<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AthTek Blog &#187; Tony</title>
	<atom:link href="http://www.athtek.com/blog/author/tony/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.athtek.com/blog</link>
	<description>network monitor,packet sniffing,Skype voice recorder,DirectX toolkit, registrycleaner, code to flowchart and other free software</description>
	<lastBuildDate>Thu, 19 Aug 2021 22:26:13 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.38</generator>
	<item>
		<title>How to guide against others mooch Off Wi-Fi?</title>
		<link>http://www.athtek.com/blog/2013/09/29/how-to-guide-against-others-mooch-off-wi-fi/</link>
		<comments>http://www.athtek.com/blog/2013/09/29/how-to-guide-against-others-mooch-off-wi-fi/#comments</comments>
		<pubDate>Sun, 29 Sep 2013 01:28:48 +0000</pubDate>
		<dc:creator><![CDATA[Tony]]></dc:creator>
				<category><![CDATA[IP Scanner & MAC Scanner]]></category>
		<category><![CDATA[Product News]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[Using Experience]]></category>
		<category><![CDATA[Best IP Scanner]]></category>
		<category><![CDATA[ip scanner]]></category>
		<category><![CDATA[IP-MAC]]></category>
		<category><![CDATA[mooch off wifi]]></category>

		<guid isPermaLink="false">http://www.athtek.com/blog/?p=1593</guid>
		<description><![CDATA[Nowadays, people have been not satisfied with PC, they prefer to use Mobile devices (such as Mobile phones). However, usually they have not enough 3G traffics, so do would to be in a environment with Wi-Fi, Therefore, the main topic &#8230; <a href="http://www.athtek.com/blog/2013/09/29/how-to-guide-against-others-mooch-off-wi-fi/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p style="text-align: justify;">Nowadays, people have been not satisfied with PC, they prefer to use Mobile devices (such as Mobile phones). However, usually they have not enough 3G traffics, so do would to be in a environment with Wi-Fi, Therefore, the main topic about   <a href="http://www.athtek.com/ip-mac-scanner/mooch-off-wifi.html">mooch Off Wi-Fi</a> is introduced.</p>
<p style="text-align: justify;">Let us focus on this scene： When you establish a Local Area Network,  you would ask a question,  whether there is a &#8220;thief&#8221; stealing our net?  If you want to secure your network, you’d better know is there anyone mooch Off Wi-Fi from your network. According to a research, people like to mooch Off Wi-Fi if they can get access. If it is an immoral guy, he might do harm to your network when mooch Off Wi-Fi from you. On the other hand, if your internet free was charged by traffic, who mooch Off Wi-Fi from you may add on your bill. IP – MAC Scanner provide a solution to find out who mooch Off Wi-Fi from you, even to kick them out. It scans all connections on your network, and tell you which are unknown connections by a network analysis report.</p>
<p style="text-align: justify;">Therefore, you should find the one who mooch Off Wi-Fi from you, you can go through four steps (including Main Board phase, Database phase, Email notification phase, Send message to remote desktop phase)</p>
<p style="text-align: justify;"><a href="http://www.athtek.com/blog/wp-content/uploads/2013/09/backup-1.jpg"><img class="alignnone size-full wp-image-1571" alt="backup-1" src="http://www.athtek.com/blog/wp-content/uploads/2013/09/backup-1.jpg" width="701" height="517" /><span id="more-1593"></span></a></p>
<p style="text-align: justify;">to complete this simple task, while you may define it a tough job without our AthTek IP-MAC Scanner.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.athtek.com/blog/2013/09/29/how-to-guide-against-others-mooch-off-wi-fi/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to dirctly import the scan results?</title>
		<link>http://www.athtek.com/blog/2013/09/24/how-to-dirctly-import-the-scan-results/</link>
		<comments>http://www.athtek.com/blog/2013/09/24/how-to-dirctly-import-the-scan-results/#comments</comments>
		<pubDate>Tue, 24 Sep 2013 01:03:38 +0000</pubDate>
		<dc:creator><![CDATA[Tony]]></dc:creator>
				<category><![CDATA[IP Scanner & MAC Scanner]]></category>
		<category><![CDATA[Best IP Scanner]]></category>
		<category><![CDATA[import the scan results]]></category>

		<guid isPermaLink="false">http://www.athtek.com/blog/?p=1578</guid>
