(Source section: network traffic management
File format in compressed package: executable file
Attachment source: Internet
Running platform: Windows platform
Whether it has been verified by me: Yes
Nature of accessories: Free
Detailed description: Jusheng network management 2.1 Standard Version breaks through the 20 user limit
1. run & quot; Jusheng network management 2.1 standard version is free of 20 user restrictions & quot; Modifier.
2. run Jusheng network management 2.1 (program cracked according to law)
3. manually select the client to be controlled, which can control n machines, instead of the poor 20 after online cracking
instructions:
Cracking steps:
Step 1: adjust the time until the program expires, and then run it once;
Step 2: use this patch to repair;
Step 3: run the Jusheng network management 2.1 program to prompt for registration. You can enter a registration code and restart it.
Jusheng network management -netsense2.10 system introduction
1、 Product advantages
Brand: from the earliest version of P2P over to the present, Jusheng technology has experienced three years of tests from products, technologies, services to the market. P2P over not only has the most resounding name in the domestic P2P traffic management software market, but also is one of the most powerful products.
Growth: over the past three years, we have continuously collected feedback from users, and continuously developed new functional modules according to their international needs, resulting in rapid product growth.
Product line: Jusheng network management product line includes solutions for small and medium-sized enterprises, group companies, government agencies and other industries. We will strive to develop and configure the most appropriate network monitoring solutions according to the actual needs of various enterprises and institutions: module selection and precise customization are one of our company's basic product ideas.
2、 Technical advantages
1. No client software is required. You can control the whole LAN by installing it on a single computer.
2. The only domestic monitoring software without any requirements for the network environment is installed on any machine in the LAN.
3. It is the only one in China that can directly block BT data messages at the network application layer, so that the management can completely block all BT downloads with a single click of the mouse.
4. The only network monitoring software in China that can intelligently inhibit BT downloading.
5. The only monitoring software in China that can control the flow rate of any host in the LAN in real time, rather than just controlling the host flow.
6. The only monitoring software in China that allows LAN hosts to use the mailbox of any portal website, but prohibits clicking on other links of the website (provided in the official version).
7. The only monitoring software in China that can accurately control the website.
8. The only monitoring software in China that can screen websites of any industry category
9. The most strict management software for any chat tool in China
10. The software with the strictest control over any online games and other online activities in China
11. The only monitoring software in China that can detect the three most serious tool attacks on LAN, such as LAN terminator, network law enforcement officer and network Scissorhands.
12. The simplest network monitoring software in China.
3、 Functional advantages
1. download control: the system can completely prohibit various P2P downloads, such as BT, eMule (electric donkey), Xunlei, etc; You can also prohibit any HTTP download or FTP download
2. bandwidth management: the system can view and control the bandwidth of any host in the LAN and analyze the host messages.
3. chat management: the system can control QQ, MSN, Netease bubble, Sina UC and other mainstream chat tools, as well as any other chat tools.
4. website access management: it supports full control over the WWW, black and white list control, and control over the LAN host acting as a proxy server.
5. portal website mailbox license function.
It is the only monitoring software in China that allows LAN hosts to use the mailbox of any portal website, but it is forbidden to click other links of the website.
6. setting of system control time
The system supports the administrator to set monitoring time for all monitoring items, so that the administrator can distinguish the control of working time and non working time.
7. group policy settings
The system administrator can set different permissions for different hosts in the LAN, which is convenient for the administrator to manage by groups and permissions.
8. customize ACL rules
The system provides network management personnel with user-defined control interface ACL rule settings. Through ACL rules, you can set rules including IP source address, IP destination address, protocol number (tcp/udp), port range and other parameters. The system will automatically intercept data packets that meet the rules. By using ACL rules, you can easily realize the flexible expansion of control functions. With the help of ACL rules, you can shield any online games.
9. LAN security management
IP-MAC binding: the system supports IP-MAC binding to LAN hosts. Once illegal hosts are found, they can be isolated from the network
Detection of LAN attack tools: the system can detect attacks by LAN terminators, network law enforcement officers and network Scissorhands
Disconnect the public network connection of the host: the system can disconnect the public network connection of the specified host
10. network traffic statistics
Real time flow rate statistics: the system can display the flow rates of all hosts in the LAN in real time (including tables and histograms)
Flow rate statistics in a certain period: the system can display the flow rate statistics (including tables and histograms) of all hosts in the LAN for a certain period of time
Daily traffic statistics: the system provides daily traffic summary and statistics functions for all hosts (including uplink, downlink and total)
Monthly traffic statistics: the system provides monthly traffic summary and statistics functions for all hosts (including uplink, downlink and total)
11. detailed log records
The system records in detail all control information, all www access websites, all flow information and all flow rate information. Users can browse by themselves.
This document contains the following attachments:
NetSense. exeCRAKED. Exe Jusheng network management -netsense2.10 Jusheng network management Jusheng network management Jusheng Network Management)