Analisis Software

Monitor your entire local network for free with Network Meter for Windows

The first thing we are going to do is find out what the use of this program can bring us. Then we will see how to get it up and running and what are its minimum requirements for it to work. We will finish by seeing how Network Meter works to monitor our local network with examples, using one and several network interfaces.

What Network Meter offers to monitor our LAN

Network Meter we could define it as a free program Searching for network interfaces and adapters in the system for LAN monitoring. Thus, it is able to provide detailed information on each interface. Its way of operating is simple, each interface monitor has a view with simple statistics and a graphic screen that shows the time history. This would be an example of the main screen of the program to give you a better idea:

It is a tool to measure network traffic. Thus, we can use Network Meter to monitor our local area network in real time by selecting one or more network interfaces. It is an easy-to-use software in which simply to start working we will select one of the available Ethernet or Wi-Fi adapters, being able to work even with virtual ones.

In summary, we can affirm that it is not a complex application, and that it has been developed as an easy-to-use tool. It also offers us the inbound and outbound traffic, and also shows us the results in a graph. As for the license, it should be noted that it is free to use for both private and commercial users, so we could all use it.

Minimum requirements and use of the program

Regarding the minimum requirements, we need a computer with Windows 2000, XP, 2003, Vista, 7, Server 2008, 8, 8.1 or 10. Regarding the hard disk space, the version that we have used is 2.3.0, with 20 MB you will have enough. Therefore, on practically any computer from the last 20 years you could run this software without problems. The first thing to do is download it for free from from your website. Then you will see a screen like this:

In this case, what you have to do is click on the button Download, marked with a box and a red arrow to save it on your hard drive.

It should also be noted that, in addition to being free, it is portable. This means that once downloaded, we just have to unzip it and run it to start using it. If you do not have a file decompressor installed, Windows Explorer has one and files with a .zip extension, as is the case, can be decompressed without problems.

Get started with Network Meter

To start using this tool we must double click on the file NetMet which will be the only one we have after unzipping the file we downloaded.

The Network Meter tool to monitor our local network the first time we run it will look like this:

Do not worry if at first you see it very simple and you do not see any data on the screen. That is because we have not selected the appropriate options. The first thing we are going to see is the main menu with its main options, which you have marked in a red box. Here we have these sections:

  • File: we have the option to refresh the results, we can also do it directly using the F5 key.
  • Display: to select the network adapter that we want to monitor. You can select one or more.
  • View: here we will choose the display options and the graphics update period.
  • Help: used to check the version of the program and go to the developer’s website.

From the main menu we are going to see two in depth and in more detail, they are «Monitor» and «View». Next, if we click on Display We will see a screen similar to this:

Its operation is very simple, if we select an adapter that is working, we will immediately see a summary of its network traffic and current evolution. The first time you use it, we recommend simply selecting your Ethernet or Wi-Fi card. In our case it is a Gigabit Ethernet network card that I will press later. It also supports working with a virtual interface.

The next section of the main menu is View which offers us these options:

One is Update Period in which we can choose the update period in which the data is refreshed. It is best to leave it in normal so that it updates every second, and in fast every 0.5 seconds if we need more precise information. On the other hand, a section that I recommend activating is Interface View, then we would see the available interfaces.

Here we could do the same as in «Display«, That is, select our network interface. The only thing to keep in mind is that it will leave less space available to view the rest. Also, in that window you will be able to see the traffic that this adapter has generated in the categories of Download (download) and of Upload (rise). Also, on the right side you have a scroll bar to see the rest of the adapters when you have more than five.

On the other hand, in the Windows task bar, for greater convenience you can find a Network Meter icon to monitor your network traffic and that gives access to the program, in case you want to leave it in the background.

Practical examples of using Network Meter

Now we are going to select our Ethernet network card, then Network Meter will show us a graph, along with a summary of my network traffic statistics.

In the place where the name of the network card appears, we can see two elements to take into account. First “Transfer»Allows us to change to see the amount of MB sent and received through the network. The second “Speed»Refers to the transfer speed measured in Mbps. Also, by clicking on the button Properties A window will open that will offer us information about the network card and its configuration.

You can also provide information from multiple network interfaces at the same time. This is ideal, for example, if you are working with a virtual interface:

When there is no more space for the rest of the network adapters to view it, you will have to see them by moving the bar that you have located on the right.

As you have seen, Network Meter allows us to monitor our local network quickly and easily, in addition, it does so in a very complete way so that we can see in detail the download and upload traffic of the different network interfaces, ideal to know what is happening. We can also see the amount of traffic exchanged on the local network and the Internet, all in a very intuitive way.

Analisis Software

How to view network card data with Adapter Watch

Why it is necessary to know the data of the network

In certain circumstances we will need to know network card specific data. For example, we may need to know the exact model to look for the drivers and update them, in case we have a problem and the equipment does not recognize it or stability-level failures.

We may also need data such as MAC address, the IP with which it synchronizes with the router, speed, etc. All this can help us to configure certain parameters, include the card in a white list in the router, know if the speed is adequate, etc.

To get this information we can use some programs such as Adapter Watch. This will allow us to have total control over the network card and to know at all times the data that we may need to configure something, to optimize speed or quality.

How to use Adapter Watch

Adapter Watch allows us to have detailed information of the network card. For example, we can see the MAC address of the device, the data transfer speed at all times or even release and renew the IP address. It is a simple program, easy to use, but with a lot of information.

Let’s see the main steps that we must give to start using this software. Keep in mind that it is available for Windows in its different versions. It is an alternative to using the information offered by the system itself, which is sometimes limited and does not solve what we really need.