		<description><![CDATA[From former posts, we have known that AthTek is a very useful tool for IP, MAC scan, even if you have no knowledge of the network, you can also take over can be used directly without any difficulty, the software &#8230; <a href="http://www.athtek.com/blog/2013/09/24/how-to-dirctly-import-the-scan-results/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p style="text-align: justify;">From former posts, we have known that AthTek is a very useful tool for IP, MAC scan, even if you have no knowledge of the network, you can also take over can be used directly without any difficulty, the software includes IP Scanner, MAC Scanner, and Ping Tester three components through which three components, you can easily manage your local network. And If you make ip-mac binding, as long as the user changes his ip can not get on the net, must be changed back to the original ip before they can access the Internet.</p>
<p style="text-align: justify;">Way to override a LAN or several buildings, a school, or a small geographic area such as plant-wide computer network. AthTek IP-MAC Scanner is a free utility for LAN IP scanning tool, its user interface is very friendly, and it is also very simple to use, even if the user is no knowledge of the network, but also can easily use this tool to run the entire network there is a clear case management.</p>
<p style="text-align: justify;">The tool also holds the scan results directly import or export, with such a large number of results about our scan. We will next introduce how to import the scan results.</p>
<p style="text-align: justify;"><a href="http://www.athtek.com/blog/wp-content/uploads/2013/09/1.jpg"><img class="alignnone size-full wp-image-1579" alt="1" src="http://www.athtek.com/blog/wp-content/uploads/2013/09/1.jpg" width="862" height="650" /><span id="more-1578"></span></a></p>
<p style="text-align: justify;">
<p style="text-align: justify;">After you scan the whole LAN, you can click the &#8220;Analyze&#8221;, and then find the path: Analyze-Save as-Txt file(*.txt), and then you will get the inported Txt file, such as:</p>
<p style="text-align: justify;"><a href="http://www.athtek.com/blog/wp-content/uploads/2013/09/2.jpg"><img class="alignnone size-full wp-image-1580" alt="2" src="http://www.athtek.com/blog/wp-content/uploads/2013/09/2.jpg" width="985" height="583" /></a></p>
<p style="text-align: justify;">IP Scanner can show all the computers connected to the LAN and a variety of devices (such as routers), you can also select IP range for accurate scanning. MAC Scanner allows you to scan all the devices connected to the LAN MAC address.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.athtek.com/blog/2013/09/24/how-to-dirctly-import-the-scan-results/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Further Analysis into the IP-MAC Scanner</title>
		<link>http://www.athtek.com/blog/2013/09/23/further-analysis-into-the-ip-mac-scanner/</link>
		<comments>http://www.athtek.com/blog/2013/09/23/further-analysis-into-the-ip-mac-scanner/#comments</comments>
		<pubDate>Mon, 23 Sep 2013 01:59:38 +0000</pubDate>
		<dc:creator><![CDATA[Tony]]></dc:creator>
				<category><![CDATA[IP Scanner & MAC Scanner]]></category>
		<category><![CDATA[IP-MAC Scanner]]></category>
		<category><![CDATA[LAN MAC address]]></category>
		<category><![CDATA[online support]]></category>

		<guid isPermaLink="false">http://www.athtek.com/blog/?p=1575</guid>
		<description><![CDATA[This software is consisted of four components, including IP Scanner, MAC Scanner, Soda PDF and Ping Tester. Through using these three components, you can easily manage your local network. IP Scanner can show all the computers connected to the LAN &#8230; <a href="http://www.athtek.com/blog/2013/09/23/further-analysis-into-the-ip-mac-scanner/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p style="text-align: justify;">This software is consisted of four components, including IP Scanner, MAC Scanner, <a href="https://www.sodapdf.com/">Soda PDF</a> and Ping Tester. Through using these three components, you can easily manage your local network. IP Scanner can show all the computers connected to the LAN and a variety of devices (such as routers), you can also select IP range for accurate scanning. MAC Scanner allows you to scan all the devices connected to the LAN MAC address. Software can also display the host name and work-group name, which will easily enable you to manage the LAN. Software also allows you to give a analysis already scanned into the computer, and see whether there are unrecorded computers. In addition, the network administrators can set up automatic scans, which is perhaps more convenient.</p>
<p style="text-align: justify;">The <a href="https://www.anboxing.com/best-double-sided-duplex-document-scanner-fujitsu-scansnap-ix1500/">fujitsu scansnap ix1500</a> is the flagship model of the ScanSnap Series, capable of digitizing large volumes of papers quickly. It simplifies the scanning process for a variety of documents, making it easy to digitalize your life. You can be more efficient and productive, focusing on the things that matter the most.</p>
