernberg
 
Python urllib
Python urllibPython urllib
Python urllib
udhayakumarc1
 
[Free OpManager training] Part 4- Network fault-management & IT automation
[Free OpManager training]  Part 4- Network fault-management & IT automation[Free OpManager training]  Part 4- Network fault-management & IT automation
[Free OpManager training] Part 4- Network fault-management & IT automation
ManageEngine, Zoho Corporation
 
Ecase direct servlet acess v1
Ecase direct servlet acess  v1Ecase direct servlet acess  v1
Ecase direct servlet acess v1
Damir Delija
 
2. Collecting Network Traffic & 3. Standalone NSM Deployment
2. Collecting Network Traffic & 3. Standalone NSM Deployment2. Collecting Network Traffic & 3. Standalone NSM Deployment
2. Collecting Network Traffic & 3. Standalone NSM Deployment
Sam Bowne
 
2015 COSCUP SDN Workshop -- SDN Quick Start
2015 COSCUP SDN Workshop -- SDN Quick Start2015 COSCUP SDN Workshop -- SDN Quick Start
2015 COSCUP SDN Workshop -- SDN Quick Start
Yi Tseng
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
Samant Khajuria
 
MITM Attacks with Ettercap : TTU CyberEagles Club
MITM Attacks with Ettercap : TTU CyberEagles ClubMITM Attacks with Ettercap : TTU CyberEagles Club
MITM Attacks with Ettercap : TTU CyberEagles Club
Shritesh Bhattarai
 
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data CollectionCNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
Sam Bowne
 
KearnsSean_Mentorship_Presentation-2016-06-06
KearnsSean_Mentorship_Presentation-2016-06-06KearnsSean_Mentorship_Presentation-2016-06-06
KearnsSean_Mentorship_Presentation-2016-06-06Sean Kearns
 

What's hot (20)

Burp suite
Burp suiteBurp suite
Burp suite
 
Free OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoringFree OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoring
 
Network and server performance monitoring training
Network and server performance monitoring trainingNetwork and server performance monitoring training
Network and server performance monitoring training
 
CNIT 128 3. Attacking iOS Applications (Part 1)
CNIT 128 3. Attacking iOS Applications (Part 1)CNIT 128 3. Attacking iOS Applications (Part 1)
CNIT 128 3. Attacking iOS Applications (Part 1)
 
Network Maps & Reporting [Free OpManager Training - Part 5]
Network Maps & Reporting [Free OpManager Training - Part 5]Network Maps & Reporting [Free OpManager Training - Part 5]
Network Maps & Reporting [Free OpManager Training - Part 5]
 
Wireshark
WiresharkWireshark
Wireshark
 
A NEW CONCEPT FOR SYSTEMS OF HOME REMOTE CONTROL
A NEW CONCEPT FOR SYSTEMS OF HOME REMOTE CONTROLA NEW CONCEPT FOR SYSTEMS OF HOME REMOTE CONTROL
A NEW CONCEPT FOR SYSTEMS OF HOME REMOTE CONTROL
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring Rationale
 
CNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsCNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating Applications
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Python urllib
Python urllibPython urllib
Python urllib
 
[Free OpManager training] Part 4- Network fault-management & IT automation
[Free OpManager training]  Part 4- Network fault-management & IT automation[Free OpManager training]  Part 4- Network fault-management & IT automation
[Free OpManager training] Part 4- Network fault-management & IT automation
 
373 Poster
373 Poster373 Poster
373 Poster
 
Ecase direct servlet acess v1
Ecase direct servlet acess  v1Ecase direct servlet acess  v1
Ecase direct servlet acess v1
 
2. Collecting Network Traffic & 3. Standalone NSM Deployment
2. Collecting Network Traffic & 3. Standalone NSM Deployment2. Collecting Network Traffic & 3. Standalone NSM Deployment
2. Collecting Network Traffic & 3. Standalone NSM Deployment
 
2015 COSCUP SDN Workshop -- SDN Quick Start
2015 COSCUP SDN Workshop -- SDN Quick Start2015 COSCUP SDN Workshop -- SDN Quick Start
2015 COSCUP SDN Workshop -- SDN Quick Start
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
 
MITM Attacks with Ettercap : TTU CyberEagles Club
MITM Attacks with Ettercap : TTU CyberEagles ClubMITM Attacks with Ettercap : TTU CyberEagles Club
MITM Attacks with Ettercap : TTU CyberEagles Club
 