Download the app

The first thing we have to do is to download the program. It should be noted that it is an application that does not need installation and we will only have to download the file and run it. We will quickly see all the data related to the different network cards that are installed in the computer, as well as the virtual adapters.

For this we have to go to the website of Nirsoft. There we will see the description of this program, its operation and, at the bottom, the button to download. We will also see that it is available in different languages, among which is Spanish.

The application takes up very little space, less than 1MB, and comes in a RAR folder that we have to unzip. There the main file will be opened, which we will only have to execute, and also another with the Help information.

Get started with Adapter Watch

Once we have downloaded the program, we will simply have to open it. The main application window will automatically appear, with the different tabs through which we can move. The first shows us the network adapters. There we can see the Ethernet network card, the Wi-Fi card, if we have any more or even the virtual ones.

If we move through the different tabs We will see the one corresponding to the TCP / UDP statistics, IP statistics, ICMP or the general tab. In some of them we will see changing data, since they are showing statistics, information that we send or receive.

In each of these sections we will see different types of data related to the cards. We can move from one to the other quickly. We will also see the buttons to manually refresh and update the information, as well as to create an HTML report.

Custom options

If we look at the menu above we will see the section of Choices. There we can configure some parameters and customize them. For example, the time for the data to be updated or the amount of information sent and received.

We can also copy the different cells and export them to a document in case we are interested in having the information present anywhere. Otherwise, Adapter Watch It is a very simple program, where we will not have many more options that we can customize, beyond the essential data related to our card.

What data does the Adapter Watch offer

If we focus more on the information that Adapter Watch is going to offer, we can mention that it tells us everything related to the adapter. For example we will see the exact model, the name of the adapter, the MAC address, the type of adapter (if it is Ethernet or Wi-Fi) …

We will also see more specific information related to data sent and received (measured in Bytes), when we start the connection, when will DHCP end, the DNS servers we are using or the IP address.

All this is very interesting to have a greater control over the network card. For example, we will be able to know if it works well, if the speed is adequate, know what IP it is using to avoid conflicts … This will help us to configure some parameters that are necessary to enhance the operation.

Know what DNS servers being used in a fast way may be useful in order to opt for different ones. If changes we can improve speed and even safety. Normally we use those offered by the operator itself, but we can use others such as those from Google or Cloudflare.

The adapter name, which is something of the most important that we can see, it will be necessary to solve certain problems and also to find the drivers. Sometimes our devices malfunction, we have failures related to a system update that has hung, and that will cause us to also update the network adapter drivers. We must apply it both in Ethernet and Wi-Fi.

In short, if we are looking for a simple program with which to view all the information related to network cards for Windows, Adapter Watch is an interesting option. It’s simple, it doesn’t have too many options, but it does offer everything you need to configure it, fix errors, and learn more about our connections.

Analisis Software

Create chat rooms and upload files up to 20GB with encryption

In this tutorial we are going to explain what this service can offer us. Then, below, we will see examples of use how we can use it.

What is Volafile and differences with other services

Volafile is a service that, for free and instantaneously, will allow file sharing and have our own chat room. Today, sharing files in the cloud, whether for work or leisure, and chatting is the order of the day. Surely we even use tools of this type such as Google Drive, Dropbox or OneDrive. If we compare it with Volafile, the difference is that it allows us to use it without having to register. That implies that we can obtain greater anonymity if we compare it with the most popular tools mentioned above.

However, as we will see later, if we like it, we can register for free and obtain a series of advantages. As for the basic functions that we can perform with Volafile, they are the following:

  • Allows us create a private zone with its chat room and its section for uploading files.
  • By using the Upload button we can rise or drag files to our private area of up to 20 GB So what expire after two days.
  • We can share that private room for others to download files or too add them themselves.

How to create your private zone without registering and first steps

So that you can see the advantages that registration or not offers us, we are going to see this service from these very different perspectives. First of all, comment that this service that Volafile offers us is very simple and intuitive. Thanks to him we will have our own chat room, and a section in which it is possible to share and send files in real time. If the file is very large, obviously you will have to wait for the upload to finish.

It should also be noted that it does not require any type of installation. We will be able to manage and use this service using our Internet browser. That means that we will be able to use it with any operating system such as Windows, Linux, Android etc. Obviously, using a PC or laptop will be more comfortable to use. In my case I have opted for a Windows PC.

Now, we are going to discuss the concept of Room that in Volafile is that private area where we will be able to chat or share files. If we want to create our Room or private area we must go to the Volafile website and click on the following link. Next, a screen like this will appear:

All you have to do is create your room by clicking on Create Room. In that sense, either of the two that you have framed in a red box is valid. The first time we enter our private area, a screen like this will appear:

Here, we would have two well differentiated parts:

  1. The part on the left would be the chat room. It is the area in which we could send and receive messages with the participants who are at that moment.
  2. In the section on the right is to upload our files. We could also download them and even another person with whom we want to share this Room could also upload files.

As for the elements that we have marked with a red box, we have:

  • Rename: to name our private area.
  • Send someone this url: is the link that we must send to the participants we want to invite.
  • Random user in this case Antigone: in case we are not a registered user, you can give us one at random and we will not be able to change it. Later, we will talk about registered users and their benefits.
  • Upload: by clicking on this button we can upload the files we need.

If we click on the button Rename we can give a name to our private area. This is an example where I have renamed it REDESZONE.

Then, if we click on our random user, Antigone, we will see how it offers us more possibilities.

In this case it gives us two possibilities:

  1. Register: to register a new user.
  2. Sign in: if we already have a user and we want to log in.

Then, if you want your own user, click on Register and start enjoying the benefits it offers. We are going to explain it from the Volafile home page but the steps are identical.