<p style="text-align: justify;"><a href="http://www.athtek.com/blog/wp-content/uploads/2013/09/netscan1.jpg"><img class="alignnone size-large wp-image-1570" src="http://www.athtek.com/blog/wp-content/uploads/2013/09/netscan1-1024x553.jpg" alt="netscan1" width="610" height="329" /><span id="more-1575"></span></a></p>
<p style="text-align: justify;">　　Also worth mentioning is that all the scanned data will be able to import or export from the data, very convenient. In fact, there are many small software features, you can slowly groping in use, it is recommended to download.<br />
AthTek IP Scanner is a powerful IP tool, whose user interface is very friendly and kind. And then it is also very simple to use, even if the users are not familiar with the knowledge of the network, but they can easily have a clear management in using this tool for the purpose of the operation of entire network .</p>
<p style="text-align: justify;"><a href="http://www.athtek.com/blog/wp-content/uploads/2013/09/purchase.jpg"><img class="alignnone size-full wp-image-1576" src="http://www.athtek.com/blog/wp-content/uploads/2013/09/purchase.jpg" alt="purchase" width="548" height="158" /></a><br />
If you want to have a more intuitively feeling, you can download a trial version, and then download a enterprise version, and last please enjoy yourself.</p>
<p style="text-align: justify;">MORE DETAILS:http://www.athtek.com/blog/</p>
]]></content:encoded>
			<wfw:commentRss>http://www.athtek.com/blog/2013/09/23/further-analysis-into-the-ip-mac-scanner/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to backup the trusted connections on your router</title>
		<link>http://www.athtek.com/blog/2013/09/23/how-to-backup-your-trusted-clients/</link>
		<comments>http://www.athtek.com/blog/2013/09/23/how-to-backup-your-trusted-clients/#comments</comments>
		<pubDate>Mon, 23 Sep 2013 01:53:22 +0000</pubDate>
		<dc:creator><![CDATA[Tony]]></dc:creator>
				<category><![CDATA[IP Scanner & MAC Scanner]]></category>
		<category><![CDATA[Product News]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[Using Experience]]></category>
		<category><![CDATA[backup LAN users]]></category>
		<category><![CDATA[backup network user]]></category>
		<category><![CDATA[connections on router]]></category>
		<category><![CDATA[ip scanner]]></category>
		<category><![CDATA[mac scanner]]></category>
		<category><![CDATA[network clients backup]]></category>
		<category><![CDATA[verify connections on LAN]]></category>

		<guid isPermaLink="false">http://www.athtek.com/blog/?p=1569</guid>
		<description><![CDATA[Nowadays, network topology design directly affects the security of the network. If the external and internal communications network, the internal network of the machine safety will be threatened, but also on the same network affect many other systems. Spread through the network, but also affect connected to the Internet / Intranet other network. <a href="http://www.athtek.com/blog/2013/09/23/how-to-backup-your-trusted-clients/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p style="text-align: justify;">[<a title="Free PDF" href="/free-download-pdf/How-to-backup-the-trusted-connections-on-your-router.pdf" target="_blank">PDF</a>] Nowadays, network topology design directly affects the security of the network. If the external and internal communications network, the internal network of the machine safety will be threatened, but also on the same network affect many other systems. Spread through the network, but also affect connected to the Internet / Intranet other network; As a result, may also involve legal, financial and other security-sensitive areas. Therefore, we design it is necessary to open the server and external network and internal network of other services necessary isolation, to avoid network structure information leakage; while also external network service requests are filtered, only allows normal communication of data packets reach the appropriate host, the other hosts request service before reaching it should be rejected.</p>
<p style="text-align: justify;"><span id="more-1569"></span>Therefore, we should add the trusted PCs into our database, for one thing, it can be more safer; for another thing, it can be convenient compared with other softwares. As in this case, i will introduce you a actual case that is to backup your trusted clients. Firstly, please open our IP-MAC Scanner software and then click the button “Scan”, and then you will get a list of computers in your local area network, as in the range of “*.*.*.1-*.*.*.255”. In my LAN, there are 151 PCs connected, which is be seen in the first picture.</p>
<p style="text-align: justify;"><a href="http://www.athtek.com/blog/wp-content/uploads/2013/09/backup-1.jpg"><img class="alignnone size-full wp-image-1571" alt="backup-1" src="http://www.athtek.com/blog/wp-content/uploads/2013/09/backup-1.jpg" width="701" height="517" /><!--more--></a></p>
