找回密码
 立即注册
邮电通讯系统 2022-06-18 86 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
来源版块: 网络流量管理
压缩包内文件格式: 可执行文件
附件来源: 互联网
运行平台: Windows平台
是否经本人验证: 是
附件性质: 免费
详细说明: 聚生网管 2.1标准版突破20用户限制
1.运行"聚生网管 2.1标准版 免20用户限制"修改器.
2.运行聚生网管 2.1(依法破解后的程序).
3.手动选取需要控制的客户机,可控制N台机器,而不是网上破解后的可怜的20台.
使用说明:
破解步骤:
第一步:将时间调到该程序过期,然后运行一次;
第二步:使用本补丁进行修补;
第三步:运行 聚生网管2.1 程序提示注册,您随便输入一个注册码,然后重新启动就可以使用了。
聚生网管-Netsense2.10系统介绍
一、产品优势
品牌:从最早的版本P2Pover到现在,聚生科技从产品、技术、服务到市场,已历经进三年的考验,P2Pover在国内P2P流量管理软件市场不仅拥有最响亮的名字,也是功能最强大的产品之一。
成长性:三年来我们不断收集用户的反馈信息,根据他们的际需要不断研发新的功能模块,产品成长迅速。
产品线:聚生网管产品线包括中小企业、集团公司和政府机关等行业的解决方案,我们将力争根据各个企事业单位的实际需求来研发、配置最合适的网络监控放案:模块选择,精确定制是我们公司的基本产品念之一。
二、技术优势
1、不需要任何客户端软件,只需单机安装,就可以控制整个局域网。
2、国内唯一对网络环境没有任何要求的监控软件,安装在局域网任意一台机器上。
3、国内唯一可以直接在网络应用层对BT数据报文进行封堵,从而可以让管理只要轻轻点击一下鼠标,就可以完全封堵所有的BT的下载。
4、国内唯一可以智能抑制BT下载的网络监控软件。
5、国内唯一可以实时控制局域网任意主机流速的监控软件,而不仅仅是控制主机流量。
6、国内唯一可以许可局域网主机使用任意门户网站的邮箱,但禁止点击网站其他链接的监控软件(正式版提供)。
7、国内唯一可以对网址进行精确控制的监控软件。
8、国内唯一可以通过对任意行业类别的网站进行屏蔽的监控软件
9、国内对任意聊天工具控制最为严格的管理软件
10、国内对任意网络游戏和其他网络活动控制最为严格的软件
11、国内唯一可以检测到局域网终结者、网络执法官、网络剪刀手等当前对局域网危害最为严重的三大工具攻击的监控软件。
12、国内操作最简单的网络监控软件。
三、功能优势
1.下载控制:系统可以完全禁止各种P2P下载,如BT、eMule(电驴)、迅雷等;又可以禁止任意的HTTP下载、FTP下载
2.带宽管理:系统可以查看、控制局域网任意主机的带宽、并可对主机报文进行分析。
3.聊天管理:系统可以控制QQ、MSN、网易泡泡、新浪UC等主流的聊天工具,以及其他任意聊天工具。
4.网址访问管理:支持对WWW的完全控制、黑白名单控制、以及对局域网主机充当代理服务器的控制。
5.门户网站邮箱许可功能。
国内唯一可以许可局域网主机使用任意门户网站的邮箱,但禁止点击网站其他链接的监控软件。
6.系统控制时间的设置
系统支持管理员对所有的监控项目设定监控时间,便于管理员区分工作时间与非工作时间的控制。
7.组策略设置
系统管理员可以对局域网不同的主机设定不同的权限,便于管理员进行分组、分权限管理。
8.自定义ACL规则
系统为网管人员提供自定义控制接口-ACL规则设置,通过ACL规则,你可以设置包括IP源地址、IP目标地址、协议号(TCP/UDP)、端口范围等参数的规则,系统将自动拦截符合规则的数据报文,通过使用ACL规则,你可以轻松的实现控制功能的灵活扩展,借助于ACL规则,你可以屏蔽任何网络游戏。
9.局域网安全管理
IP-MAC绑定:系统支持对局域网主机进行IP-MAC绑定,一旦发现非法主机,即可以将其隔离网络
局域网攻击工具的检测:系统可以检测局域网终结者、网络执法官、网络剪刀手的攻击
断开主机公网连接:系统可以断开指定主机的公网连接
10.网络流量统计
实时流速统计:系统可以实时显示局域网所有主机的流速(包括表格和柱状图)
一定时期流速统计:系统可以显示局域网所有主机的某一段时间的流速统计(包括表格和柱状图)
日流量统计:系统提供了所有主机的日流量汇总统计功能(包括上行、下行、总量)
月流量统计:系统提供了所有主机的月流量汇总统计功能(包括上行、下行、总量)
11.详细的日志纪录
系统详细记录了所有控制信息,所有WWW访问网址,所有的流量信息,所有的流速信息。用户可以自行浏览。
本资料共包含以下附件:
NetSense.exeCRAKED.exe聚生网管-Netsense2.10聚生网管聚生网管聚生网管.....