Create a registered user and first steps

To create a registered user from the Volafile website we are going to click on Sign in.

Once this is done we will see the following:

Here what we have to do is click on Create a new account.

All we have to do is choose a username and repeat the password twice. From that moment on, we will be able to use our personalized username as you can see below.

Now as you can see we have more options, and for example, click on Edit Profile we can edit our profile.

In this section, among other things, we could put an email, in case we forget the password and thus be able to recover the account. We can also change the password by clicking Change password.

Also, if we click on the name of our Room «NETWORKS» we can see its configuration options.

«Rename» that we have seen before together with Change URL To change the link to share are two of the most interesting options. Nor should we forget the Password that, even if you have the link to enter, if you do not have the password you will not be able to enter.

Let’s see it with an example for what we are going to click on Password.

In this section we have two sections:

  • Ask everyone again: if it is active, it forces the users who are inside to put the new password.
  • Password: the password we want to put.

Then, when we share the link at the time of entering we will get a screen like this where we must enter the password. Then we click on Submit Password.

How to upload files to Volafile and share them

On the right side we have the area where we can work with the files.

If we click on the button Uplodad The file explorer will open and we can select the file we want to upload. Remember that the files are valid for two days before they expire.

In this case, the one who has uploaded the file is an anonymous user that I created named Pelias. This is what the host user NETWORKS would see in which it is seen that it has more options.

For example, if REDES does not like the content or considers it inappropriate, it could delete that file. Simply clicking on the trash can icon could delete that file.

In this tutorial we have seen how thanks to Volafile we will be able to have our chat room to chat and a space in the cloud where all users who participate can upload and download their files.

Analisis Software

program to remotely access a computer, a program to take remote control

It should be noted that has a version for the operating systems for Windows, macOS, Linux and also for mobile devices. We can use it to control another computer, our Raspberry Pi, a mobile, etc. One of the peculiarities it has is that its configuration is very simple, since it does not require having to open ports or carry out any complex action.

This program will allow access other devices remotely Through protocols such as HTTPS, SSH, TCP, RDP or VNC, among others. We will be able to access the content of a computer through the Windows Remote Desktop easily. It is a totally free tool and, as we have mentioned, available for different operating systems.

Today remote work has gained an important weight. There are many programs and services that we have at our disposal to be able to connect to the office computer remotely, for example. Also with other teams within an organization or even in our own home, if at any time we need to access information that we have stored, programs, etc. allows us all this that we mentioned. We will be able to configure it to enter another computer and use it as if we were physically there. A very important factor for the day-to-day life of many workers, but also for home users who may need something like this.

How to use

The first thing we have to do to start using is download the program. It is available for most operating systems. In our case we have tested it on both Windows and Android. The process is similar in the type of device we choose. To download it you have to go to its page official Web and choose the version that interests us.

After downloading the program we can start the installation process. It is something simple and does not last long. Once it is finished, the Windows firewall may ask us for permissions to give access to this application.

For everything to work correctly we must carry out some actions in Windows. You have to configure remote access. To do this we have to go to Start, enter the Control Panel, go to System and there we look for the option to Allow remote access. We have to click on Allow remote connections to this equipment.

Allow remote access in Windows

With this we can start remote access. We will have to do this on both teams. Later we have to register the equipment in the application. It will ask us for a user account and password. We can login through the Google account if we want. It is completely free, as we have mentioned.

Register computer

This process must also be done on the other computer. We must install and configure it in the same way. Once this is done we will be at the disposal of create a new RDP service.

Create a new RDP service

When we have reached this point, we will have our configured equipment in the app. Now we have to give Devices, which is the second option that appears in the menu on the left. There the name of the team that we have created will have to appear (we can assign the name we want to both). It may not appear to us immediately, as it may take a couple of minutes.

As soon as the equipment we have created is available, we have to click on it. There the Services list. It may be empty or it may appear several, depending on whether we have selected some when installing it. However, in our case what we are going to do is click on Add Service (the “+” icon that appears above).

Create RDP

In the type of service you have to mark RDP. We have to give it a name (it can be whatever we want) and we leave the default port (3389), as well as the host address ( We have to hit Save.

Back in Devices The name that we have created will appear and we have to click on it. We must give the RDP service that we have created, a new window will open and we give Create connection. The blue button will automatically appear to stop the connection, which means that it has started successfully.

Connect remotely from another computer

Done all this we have to go to the other computer and log in with the same credentials in, unless we have done it before. When we are inside we give Devices, we mark the equipment that interests us (the one we created previously) and Connect. On the right we will see the button to copy url.

Now we will be able to connect remotely from the other device. In Windows we have to go to Start and write Connection to remote desktop and we open it. It will ask us for the address, which is the URL that we just copied. We click Connect and it will ask us for the password to access the other computer. The process is very fast and we will not be able to have control at all.

Remote desktop in Windows

Once we have connected, from that team we can have the full access to the device which we are trying to access remotely. We can see the screen that is started, use programs, the browser to open pages, carry out configurations, etc. Basically we can do the same as if we were physically sitting in front of the screen.

In short, by following these steps that we have mentioned, we can use to connect remotely to other devices. We have seen how it works in Windows, which is the most used operating system on desktop computers, but we can also use it in a similar way in other OS such as Linux or macOS. The mobile version for Android is also very useful to have control from mobile devices.

Analisis Software

FlipDrive share and save your files from anywhere

We are going to start by explaining what this service offers us, how we can create a free account and some examples of use.