<p>If you trust one connected PC, you can add it to the database and then get the response from out software, which is displayed in the following picture.</p>
<p><a href="http://www.athtek.com/blog/wp-content/uploads/2013/09/backup-2.jpg"><img class="alignnone size-full wp-image-1572" alt="backup-2" src="http://www.athtek.com/blog/wp-content/uploads/2013/09/backup-2.jpg" width="329" height="284" /><!--more--></a></p>
<p>&nbsp;</p>
<p>Finally, you will see the trusted one in your database, such as in the last picture, and you can modify its work-group and user as the following actual case, for instance, Workgroup: AthTek and User: AthTek Tony.</p>
<p><a href="http://www.athtek.com/blog/wp-content/uploads/2013/09/backup-3.jpg"><img class="alignnone size-full wp-image-1573" alt="backup-3" src="http://www.athtek.com/blog/wp-content/uploads/2013/09/backup-3.jpg" width="708" height="525" /><!--more--></a></p>
<p>&nbsp;</p>
<div>
<p>MORE DETAILS: http://www.athtek.com/blog/</p>
</div>
<p style="text-align: justify;">
]]></content:encoded>
			<wfw:commentRss>http://www.athtek.com/blog/2013/09/23/how-to-backup-your-trusted-clients/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Remote Control by IP-MAC SCANNER</title>
		<link>http://www.athtek.com/blog/2013/09/19/remote-control-stuff-of-ip-mac-scanner/</link>
		<comments>http://www.athtek.com/blog/2013/09/19/remote-control-stuff-of-ip-mac-scanner/#comments</comments>
		<pubDate>Thu, 19 Sep 2013 02:51:31 +0000</pubDate>
		<dc:creator><![CDATA[Tony]]></dc:creator>
				<category><![CDATA[IP Scanner & MAC Scanner]]></category>
		<category><![CDATA[Product News]]></category>
		<category><![CDATA[Reviews]]></category>
		<category><![CDATA[Using Experience]]></category>
		<category><![CDATA[Best IP Scanner]]></category>
		<category><![CDATA[Best MAC Scanner]]></category>
		<category><![CDATA[IP-MAC binding]]></category>
		<category><![CDATA[remote control]]></category>
		<category><![CDATA[Remote control stuff]]></category>
		<category><![CDATA[Remote shutdown]]></category>

		<guid isPermaLink="false">http://www.athtek.com/blog/?p=1556</guid>
		<description><![CDATA[During this period, i am always thinking that monitoring the Local Area Network(LAN) with using IP-MAC SCANNER over without using other IP tools or no use in IP tools. IP-MAC Scanner allows you to scan all the apparatuses connected to the LAN MAC address.  <a href="http://www.athtek.com/blog/2013/09/19/remote-control-stuff-of-ip-mac-scanner/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p style="text-align: justify;">[<a title="Free PDF" href="/free-download-pdf/Remote-Control-by-IP-mac-scanner.pdf" target="_blank">PDF</a>] During this period, i am always thinking that monitoring the Local Area Network(LAN) with using IP-MAC SCANNER over without using other IP tools or no use in IP tools. IP-MAC Scanner allows you to scan all the apparatuses connected to the LAN MAC address. And it can also show the host name and work-group name and  be convenient to make you LAN management. The software also allows you to analysis has been scanned by the computer, have a look inside if there is no computer records, in addition, the administrator can also set the automatic scanning, it may be more convenient. In fact, there are a lot of software small functions, you can use slowly.We will display one key classic functions of IP-MAC SCANNER.</p>
<p style="text-align: justify;"><img alt="" src="http://www.athtek.com/image/ips/mes.gif" width="261" height="190" /><span id="more-1556"></span></p>
<ul>
<li>use those remote control stuff</li>
</ul>
<p style="text-align: justify;">The so-called remote control, refers to the management personnel through remote computer network remote dial-up or both to access Internet and other means, Unicom need be controlled by a computer, the computer desktop environment that will be charged to your computer, configuration, software installation program, modify the work through the local computer to the remote computer. Remote wake-up (WOL), namely through the local area network to realize the remote boot.</p>
<p style="text-align: justify;">This is a traditional way to monitor server-client computers, in out this situation, we will focus on just the Remote Shutdown service. AthTek  IP &#8211; MAC Scanner provides remote control functions for senior user.Click &#8220;Tools&#8221;, you will be able to use those remote control functions.</p>
<p style="text-align: justify;"><img alt="" src="http://www.athtek.com/image/ips/mess.gif" width="329" height="333" /></p>
<p><img alt="" src="http://www.athtek.com/image/ips/shut.gif" width="334" height="308" /></p>