(Source section: network traffic management
File format in compressed package: executable file
Attachment source: Internet
Running platform: Windows platform
Whether it has been verified by me: Yes
Nature of accessories: Free
Detailed description: Jusheng network management 2.1 Standard Version breaks through the 20 user limit
1. run & quot; Jusheng network management 2.1 standard version is free of 20 user restrictions & quot; Modifier.
2. run Jusheng network management 2.1 (program cracked according to law)
3. manually select the client to be controlled, which can control n machines, instead of the poor 20 after online cracking
instructions:
Cracking steps:
Step 1: adjust the time until the program expires, and then run it once;
Step 2: use this patch to repair;
Step 3: run the Jusheng network management 2.1 program to prompt for registration. You can enter a registration code and restart it.
Jusheng network management -netsense2.10 system introduction
1、 Product advantages
Brand: from the earliest version of P2P over to the present, Jusheng technology has experienced three years of tests from products, technologies, services to the market. P2P over not only has the most resounding name in the domestic P2P traffic management software market, but also is one of the most powerful products.
Growth: over the past three years, we have continuously collected feedback from users, and continuously developed new functional modules according to their international needs, resulting in rapid product growth.
Product line: Jusheng network management product line includes solutions for small and medium-sized enterprises, group companies, government agencies and other industries. We will strive to develop and configure the most appropriate network monitoring solutions according to the actual needs of various enterprises and institutions: module selection and precise customization are one of our company's basic product ideas.
2、 Technical advantages
1. No client software is required. You can control the whole LAN by installing it on a single computer.
2. The only domestic monitoring software without any requirements for the network environment is installed on any machine in the LAN.
3. It is the only one in China that can directly block BT data messages at the network application layer, so that the management can completely block all BT downloads with a single click of the mouse.
4. The only network monitoring software in China that can intelligently inhibit BT downloading.
5. The only monitoring software in China that can control the flow rate of any host in the LAN in real time, rather than just controlling the host flow.
6. The only monitoring software in China that allows LAN hosts to use the mailbox of any portal website, but prohibits clicking on other links of the website (provided in the official version).
7. The only monitoring software in China that can accurately control the website.
8. The only monitoring software in China that can screen websites of any industry category
9. The most strict management software for any chat tool in China
10. The software with the strictest control over any online games and other online activities in China
11. The only monitoring software in China that can detect the three most serious tool attacks on LAN, such as LAN terminator, network law enforcement officer and network Scissorhands.
12. The simplest network monitoring software in China.
3、 Functional advantages
1. download control: the system can completely prohibit various P2P downloads, such as BT, eMule (electric donkey), Xunlei, etc; You can also prohibit any HTTP download or FTP download
2. bandwidth management: the system can view and control the bandwidth of any host in the LAN and analyze the host messages.
3. chat management: the system can control QQ, MSN, Netease bubble, Sina UC and other mainstream chat tools, as well as any other chat tools.
4. website access management: it supports full control over the WWW, black and white list control, and control over the LAN host acting as a proxy server.
5. portal website mailbox license function.
It is the only monitoring software in China that allows LAN hosts to use the mailbox of any portal website, but it is forbidden to click other links of the website.
6. setting of system control time
The system supports the administrator to set monitoring time for all monitoring items, so that the administrator can distinguish the control of working time and non working time.
7. group policy settings
The system administrator can set different permissions for different hosts in the LAN, which is convenient for the administrator to manage by groups and permissions.
8. customize ACL rules
The system provides network management personnel with user-defined control interface ACL rule settings. Through ACL rules, you can set rules including IP source address, IP destination address, protocol number (tcp/udp), port range and other parameters. The system will automatically intercept data packets that meet the rules. By using ACL rules, you can easily realize the flexible expansion of control functions. With the help of ACL rules, you can shield any online games.
9. LAN security management
IP-MAC binding: the system supports IP-MAC binding to LAN hosts. Once illegal hosts are found, they can be isolated from the network
Detection of LAN attack tools: the system can detect attacks by LAN terminators, network law enforcement officers and network Scissorhands
Disconnect the public network connection of the host: the system can disconnect the public network connection of the specified host
10. network traffic statistics
Real time flow rate statistics: the system can display the flow rates of all hosts in the LAN in real time (including tables and histograms)
Flow rate statistics in a certain period: the system can display the flow rate statistics (including tables and histograms) of all hosts in the LAN for a certain period of time
Daily traffic statistics: the system provides daily traffic summary and statistics functions for all hosts (including uplink, downlink and total)
Monthly traffic statistics: the system provides monthly traffic summary and statistics functions for all hosts (including uplink, downlink and total)
11. detailed log records
The system records in detail all control information, all www access websites, all flow information and all flow rate information. Users can browse by themselves.
This document contains the following attachments:
NetSense. exeCRAKED. Exe Jusheng network management -netsense2.10 Jusheng network management Jusheng network management Jusheng Network Management)

[下载]23541509564.rar




上一篇:发一套最全的信息监理师试题。(绝对精华)
下一篇:routeros电信+网通双线策略过程