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data CollectionCNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
 
KearnsSean_Mentorship_Presentation-2016-06-06
KearnsSean_Mentorship_Presentation-2016-06-06KearnsSean_Mentorship_Presentation-2016-06-06
KearnsSean_Mentorship_Presentation-2016-06-06
 

Viewers also liked

Practica de aula (2)
Practica de aula (2)Practica de aula (2)
Practica de aula (2)
Jorge Mercado
 
Otitis media crónica
Otitis media crónica Otitis media crónica
Otitis media crónica
Heart Yong
 
Some of my latest paintings
Some of my latest paintingsSome of my latest paintings
Some of my latest paintingsOrquin Santiago
 
IFAC smo 1 information for practitioners
IFAC smo 1 information for practitionersIFAC smo 1 information for practitioners
IFAC smo 1 information for practitioners
Ransford Armah
 
Manejo integral de la obesidad, diabetes, hipertension
Manejo integral de la obesidad, diabetes, hipertensionManejo integral de la obesidad, diabetes, hipertension
Manejo integral de la obesidad, diabetes, hipertension
Heart Yong
 
ISQC 1 training for smp's
ISQC 1 training for smp'sISQC 1 training for smp's
ISQC 1 training for smp's
Ransford Armah
 
Practice Management for Chartered Accountants in Practice
Practice Management for Chartered Accountants in PracticePractice Management for Chartered Accountants in Practice
Practice Management for Chartered Accountants in Practice
Ransford Armah
 
Providing value added services to clients by accountants in practice
Providing value added services to clients by accountants in practiceProviding value added services to clients by accountants in practice
Providing value added services to clients by accountants in practice
Ransford Armah
 
Bgp multihoming
Bgp multihomingBgp multihoming
Bgp multihomingee38sp
 
presentation about kaizen
presentation about kaizenpresentation about kaizen
presentation about kaizen
gupa9294
 
Determinants of Osteoporosis
Determinants of OsteoporosisDeterminants of Osteoporosis
Determinants of Osteoporosis
bramarao
 

Viewers also liked (15)

Practica de aula (2)
Practica de aula (2)Practica de aula (2)
Practica de aula (2)
 
Otitis media crónica
Otitis media crónica Otitis media crónica
Otitis media crónica
 
Ivm1257
Ivm1257Ivm1257
Ivm1257
 
Cape cod chanty
Cape cod chantyCape cod chanty
Cape cod chanty
 
Some of my latest paintings
Some of my latest paintingsSome of my latest paintings
Some of my latest paintings
 
IFAC smo 1 information for practitioners
IFAC smo 1 information for practitionersIFAC smo 1 information for practitioners
IFAC smo 1 information for practitioners
 
Manejo integral de la obesidad, diabetes, hipertension
Manejo integral de la obesidad, diabetes, hipertensionManejo integral de la obesidad, diabetes, hipertension
Manejo integral de la obesidad, diabetes, hipertension
 
Ivm1257
Ivm1257Ivm1257
Ivm1257
 
ISQC 1 training for smp's
ISQC 1 training for smp'sISQC 1 training for smp's
ISQC 1 training for smp's
 
Network scanner
Network scannerNetwork scanner
Network scanner
 
Practice Management for Chartered Accountants in Practice
Practice Management for Chartered Accountants in PracticePractice Management for Chartered Accountants in Practice
Practice Management for Chartered Accountants in Practice
 
Providing value added services to clients by accountants in practice
Providing value added services to clients by accountants in practiceProviding value added services to clients by accountants in practice
Providing value added services to clients by accountants in practice
 
Bgp multihoming
Bgp multihomingBgp multihoming
Bgp multihoming
 
presentation about kaizen
presentation about kaizenpresentation about kaizen
presentation about kaizen
 
Determinants of Osteoporosis
Determinants of OsteoporosisDeterminants of Osteoporosis
Determinants of Osteoporosis
 

Similar to Network scanner

ManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical OverviewManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical Overview
ManageEngine, Zoho Corporation
 
wireshark-090916114253-phpapp01 (1).pdf
wireshark-090916114253-phpapp01 (1).pdfwireshark-090916114253-phpapp01 (1).pdf
wireshark-090916114253-phpapp01 (1).pdf
LuisCarlos663610
 