<p>And network administrator has another key function to manage users in the LAN, If the IP-MAC binding, as long as the user changes their IP is not on the network, must change back to the original IP can normally access, Therefore, anyone who joins in the LAN will not be able to change his/her IP address.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.athtek.com/blog/2013/09/19/remote-control-stuff-of-ip-mac-scanner/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A smart local area Network tool: IP-MAC SCANNER.</title>
		<link>http://www.athtek.com/blog/2013/09/16/a-smart-local-area-network-tool-ip-mac-scanner/</link>
		<comments>http://www.athtek.com/blog/2013/09/16/a-smart-local-area-network-tool-ip-mac-scanner/#comments</comments>
		<pubDate>Mon, 16 Sep 2013 01:47:06 +0000</pubDate>
		<dc:creator><![CDATA[Tony]]></dc:creator>
				<category><![CDATA[IP Scanner & MAC Scanner]]></category>
		<category><![CDATA[ip scanner]]></category>
		<category><![CDATA[network management]]></category>
		<category><![CDATA[ping test]]></category>

		<guid isPermaLink="false">http://www.athtek.com/blog/?p=1551</guid>
		<description><![CDATA[If  you were a network administrator, you could be likely vexed with local illegal or boring network  performance, therefore you may try to improve your network performance using windows auto functions without using professional software. However, with the smart LAN &#8230; <a href="http://www.athtek.com/blog/2013/09/16/a-smart-local-area-network-tool-ip-mac-scanner/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p style="text-align: justify;">If  you were a network administrator, you could be likely vexed with local illegal or boring network  performance, therefore you may try to improve your network performance using windows auto functions without using professional software.</p>
<p style="text-align: justify;">However, with the smart LAN software, you can efficiently control and have a good management of this local area network. And as IP-MAC SCANNER is in Built-in IP Scanner, MAC Scanner, and Ping Tester three components, when you scan is complete the data can be imported or exported. If you make ip-mac binding, as long as the user changes his ip can not get on the net, must be changed back to the original ip before they can access the Internet.</p>
<p style="text-align: justify;"><a href="http://www.athtek.com/blog/wp-content/uploads/2013/09/ping-test.jpg"><img class="alignnone size-full wp-image-1552" alt="ping test" src="http://www.athtek.com/blog/wp-content/uploads/2013/09/ping-test.jpg" width="706" height="492" /></a></p>
<p style="text-align: justify;"><span id="more-1551"></span></p>
<p style="text-align: justify;">As using this ping test, you can not have to use Windows ping tool, which brings convenience and time-assuming work. In my mind, this software has another important application is data backup and restore, which can be viewed as this: As a professional and considerate LAN management tool, IP &#8211; MAC Scanner also enables to backup and restore the scanning results. It supports to import or export as &#8220;.xls&#8221; and &#8220;.bat&#8221; files format. Therefore we can have a good acknowledgement during a period and have a precise decision based on these data.</p>
<p style="text-align: justify;">More details: <strong><a href="http://www.athtek.com/ip-mac-scanner.html#.UjZizNJHIpx">http://www.athtek.com/ip-mac-scanner.html#.UjZizNJHIpx</a>.</strong></p>
<p style="text-align: justify;">
]]></content:encoded>
			<wfw:commentRss>http://www.athtek.com/blog/2013/09/16/a-smart-local-area-network-tool-ip-mac-scanner/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>An brief introduction and some practical Tips by using IP-MAC Scanner</title>
		<link>http://www.athtek.com/blog/2013/09/14/some-practical-tips-by-using-ip-mac-scanner/</link>
		<comments>http://www.athtek.com/blog/2013/09/14/some-practical-tips-by-using-ip-mac-scanner/#comments</comments>
		<pubDate>Sat, 14 Sep 2013 04:57:13 +0000</pubDate>
		<dc:creator><![CDATA[Tony]]></dc:creator>
				<category><![CDATA[IP Scanner & MAC Scanner]]></category>
		<category><![CDATA[IP address]]></category>
		<category><![CDATA[IP-MAC Scanner]]></category>
		<category><![CDATA[MAC address]]></category>
		<category><![CDATA[Network]]></category>

		<guid isPermaLink="false">http://www.athtek.com/blog/?p=1545</guid>
		<description><![CDATA[What a wonderful sunny day! What is IP-MAC Scanner? Let us have a short but better understanding to it. IP-MAC Scanner (IP Scan Tool) is a powerful IP tool, its user interface is very friendly, and it is also very simple &#8230; <a href="http://www.athtek.com/blog/2013/09/14/some-practical-tips-by-using-ip-mac-scanner/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>What a wonderful sunny day!</p>