What FlipDrive offers us to work in the cloud

FlipDrive It will allow us to access and share all our data, regardless of where we are. Its way of working consists of storing our data in the cloud, in a suitable and secure online place. Thus, we have them available when we need them, anywhere and also from any device. FlipDrive is based in New York City and offers 24/7 support.

This service offers us a safe storage in the cloud to store data online. Here we can save our photos, documents, music, software and other files.

Another interesting function of FlipDrive is the «Photo albums»Specialized to save our photos online safely. In addition, it allows us to keep the original photo files with full resolution so as not to lose quality, share the photos with whoever we want and have a page of personal public photos. Photos are stored in a state-of-the-art, disaster-proof data center, so we can rest assured that they are protected against computer failures and viruses. On the other hand, we have full control of our photos. In this regard, we decide who has access to our personal photos, being able to choose between:

  • Keep our photos private.
  • Create a password protected photo album.

FlipDrive for sharing, collaboration, backup and more

This cloud-based service is designed to share and collaborate. In that aspect, we can share any file of any size with anyone. All we have to do is configure the data access permissions for different people and groups. On the other hand, for the rest of our data we should not worry since they remain private and safe.

They also have a contact management system in which we can store, organize and manage our contacts. We can quickly locate a contact information and create our groups. By storing contacts we can share our data with individuals and entire groups without having to, for example, retype the email address.

Another way to use it is like cloud backup. A fundamental thing today is to have a backup plan to be able to recover our most important data in case our computer crashes. If this happened, we would find ourselves in a difficult and frustrating situation. For this reason, from RedesZone we recommend having a copy of our essential data on another computer, on an external hard drive or stored in the cloud. Thus, FlipDrive safely stores and protects our data from any mishap. Keep in mind that normal backup solutions are vulnerable to attacks and hardware failure. In that sense, we obtain a truly secure private cloud where to store a backup.

It also has a bookmark system to save, organize and retrieve everything online. Thanks to this, we can create a custom category and add the related links that we need.

How to create a free or paid account

The first thing we have to do is go to the FlipDrive website by clicking on the following link.

Next, click on Sing UP to be able to register and create our account. At that moment, a list will appear with the available plans that are at that moment.

In this case we are going to opt for the basic plan which is the free one. Account creation is similar to that of the rest of the plans. Practically, the free one differs from the other Trial versions, in that they let you try it for 15 days for free, but you have to put a credit card to create the account.

Therefore, in our case we are going to click on SING UP NOW that you have marked in the red box.

Here, we have to put a username, our name, surnames, an email, the country and a password that you must put twice. When we finish filling in all this, we will click on CONTINUE.

Now he tells us that he has sent an e-mail to the account that we put in the registry, and that we need to click on a link to activate it. Therefore, we will go to our mail inbox and see a message like this.

Then we click on ACTIVATE MY ACCOUNT and we will get a screen like this to complete the registration.

Now we put the-mail and the password if they do not come out, click on LOGIN, and we will be able to access our space in the cloud.

Get started with this cloud service

The first time we enter, a screen like this will appear:

Here, at the top, we see that our storage is the basic one, and that we have a space of 10 GB. Another thing to comment is that the size of the file that we want to upload should not be greater than 25 MB. Below we have access to our applications:

  1. My drive: it would be to manage our hard drive in the cloud. There we have our folders, we can create new ones, see what they are sharing with me and what I am sharing with others.
  2. Photos: to create an album and save our photos.
  3. Contacts: with this option we can create contacts and more.
  4. Bookmarks: here we can, for example, have stored the links of the URLs that we need most often to work. It allows to classify them in folders.
  5. My Account: used to change the options of our account. For example, we can change the password or manage the space to change to a higher plan.

This would be an example of the section Photos:

If we click on New Album we can create a folder to save our photos. In addition, it will let us choose if we want it to be public or private. Private Album tells us that it is private. Clicking on Add Photos, we will add our photographs and with Compartir we can share them.

The «Contacts» and «My Drive» sections

Managing and creating contacts in FileDrive and then passing them on is easy. It will also allow us to create groups so that later it is easier for us to share files. If we click on Contacts, Add Contact we can easily create a contact.

However, if we want to create a group so that later it is easier to share files, we will click on the second button that says New Group. Now we go with the section My Drive which would be our disk in the cloud.

With the button ADD NEW we can create our folders and upload the files. Other ways to upload the files would be:

  1. Dragging from Windows file explorer to the window that says Drag & drop.
  2. Clicking on the button ADD File.

In the lower left corner we have available storage. It should also be noted that we have an app to use with mobiles. This would be the Android one:


This other one from IOS:


As you can see, FileDrive will allow us to use it both on desktop computers and on mobile devices such as tablets and smartphones easily and quickly.

Analisis Software

Scan WiFi networks for free with Vistumbler on Windows 10 and watch channels

What is Vistumbler and what does it offer us

Vistumbler we could qualify it as a wireless network scanner. In addition, it is a free program in order to Windows from Open Source. The main purpose of Vistumbler is to map and visualize the routers and access points that we have around us. This function is performed based on the collected GPS and wireless data.

Among the features offered by this free program we find the following:

  • Searching for access points and routers for wireless information using the native Windows WiFi API or netsh.
  • It has support for GPS. Thus, it supports the use of COM-based NMEA receivers.
  • It allows exporting and importing access points from Vistumbler TXT, VS1, VSZ, Netstumbler TXT and Text NS1 files.
  • Export of access point GPS locations to a Google Earth or GPX KML file which is a GPS interchange format.
  • Allows live tracking of Google Earth. Thanks to Auto KML, it automatically shows us the access points and routers in Google Earth.
  • Checking the strength of the Wi-Fi signal and through sound files it notifies us of the changes. For example, when it finds a new WiFi network.
  • The program is open source under the GPLv2 license and is written in AutoIt scripting language.

