menu
Daily Bits Email

The email you entered is already receiving Daily Bits Emails!

Trogon MAC ScannerDiscount

Trogon MAC Scanner

Detect Unauthorized Devices on Your LAN

$49
for PC  Download Trial
Platforms: Windows XP, Vista, 7, Server 2003, Server 2008
Trogon MAC Scanner ScreenshotNetwork Software ScreenshotTrogon MAC Scanner, Network Software ScreenshotTrogon MAC Scanner, Internet Software Screenshot

As your LAN grows ever larger, spanning multiple rooms in multiple floors in multiple buildings, it becomes harder and harder to detect unauthorized access. Gone are the days when you could just walk around a single computer lab! Now, with manual checking a near impossibility, you need to seriously consider an automated system of monitoring the devices on your network, and Trogon MAC Scanner fits the bill perfectly!

With Trogon MAC Scanner, you'll be able to build a database of IP addresses and MAC addresses for every device that's connected to your network, then immediately detect illegal access by new devices! On its initial pass, made speedy by the use of multithreading, Trogon MAC Scanner accumulates information for every device on your LAN - host names, workgroups, network adapter brands, you name it, in seconds. It then uses this database as a benchmark to compare network devices, notifying you if any device on the network isn't in the database! Smart!

Because you know your users better than any computer ever would, you can edit the database records to add attributes to help you identify devices (Bob's Laptop, 1st Floor Printer, for example). You also have the option of creating new database records manually, without requiring a rescan of the entire LAN. Best of all, you can export some or all of the database as a text, XML, or CSV spreadsheet file!

Review Written by Derek Lee
The Conversation
Features
The Fine Print
Expand All Email Updates
Techtoysavvy I must be clueless. Please explain the value of this program to your target audience. I already have Excel and I know the arp command.Strangely, with no help from your software I have managed to build a map of my macids. The DHCP server will even let me assign a specific IP address to a given mac id.

I admit that 90%+ people in the world could not do this but I suspect that the ones that can't either won't care or don't understand macids and IP addresses.

If you are really paranoid all this will do is scare you if an unrecognized macid shows up. Those that are scared will have no idea what to do if a real interloper shows up.
Jul 15 2011 at 12:43am Copy Link
0
Winged N/A This app WILL display attempts made to connect from a computer that reveals its true MAC-address, but considering how easy it is to spoof MAC-addresses, marketing this app as a mean to stop unauthorized access to your network is at worst false security, and at best, a laugh. Anyone with the least computer knowledge will acknowledge this. Using it as a program to map your network layout, sure, but skip the snake oil.
Jul 17 2011 at 2:41am Copy Link
0
Doug Atkinson The advantage of Trogon MAC Scanner is the automatic detection of new devices that are not in the database. The method above by Prasad requires a manual approach, which could be tedious, though probably could be scripted. I wonder if Trogon can tell if there are duplicate devices on the network with the same MAC address? That would help alleviate spoofed MAC addresses as mentioned by Winged. One other difficulty is that on most networks, all devices are not usually turned on at the same time, meaning your baseline database will not be accurate, taking us back to the manual approach mentioned by Prasad.
Jul 17 2011 at 5:53am Copy Link
0
Winged N/A Even with the capablity of discovering duplicate MAC addresses on a network, there's no guarantee that an intruder will spoof the address of a node that's always on. If it's, say, a laptop MAC address, an intruder could get access unnoticed (as in not showing duplicate entries) to the network while the unit who owns the genuine MAC address is offline. Still a no go. MAC filtering and any security measure based on identifying MAC addresses is not the least safe and should be avoided since all it does is that it gives a false sense of security.
Jul 17 2011 at 6:21am Copy Link
0
peter ivanov Trogon MAC Scanner pings every IP-address from the subnet's ip addresses range. This tool finds devices with the same MAC address and indicates this after scanning.

The database will not contain offline devices at the first scanning, but at the next you can simply add marked devices to the database. Also you can make a database from a several subnets.
Trogon Software - Jul 17 2011 at 6:33am Copy Link
0

On BitsDuJour Today

Aiarty Image Matting (Mac & PC) Discount
Mac & PC
Aiarty Image Matting
Amazing Image Matting Powered by AI
100

Network Deals

USBDeviceShare (Mac & PC) Discount
Mac & PC
USBDeviceShare
Remotely Share Any USB Peripheral
NetSet (PC) Discount
for PC
NetSet
Quickly Change Network Settings
Essential NetTools (PC) Discount
for PC
Essential NetTools
The Ultimate Toolkit for Monitoring Your Network
Total Network Inventory (PC) Discount
for PC
Total Network Inventory
Be in Control of Your Network
NetStat Agent (PC) Discount
for PC
NetStat Agent
Monitor TCP/UDP Traffic and Connection Status
25
Like BitsDuJour on Facebook
BitsDuJour is for People who Love Software
Every day we review great Mac & PC apps, and get you discounts up to 100%
Follow Us
© Copyright 2024 BitsDuJour LLC. Code & Design. All Rights Reserved. Privacy Policy