<p style="text-align: justify;">What is IP-MAC Scanner? Let us have a short but better understanding to it. IP-MAC Scanner (IP Scan Tool) is a powerful IP tool, its user interface is very friendly, and it is also very simple to use, even if the user is no knowledge of the network, but also can easily use the tool to the entire network the operation of a clear management.</p>
<p>Let have a picture of the favorable user interface:<span id="more-1545"></span><a href="http://www.athtek.com/blog/wp-content/uploads/2013/09/IP-MAC-914.jpg"><img class="alignnone size-full wp-image-1546" alt="IP-MAC 914" src="http://www.athtek.com/blog/wp-content/uploads/2013/09/IP-MAC-914.jpg" width="713" height="525" /></a></p>
<p style="text-align: justify;"><!--more-->Please allow me to introduce this photo from different angles of views. We can see that if we set the IP address&#8217;s scope, we will get the concrete PC&#8217;s information. For example, in this picture, this network tool IP-MAC Scanner give us the data: SCan Complete! Scanned: 255 IP, Found 120 connected. And it can also give us our local IP address and MAC address, as using a favorable user interface,  users will quickly get accustomed to this software.</p>
<p style="text-align: justify;">This Software includes IP Scanner, MAC Scanner, and Ping Tester three components, through these three components, you can easily manage your local network. IP Scanner can show all the computers connected to the LAN and a variety of devices (such as routers), you can also select IP range for accurate scanning. MAC Scanner allows you to scan all the devices connected to the LAN MAC address. Software can also display the host name and workgroup name, which will easily enable you to manage the LAN. Software also allows you to analyze already scanned into the computer, and see whether there are unrecorded computer, in addition, administrators can set up automatic scans, so perhaps more convenient.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.athtek.com/blog/2013/09/14/some-practical-tips-by-using-ip-mac-scanner/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to get your hostname, workgroup and even the name of adapter cards</title>
		<link>http://www.athtek.com/blog/2013/09/12/how-to-get-your-hostname-workgroup-and-even-the-name-of-adapter-cards/</link>
		<comments>http://www.athtek.com/blog/2013/09/12/how-to-get-your-hostname-workgroup-and-even-the-name-of-adapter-cards/#comments</comments>
		<pubDate>Thu, 12 Sep 2013 07:24:27 +0000</pubDate>
		<dc:creator><![CDATA[Tony]]></dc:creator>
				<category><![CDATA[IP Scanner & MAC Scanner]]></category>
		<category><![CDATA[Product News]]></category>
		<category><![CDATA[ip scanner]]></category>
		<category><![CDATA[LAN control]]></category>
		<category><![CDATA[mac scanner]]></category>
		<category><![CDATA[monitoring network]]></category>
		<category><![CDATA[network analysis]]></category>
		<category><![CDATA[network management]]></category>
		<category><![CDATA[ping ip]]></category>
		<category><![CDATA[remote control]]></category>
		<category><![CDATA[web monitoring]]></category>

		<guid isPermaLink="false">http://www.athtek.com/blog/?p=1517</guid>
		<description><![CDATA[Nowadays, many PC users want to get theirs&#8217; own IP address, Mac address, hostname, workgroup and even the name of adapter cards, everyone who surfs in Internet frequently get to know the way to get IP address and Mac address. &#8230; <a href="http://www.athtek.com/blog/2013/09/12/how-to-get-your-hostname-workgroup-and-even-the-name-of-adapter-cards/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p style="text-align: justify;">Nowadays, many PC users want to get theirs&#8217; own IP address, Mac address, hostname, workgroup and even the name of adapter cards, everyone who surfs in Internet frequently get to know the way to get IP address and Mac address. However, nearly small amount of people get to know the way to get hostname and workgroup and even the name of adapter cards. Learn more about <a href="https://www.knownhost.com/wordpress-hosting.html">wordpress hosting</a> at the link.</p>
<p style="text-align: justify;"><a href="http://www.athtek.com/blog/wp-content/uploads/2013/09/IP-mac.jpg"><img class="alignnone size-full wp-image-1534" src="http://www.athtek.com/blog/wp-content/uploads/2013/09/IP-mac.jpg" alt="IP-mac" width="705" height="527" /></a><span id="more-1517"></span></p>
<p style="text-align: justify;">Now i will describe one way to get hostname: Start &#8212; run &#8212; cmd &#8212; ipconfig / all &#8212; you can view the configuration information related to the machine, which has a line: Physical Address and so on. The information that is displayed behind the MAC information; the first line shows the host name is the host name.</p>