It should be noted that this program has a long history, since its first version dates from 2007. It is not a program that has been forgotten and is obsolete since it periodically receives updates. If you want to see how it has improved over time, you can check its history where you can see the changelog and download previous versions. This could be useful if the latest version doesn’t work well for you on an older computer.

Minimum requirements and installation of Vistumbler

The version that we are going to use is 10.7. However, if there is a more modern version, it is advisable to use the latest one. As for the minimum requirements to use Vistumbler they are the following:

  • A Windows 10 computer, however, should still work fine on Windows 8, 7, and Vista.
  • That PC or laptop has a Wi-Fi adapter with its corresponding drivers or drivers installed.
  • Between 15 and 50 Mb of free disk space for its execution or installation.

As you can see, the minimum requirements are very low, and it will be able to run without problems on almost any computer. The first step we are going to take is to download the program, for this we will go to your Web page. Then, we will get a screen like this:

Here we have two installation options:

  • Exe Installer: for a typical installation with an installer.
  • Zip Portable: if we want to use the portable edition without having to install anything.

Next, we will explain both and recommend which one is more worthwhile in each situation. We are going to start with the one that requires the use of an installer, for this we will click on the box above Exe Installer. Once we have downloaded that file through our browser, we will run the installer. Then, a screen like this will appear to us:

Here it informs us that two components are to be installed. One of them is the program itself, which is the option that cannot be unchecked. The other is to create a shortcut in the “Windows Start Menu”. In this case, we are going to leave both boxes selected, and we are going to click on Next.

Then another screen will appear where we can choose the folder where we want to install Vistumbler. Unless it is for a special reason, it is best to leave it as it comes by default. Then, click on Install and we install like any other program.

Installing with the installer would be the most recommended option if you plan to use it frequently. If we wanted to use the “portable” version, we would follow these steps:

  1. We click on Zip Portable.
  2. Once the file is downloaded, we unzip it. For this we can use the Windows explorer decompressor, or other programs dedicated to it such as WinRar or WinZip.

My recommendation is that the first time to try it you use the portable version and then, if it convinces you and you are going to use it a lot, use the version with the installer.

Using GPS

As for the GPS function of Vistumbler it doesn’t always work. Sometimes you have to make a series of settings. In that sense, we have three options to use GPS with the program. The first is Kernel32 which is the recommended “COM” interface as it is compatible with both 32-bit and 64-bit versions. In case it doesn’t work, you can try CommMG, which should also work with x32 and x64. Lastly, we have Netcomm OCX which requires NETCommOCX ActiveX control to be installed first which will only be installed on 32-bit versions of the operating system. However, some people have managed to use it on x64 systems.

How to put the program in Spanish language

To start the program we will have to run the Vistumbler.exe file in the portable edition. In the version with installer in the «Windows Start Menu» we write Vistumbler and click on its icon. The first time we start Vistumbler, a screen like this will appear:

An important section is «Settings»Which is where we will be able to make the adjustments. There we will click on «Set Language»To change the language and we will configure it like this. One peculiarity is that it takes a few seconds until the settings section opens. So, to switch to Spanish, we will configure like this:

For the change to take effect it will be necessary to restart the program. If you look to the left of Language, you have the GPS options in case you have to change something. In the previous section we talked about the three possibilities it offered.

Here we already have the program in Spanish.

Once we have put it in Spanish, we are going to see how we can scan WiFi networks and which channel to choose.

How to scan WiFi networks with and choose the best channel

To find out the networks of our close neighbors, click on Scan APs and it will offer us results like these:

On the left, by clicking on “Authentication” you could see the nearby networks that have it. In this case, we have chosen WPA2 because it is the recommended minimum that you have to have. On the right you have a complete list in which you are offered a list of WiFi networks with many details such as:

  • SSID or network name.
  • Channel you use.
  • The signal that reaches us.
  • Authentication and encryption.

As for the channel that we must choose to broadcast my WiFi network, first we need to know which WiFi channels are being used in our closest networks. In this case, the most useful thing is to order all the WiFi networks by RSSI, that is, by WiFi signal, and choose the channel farthest possible from the two or three networks that are closest to us. This is very useful for routers and access points that cannot choose automatically.

As you can see, Vistumbler is a free open source program to scan WiFi networks that is very simple and easy to use.

Analisis Software

How to use DroidSheep to capture traffic on a wireless network

DroidSheep, a packet grabber for Android

Sniffing networks It basically consists of analyzing the packets that are sent and received on a network. These programs can be used both by hackers and at the user level to simply learn more about our network. In the first case, they could use it to capture information that we send, such as passwords or important personal data. Hence, it is always very necessary to maintain security and not compromise our equipment.

DroidSheep is an application that we can use on Android, which is today the most widely used operating system on mobile devices. It allows us to sniff the wireless networks and capture certain types of data.

In our case we have tried DroidSheep 15. We can download the ZIP file and unzip it on our computer or directly send it to the mobile phone and download it there.

Get started with DroidSheep

To start using DroidSheep, the first thing to keep in mind is that we must have the power option enabled install apps of unknown origin. Otherwise we could not install it on the mobile and we could not use it.

This option can be activated from Settings in a simple way. It will depend on the exact version that we have installed. In general we will have to go to Settings, Lock screen and security and Unknown sources. There we will have to enable this option to be able to add applications without downloading them from Google Play.