Automated tools for penetration testing
Automated tools for penetration testingAutomated tools for penetration testing
Automated tools for penetration testing
devanshdubey7
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
Divya Jyoti
 
Security tools
Security toolsSecurity tools
Server operating system
Server operating systemServer operating system
Server operating system
Tapan Khilar
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
EduclentMegasoftel
 
Zenoss presentation (nur nabilah hassan)
Zenoss presentation (nur nabilah hassan)Zenoss presentation (nur nabilah hassan)
Zenoss presentation (nur nabilah hassan)
Nur Nabilah Hassan
 
Netdruid Presentation
Netdruid PresentationNetdruid Presentation
Netdruid Presentation
dineshmisal
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
 
fdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.pptfdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.ppt
KrishanPalSingh39
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
Pooja Bhojwani
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
Mark John Lado, MIT
 
Practical White Hat Hacker Training - Vulnerability Detection
Practical White Hat Hacker Training - Vulnerability DetectionPractical White Hat Hacker Training - Vulnerability Detection
Practical White Hat Hacker Training - Vulnerability Detection
PRISMA CSI
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
ManageEngine, Zoho Corporation
 
Nessus is a network security toolIn a pragraph describe how it is .pdf
Nessus is a network security toolIn a pragraph describe how it is .pdfNessus is a network security toolIn a pragraph describe how it is .pdf
Nessus is a network security toolIn a pragraph describe how it is .pdf
fckindswear
 

Similar to Network scanner (20)

ManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical OverviewManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical Overview
 
wireshark-090916114253-phpapp01 (1).pdf
wireshark-090916114253-phpapp01 (1).pdfwireshark-090916114253-phpapp01 (1).pdf
wireshark-090916114253-phpapp01 (1).pdf
 
Automated tools for penetration testing
Automated tools for penetration testingAutomated tools for penetration testing
Automated tools for penetration testing
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Security tools
Security toolsSecurity tools
Security tools
 
Server operating system
Server operating systemServer operating system
Server operating system
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Zenoss presentation (nur nabilah hassan)
Zenoss presentation (nur nabilah hassan)Zenoss presentation (nur nabilah hassan)
Zenoss presentation (nur nabilah hassan)
 
Network Security Tools
Network Security ToolsNetwork Security Tools
Network Security Tools
 
Netdruid Presentation
Netdruid PresentationNetdruid Presentation
Netdruid Presentation
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
fdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.pptfdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.ppt
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
Practical White Hat Hacker Training - Vulnerability Detection
Practical White Hat Hacker Training - Vulnerability DetectionPractical White Hat Hacker Training - Vulnerability Detection
Practical White Hat Hacker Training - Vulnerability Detection
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
 
Nessus is a network security toolIn a pragraph describe how it is .pdf
Nessus is a network security toolIn a pragraph describe how it is .pdfNessus is a network security toolIn a pragraph describe how it is .pdf
Nessus is a network security toolIn a pragraph describe how it is .pdf
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Network scanner

  • 2. • Network Scanner is an IP scanner for scanning both large corporate networks with hundred thousands of computers and small home networks with several computers. The program can scan both a list of IP addresses or computers and ranges of IP addresses. The number of computers and subnets is not limited.
  • 3. • Network Scanner will show you all resources, including system and hidden NetBIOS resources and FTP and web resources. Not only network administrators can use Network Scanner to audit network computers, but also regular users can use it to search for available network resources.
  • 4. • Network Scanner will not only find network computers and resources, but also check access rights to them (read/write). You can mount the found resources as a network drive or you can open them in Explorer or in your browser.
  • 5. • Easy to use. Even an inexperienced user will be able to scan the network with just several mouse clicks. • Good performance. The program uses multi- threaded scanning. The network scan rate achieves thousands of computers per minute.
  • 6. • Scalability. You can scan either several computers from the list or whole subnets the number of which in the list is not limited. • Flexible filtering options. You can filter the results by type of resource or access rights.
  • 7. • Customizable computer status check. The program checks if the computer is on/off not only with a ping, but also with a connection to the ports specified by the user. • Retrieving the NetBIOS or domain computer name (defined by the user). • You will see all available computer resources. Not only getting NetBIOS resources, but also scanning for FTP and web servers.
  • 8. • Network resource audit. The program will check access rights to resources (read/write) both for the current user and for any specified user. • Available to all users. No administrator privileges are required for scanning. • Exporting the scan results. You can export them to html, txt or xml.