<p style="text-align: justify;">Next, i will describe one way to get workgroup: Working group on the local computer desktop select the &#8220;My Network Places&#8221; right-click &#8220;Properties&#8221;, open the &#8220;Network Connections&#8221; window, click on the &#8220;Advanced&#8221; menu, click &#8220;Network ID&#8221; to open the &#8220;System Properties&#8221; dialog box, you can see or change the &#8220;Computer name&#8221; and &#8220;Workgroup&#8221; name. Computer is not the same as a group can not be shared.</p>
<p style="text-align: justify;">However, to get the name of adapter cards is a hard work. And i think the two ways described above is not very easy to execute, so i am looking for a network tool to get, after some trials, i think IP-MAC Scanner is not a bad choice. And i will use some time to introduce it to all of you.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.athtek.com/blog/2013/09/12/how-to-get-your-hostname-workgroup-and-even-the-name-of-adapter-cards/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to use AthTek NetWalk to troubleshoot ARP Attacks?</title>
		<link>http://www.athtek.com/blog/2013/08/01/how-to-use-athtek-netwalk-to-troubleshoot-arp-attacks/</link>
		<comments>http://www.athtek.com/blog/2013/08/01/how-to-use-athtek-netwalk-to-troubleshoot-arp-attacks/#comments</comments>
		<pubDate>Thu, 01 Aug 2013 14:24:37 +0000</pubDate>
		<dc:creator><![CDATA[Tony]]></dc:creator>
				<category><![CDATA[NetWalk]]></category>
		<category><![CDATA[Product News]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[Using Experience]]></category>
		<category><![CDATA[network administrator]]></category>
		<category><![CDATA[network management]]></category>
		<category><![CDATA[network monitor]]></category>
		<category><![CDATA[network monitoring software]]></category>
		<category><![CDATA[NIDS software]]></category>
		<category><![CDATA[packet sniffer]]></category>
		<category><![CDATA[packet sniffing]]></category>
		<category><![CDATA[traffic analyzer]]></category>

		<guid isPermaLink="false">http://www.athtek.com/blog/?p=1484</guid>
		<description><![CDATA[AthTek NetWalk is a specialist that can help Network administrators to monitor and manage the Network. Once ARP attacks happen to the network, AthTek NetWalk provides services which can locate ARP source rapidly and reliably, thus ensuring normal network operations. <a href="http://www.athtek.com/blog/2013/08/01/how-to-use-athtek-netwalk-to-troubleshoot-arp-attacks/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>How to use AthTek NetWalk to troubleshoot ARP Attacks?</p>
<p>AthTek NetWalk is a specialist that can help Network administrators to monitor and manage the Network. Once ARP attacks happen to the network, AthTek NetWalk provides services which can locate ARP source rapidly and reliably, thus ensuring normal network operations.</p>
<p><span id="more-1484"></span></p>
<p>By monitoring every event through the network or analyzing packets captured experienced administrators can Diagnosis the problem.</p>
<p>However AthTek NetWalk can help you do that with its intelligent analyzing systems.</p>
<p>Different marks mean the different severity of events.</p>
<p><a href="http://www.athtek.com/blog/wp-content/uploads/2013/08/Severity.jpg"><img class="size-full wp-image-1487 aligncenter" alt="Severity" src="http://www.athtek.com/blog/wp-content/uploads/2013/08/Severity.jpg" width="111" height="160" /></a></p>
<p>There are some suggestions of mine about troubleshooting.</p>
<p>Firstly，pay special attention to the value of ARP Request and ARP Response which should be above 1:1generally.</p>
<p><img class="alignnone size-large wp-image-1485" style="font-size: 12px;" alt="Physical" src="http://www.athtek.com/blog/wp-content/uploads/2013/08/Physical-1024x413.jpg" width="610" height="246" /></p>
<p>Also the Physical Endpoints we can view from AthTek NetWalk will show the correlation of MAC address and IP address. Most of the conditions one MAC address shall have only one IP address corresponding to .If one MAC address has multiple IP addresses to, there are several conditions such as the host with the MAC address is the gateway Or ARP attack. And through AthTek NetWalk, we can locate ARP attack.</p>
<p><a href="http://www.athtek.com/blog/wp-content/uploads/2013/08/1to1.jpg"><img class="alignnone size-full wp-image-1486" alt="1to1" src="http://www.athtek.com/blog/wp-content/uploads/2013/08/1to1.jpg" width="953" height="295" /></a></p>
<p>AthTek NetWalk can draw a matrix which will show the information between those hosts in the network in that people will be able to identify doubtful conditions as quick as possible.</p>