Another very important point is that this program will not work on all mobiles. Not at least if we don’t have it rooted. Therefore, this is a requirement that must be taken into account. As standard, without have done root previously, DroidSheep will not run properly on mobile.


Once we have done this that we mentioned, once we have the device ready to work properly, we simply have to install it. It is a simple process, as it would be with any other similar program.

Later it will ask us to accept the legal terms and the operation of the application. It is the first screen that will appear once we have started the installation. It is basically a warning that we should not use the program to steal third party data and that we simply use it on our own network, for personal use.

Accept DroipSheep terms

Once this is done, we will be ready to start using the program. We will have it correctly installed on our computer and we can start using it. We are going to find two options.

ARP-Spoofing and Generic Mode

When we start using DroidSheep we will find the option to ARP-Spoofing Y Generic mode. We simply have to check the box that interests us at the bottom and click Start.

The first option is to use the program on networks that are encrypted with a WPA or WPA2 password. If we uncheck this option we will only be able to use it in WEP networks, although we will not be able to be detected by third party programs.

We already know that today the WEP certificate is obsolete and can be easily exploited through the right tools and knowledge. Hence the importance of always having reliable passwords, which use stronger encryption such as WPA2.

From that moment on, the program will start capture traffic. When it receives packets that travel through the network, it will display them in the main window. So we can analyze them, obtain information about it, learn more about the connections and also see if there is something that may be affecting our security on the network.

Keep in mind that this program would even allow you to capture cookies from web pages and be able to log in as if you were another user. Of course, for this to happen it must be through unencrypted traffic, something that is less and less widespread today.

Why we must take care of the connections in public networks

The fact that there are programs like DroidSheep is very useful for us to be aware of how data travels and how it could be intercepted and compromise our security. But this can especially get complicated when using public Wi-Fi networks.

If we are connected to a public network, open and available to anyone, such as an airport or shopping center, we must at all times avoid accessing pages that are not encrypted by HTTPS. Otherwise, through programs of this type they could extract information, steal personal data and even passwords.

We can achieve this using VPN programs. They are very useful tools that help us in our day to day to encrypt connections, also circumvent geographical restrictions that may exist, etc. A way to also combat that information can be intercepted when browsing Wi-Fi networks that are not completely secure.

In short, DroidSheep is a program that can act as a sniffer of packets that travel on the wireless network where we are connected. Something we can use to enhance the safety of our Wi-Fi and learn more about the protocols. But it could also be used, along with other similar tools, by hackers on a public network and steal information. Hence, we must at all times maintain security.

We must always count on programs that protect us, like a good antivirus, as well as having the equipment updated correctly. But without a doubt, when it comes to wireless network connections, security must be even more present. We must not leave loose ends that can be exploited by cybercriminals and steal information or infect systems in any way. There are many programs that can be used for bad purposes and we must always keep our networks properly secure, with passwords and good encryption to keep cybercriminals away.

Analisis Software

How to simulate a DDoS attack with BoNeSi on Linux

DDoS attacks

We can say that DDoS attacks They point to computer systems or networks in order to prevent them from giving a normal response. For example, a network could consume bandwidth and cause it to not respond to user requests.

Let’s put a DDoS attack against a web page. That attack will make multiple requests for saturate the server. In the event that a visitor tries to log in, they might find that it doesn’t work.

It is a problem that over the years has been increasing. Even the hackers they can use it for the purpose of blackmailing companies and organizations. After all, leaving a company that is dedicated to online sales, for example, a whole day without service can mean a significant financial loss.

This means that we must be protected at all times. We must prevent the entry of malware that could compromise our systems, correct possible vulnerabilities, improve the network security… Everything can help us to prevent attacks such as DDoS and many other varieties that put our computers at risk.

BoNeSi, a tool to make simulated attacks

BoNeSi is a tool that helps us better understand how a DDoS attack works. It basically allows us to simulate one. We can use it in our network, to point to a IP adress concrete. We can install it in a virtual machine with Linux and act against a computer equipment that we have.

Keep in mind that, as we mentioned, it is a tool for Linux. Therefore, we are going to have to have some distribution. We can use it on a computer if we have a distro installed, or we can also test it in a virtual machine in Windows.

The first thing we have to do is download BoNeSi since GitHub. There we will find the source code of this tool, as well as the information necessary to start it. We will see data about its installation, operation or the objectives of having it installed.

Once we have downloaded it, the next thing to do is install it. We must open a Terminal on Linux and run the following commands:



make install

When we have installed it, we simply have to run it from the Terminal. It will show us a window with the different options of this tool.

The most basic thing, to carry out an attack against a specific IP would be as follows: bonesi IP: port. For example bonesi From that moment on, the tool will start sending packages constantly. It will start to carry out a DDoS attack towards the address we have set.

Why is BoNeSi useful

What use is this to us? Security is a very important factor and we must always take care of all kinds of details. For this we can also make use of tools that help us to avoid trouble, to put our devices to the test as well. So we can see how they respond to possible failures and attacks.

BoNeSi, therefore, can help us to check if our equipment is effective against a DDoS attack. We can see to what extent security fulfills its mission and we can face a hypothetical real attack that could leave our computers and servers without providing service.

However, we must bear in mind that we are facing an attack from a single device and our property. Especially if we make use of a virtual machine, which has much less resources, we will not notice practically anything. The team will continue to function normally and the consequences are minimal. In a real DDoS attack the results are much more remarkable. We are talking about hundreds of computers that are part of a botnet, pointing against a specific server.

How to protect our team from DDoS attacks

We have seen how BoNeSi works, a tool for Linux that allows us to test our devices with simulated DDoS attacks. We have also talked about why this type of program is interesting. Now we are going to give some tips to protect ourselves from attacks of this type that we may suffer in real life. A series of recommendations to implement and improve security at all times.