<p><a href="http://www.athtek.com/blog/wp-content/uploads/2013/08/matrix.jpg"><img class="alignnone size-large wp-image-1488" alt="matrix" src="http://www.athtek.com/blog/wp-content/uploads/2013/08/matrix-1024x501.jpg" width="610" height="298" /></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.athtek.com/blog/2013/08/01/how-to-use-athtek-netwalk-to-troubleshoot-arp-attacks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Why and how to bind IP and Mac?</title>
		<link>http://www.athtek.com/blog/2013/07/29/why-and-how-to-bind-ip-and-mac/</link>
		<comments>http://www.athtek.com/blog/2013/07/29/why-and-how-to-bind-ip-and-mac/#comments</comments>
		<pubDate>Mon, 29 Jul 2013 14:45:42 +0000</pubDate>
		<dc:creator><![CDATA[Tony]]></dc:creator>
				<category><![CDATA[AthTek News]]></category>
		<category><![CDATA[IP Scanner & MAC Scanner]]></category>
		<category><![CDATA[NetWalk]]></category>
		<category><![CDATA[sharing]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[IP]]></category>
		<category><![CDATA[ip scaner]]></category>
		<category><![CDATA[IP-MAC]]></category>
		<category><![CDATA[IP-MAC binding]]></category>
		<category><![CDATA[network administrator]]></category>
		<category><![CDATA[network analyzer]]></category>
		<category><![CDATA[network management]]></category>
		<category><![CDATA[network monitoring software]]></category>

		<guid isPermaLink="false">http://www.athtek.com/blog/?p=1472</guid>
		<description><![CDATA[&#160; Why and how to bind IP with Mac? DHCP assigns IP address to each device randomly. Therefore, as a network administrator, you need to avoid the IP address of the host from changing and result in unable to filter, manage &#8230; <a href="http://www.athtek.com/blog/2013/07/29/why-and-how-to-bind-ip-and-mac/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Why and how to bind IP with Mac?</p>
<p><a href="http://www.athtek.com/blog/wp-content/uploads/2013/07/bestipscaner.jpg"><img class="alignnone size-full wp-image-1423" alt="bestipscaner" src="http://www.athtek.com/blog/wp-content/uploads/2013/07/bestipscaner.jpg" width="330" height="319" /></a><span id="more-1472"></span></p>
<p>DHCP assigns IP address to each device randomly. Therefore, as a network administrator, you need to avoid the IP address of the host from changing and result in unable to filter, manage bandwidth for the packets. Administrators must configure Bind IP to MAC to assure the management. Once the IP address and MAC address are bound for a computer, the router can obtain the specified IP address according to the rules in IP</p>
<p>Bind List after identifying MAC address of a computer. Thus, effective management and control can be reached in network easily.</p>
<p>So, how to bind IP to Mac?</p>
<p>If your firewall/router is also your DHCP serve and it allows you to reserve IP addresses based on MAC address, you will need to configure it to do so. The method varies by brand (Linksys/D-Link/Netgear/Cisco and a thousand others) so you may need to consult the web or the manual.</p>
<p>Now a small tool can figure it work which is called <a title="http://www.athtek.com/ip-mac-scanner.html" href="http://www.athtek.com/ip-mac-scanner.html">IP-MAC scanner</a>.</p>
<p>You can download and install it from<a title="http://www.athtek.com/ip-mac-scanner.html" href="http://www.athtek.com/ip-mac-scanner.html"> here </a>free.</p>
<ul>
<li>Firstly, open the software and click “scan” button.</li>
<li>  <a href="http://www.athtek.com/blog/wp-content/uploads/2013/07/ipscan.jpg"><img class="alignnone size-large wp-image-1475" alt="ipscan" src="http://www.athtek.com/blog/wp-content/uploads/2013/07/ipscan.jpg" width="610" height="448" /></a></li>
<li>Secondly, choose the IP addresses that you intend to bind with MAC and add them to the database.</li>
<li><a href="http://www.athtek.com/blog/wp-content/uploads/2013/07/addtodatabase.jpg"><img class="alignnone size-large wp-image-1474" alt="addtodatabase" src="http://www.athtek.com/blog/wp-content/uploads/2013/07/addtodatabase.jpg" width="420" height="213" /></a></li>
<li>Thirdly, change to the database tab and select the IP and MAC addresses.<a href="http://www.athtek.com/blog/wp-content/uploads/2013/07/database.jpg"><img class="alignnone size-full wp-image-1473" alt="database" src="http://www.athtek.com/blog/wp-content/uploads/2013/07/database.jpg" width="716" height="526" /></a></li>
<li>At last, right-click and choose “generate IP-MAC binding” item.</li>
</ul>
<p>Is it easy? See more-<a href="http://www.athtek.com/ip-mac-scanner.html">http://www.athtek.com/ip-mac-scanner.html</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.athtek.com/blog/2013/07/29/why-and-how-to-bind-ip-and-mac/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Minified using disk
Page Caching using disk: enhanced
Database Caching 1/6 queries in 0.004 seconds using disk
Object Caching 795/865 objects using disk

 Served from: www.athtek.com @ 2026-04-15 10:47:36 by W3 Total Cache -->