Keep equipment safe

Something fundamental to protect our security at all times is to have the equipment properly insured. A good antivirus, for example, can prevent the entry of malware and attacks that can compromise our devices at any time.

But you don’t just have to have an antivirus, especially when we want to protect ourselves from DDoS attacks. It is essential to have a good firewall that can intercept malicious connections against our servers and computer equipment. We have at our disposal a wide range of options in this regard. Whatever type of operating system or device we use, we must have good protection.

Upgrade systems

Of course, an important point is to have the correctly updated equipment. It is essential to correct any vulnerabilities that may exist. Hackers can take advantage of computer flaws to launch their attacks.

This means that we must update the systems at all times. We must always have the latest updates and security patches that appear for our servers or computer equipment.

Check network connections

Another issue to keep in mind is to constantly review the network connections. It must be observed that there are no strange devices trying to access or within our network. We must carry out regular reviews and make sure that there are no possible intruders who put our security at risk.

In short, these are some recommendations that we can put into practice to avoid DDoS attacks. A series of tips that can help improve security and prevent potential intruders from putting our systems at risk.

Analisis Software

How to professionally analyze your local network with Colasoft Capsa

Capsa Free main features

Colasoft has two versions of this Colasoft Capsa program, one is completely free, but with limited functionality, and the other is paid but has all the available features. We can use the free version without any problems, renewing the license key every four months to continue using the software. The paid version costs $ 995 and we can download a “trial” version for 30-day trials, in this way, we can see all the features without paying anything and see if it is worth it.

The free version of Capsa Free It will allow us to monitor a total of 10 IP addresses of the local wired network for 4 hours in a row, we will be able to monitor only the wired interfaces, because we have the possibility of monitoring the WiFi connections. They are only available in the paid version «Enterprise». Another feature is that we can manually save the capture file for later treatment, however, we have many limitations that the paid version does allow us: automatic update, supports multiple network adapters simultaneously, supports TAP, we can export the data we capture , perform a TCP port scan, customize reports of all the information collected, see the DoS and ARP attacks and many other characteristics that you can find in the following table:

In order to download and use this program we will have to register completely free of charge, this software is compatible with Windows Vista, Windows 7, Windows 8, Windows 2008 and also Windows 10. On the official website we will have to put a real email address, because that is where we will receive the license key to activate the free version of the software:

Once we have filled in everything, we must click on «Download Now» and a notification will automatically appear indicating that we can download Capsa Free, click on «Save file» for later installation.

While the software is downloading, in our email tray we will see an email indicating the serial number that we must enter, and also that we will need to reactivate the software every four months. In addition, in the email that you can see below, they invite us to try the Capsa Enterprise demo version where we will have all the additional features to this Capsa Free program.

Once we have downloaded the software, we can install and activate it easily and quickly.

Capsa Free Installation and Activation

The installation of this program is as simple as in the rest of Windows programs, an installation wizard will appear that we must follow and click on «Next» to follow the steps, it does not require any additional software installation to do its job, however, it will install a suite of free tools such as “Mac Scanner”, “Ping tool” and others to increase the functionality of the software. In the following gallery you can see all the steps that we must follow:

Once installed, if we launch the program, it will tell us that we must activate it. We will run an activation wizard to enter the license key that we have received by email. In the first menu we click on «Next», it will indicate that we must enter the serial number of the license in the box, and if we want to activate it online (it is recommended to do so), once we have entered the key, it will automatically verify that it is correct and let us use the program.

When the activation wizard has finished, it will indicate the limitations of this free version:

  • Only the first 10 private IP addresses will be scanned.
  • Can only be monitored through a network card
  • You can only have one project open at a time
  • Only one package file can be parsed by replay.
  • We will not be able to customize the main menu nor will we have other interesting functionalities that the “Enterprise” version does have.

Once we know how to install and activate this software, we will see the main configuration and display options.

Colasoft Capsa 11 Free Operation and Options

The operation of this program is very simple, later when we go to analyze all the information that we have available we will have it perfectly organized to find everything we need. In the main menu we will have to choose which physical network interface we can use, we will click on the white box selecting the physical interface. Once selected, we will have to choose which analysis profile we want to take, there are different types of profiles to only collect and display the information that interests us:

  • Complete analisis
  • DNS traffic analysis
  • HTTP traffic
  • Email Traffic
  • DNS traffic
  • FTP traffic analysis

Once we have selected the profile, we will click on the green button that indicates “Start”.

If we go through the different profiles, on the right side it will indicate which modules it has loaded to check all its traffic, logically, if we select “Full Analysis” we can select all the information. Depending on our needs we can choose one profile or another, we have chosen the analysis of “FTP” only, but you can choose the profile you want.

In the main menu we can see the use of the link and the traffic in bytes that we are sending and receiving, in the upper part we can access different options available and even change the Ethernet network card, we can also see the analysis of FTP traffic in a way easy and fast.

In the “Log” section we can see all the DNS-level registration that we have made with our equipment, and also the FTP log if we have carried out this type of communication.

In the «Summary» section we can see packet exchange statistics, the current ones in real time, the average and other important information.

In the “Protocol” section we can see a classification by protocol of the bytes sent and received, as well as the total of the packets, right at the bottom we can see to which MAC address the different packets go and even their IP address, all this shown in an easy to understand way.

In the “MAC Endpoint” section we can see all the MAC addresses that it has detected on the network when communicating with the different computers, we can see all the communications made by us and those made to us.

The same happens with “IP Endpoint”, instead of showing us the MAC addresses, we can show the related IP addresses and with which we have made communications. Another important detail is that it will show us the country where we have made a specific communication, ideal to know with which countries we are communicating.

In the “IP Conversation” tab we can see the origin and destination of the different packets, showing us the country where that specific IP address is located, in addition, we can see the duration, the bytes sent and received and much more information, and everything it very easy to understand.

In the “TCP Conversation” section we will see all the TCP communications that we have made, with their corresponding origin and destination, duration, bytes sent and received and more information.

In the “UDP Conversation” section we will see all the UDP communications that we have made, mainly the traffic made by UDP is the DNS traffic.

We can also see the different ports of origin and destination.

Next, in the «Matrix» section we can see a graph of all the traffic carried out.

Finally, in the section on the left we can filter by different protocols, IP and MAC, in order to search for the FTP connections made.

As you have seen, this software is very easy to use and understand, it will allow us to monitor all our equipment with outgoing and incoming connections easily and quickly. For example, the Wireshark program with its corresponding filters would provide us with the same information, but with this program we will have everything classified so that we do not have to use these advanced filters that Wireshark has.

Analisis Software

Free network forensic analysis software to view traffic

Main features

The main characteristics of this program is that it will allow us to perform a network forensic analysis with PCAP traffic captures, although we will also have the possibility of sniffing all the traffic from the wired or WiFi network card, however, it is compatible with WireShark because it is the world’s most widely used protocol analyzer. Other important features are that it allows you to extract passwords from data captures directly in plain text, without the need for us to have to inspect all traffic in detail, it is completely automatic. We can also build a map of the network, rebuild TCP sessions, we can extract the hashes of the encrypted passwords and even convert them to Hashcat format to later try to crack them with this program, carrying out a brute force attack or offline dictionary.

The primary goal of this BruteShark program is to provide a comprehensive solution for IT security researchers and network and system administrators to identify potential problems, weaknesses, threats on the local network, and other security flaws that could lead to a future attack. This program is available in two clearly different versions, we will have a version with a graphical user interface for the Windows system, and we will also have a command line version (we will run in a terminal) that is compatible with Windows and Linux operating systems. Of course, this program can be used to analyze the network traffic of Windows, Linux or macOS computers without any problem.

This program is capable of extracting and decoding user names and passwords from protocols such as HTTP, FTP, Telnet, IMAP, SMTP and many others, that is, all protocols that do not have end-to-end encryption such as HTTPS, FTPES, SSH and many others. This program is also capable of extracting the hashes and transforming them into Kerberos, NTLM, CRAM-MD5, HTTP-Digest formats and more, of course, you will be able to create a visual network diagram with the users and the different network devices, it is also capable of extracting all DNS queries that have been made (as long as DoH or DoT is not used, which is encrypted), it also allows rebuilding TCP and UDP sessions, carving files and even extracting VoIP calls if SIP protocols are used and RTP.

Once we know all the features of this program, we will see in detail how it works.

Download and installation on Windows

If you are interested in installing this program on Windows, you can download two versions:

The only prerequisite is to have WinPcap or NPcap installed, we must remember that, if you have WireShark installed, you will have installed one of both drivers. You must also install the .NET Core Runtime in order to run it.

If you are going to install this program on Linux systems, you will need to have libpcap installed, then we will execute the following commands:

find /usr/lib/x86_64-linux-gnu -type f | grep libpcap | head -1 | xargs -i sudo ln -s {} /usr/lib/x86_64-linux-gnu/



Once installed, we proceed to execute it, we must remember that we will only have a graphical user interface in Windows operating systems, in Linux we will have to execute commands by console.

How BruteShark works

This program works in a really simple way, the first thing to do is upload a PCAP file to analyze, and then analyze the file or files that we have uploaded. We also have the ability to build TCP and UDP sessions, and even start with network data capture. If you do not have any capture to analyze, you can use this program instead of using WireShark, export the capture in PCAP and later import it in this program. In this way, we can do it much easier with a single program.

In the left part of the program is where we can see the user credentials that are in the network traffic, they will show us both the passwords in plain text (if protocols without encryption have been used), and it will also show us the hashes if we do use of Kerberos, NTLM and the other protocols that we have discussed previously. In this section we will also be able to see the network diagram, the sessions carried out, the DNS requests, and finally we will find the possible files that it has captured and the VoIP calls if we have made any.

If we want to capture network traffic from any of the network interfaces, it is absolutely necessary to run BruteShark with administrator permissions, otherwise, we will not even get the wired and WiFi network cards that we have on our computer.

We must also bear in mind that, if we are going to use WireShark, we must export the captures in PCAP format and not PCAPNG as it happens by default, because we will get the following error. We will have two options, either use WireShark and save as PCAP, or use the tshark program through the command line.

When we open a PCAP compatible capture, then we must click on “Analyze Files” and it will begin to analyze the capture, this can take from a few seconds to a few hours, depending on the size of the capture that the BruteShark program has to analyze.

In our case we have always used DNS and HTTPS connections, therefore, it has not captured any password or password hashes by not using Kerberos or NTLM. What we can see is the network map of all the requests made.

We can also see all the sessions that have been made from our computer, with their corresponding source and destination IP address, as well as source port and destination port.

Finally, we can see all the DNS requests that have been made during the data capture, for example, our website, American Express, Interactive Brokers and many others that you can see below:

As you have seen, using this program to extract credentials, DNS requests, view the network map, sessions and even view files or information on VoIP calls is really easy to use, this same information would be obtained by viewing the capture of WireShark data, but it will take longer if we don’t use the proper filters, so BruteShark makes this a lot easier for us.