NetLimiter

Last updated
NetLimiter
Developer(s) Locktime Software s.r.o.
Initial release2005
Stable release
5.1.7.0 / January 13, 2023;45 days ago (2023-01-13)
Operating system Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Available inEnglish, Afrikaans, Chinese (Simplified), Czech, French, German, Hindi, Indonesian, Japanese, Polish, Portuguese (Brazilian), Russian, Slovene, Spanish and Turkish
Type Traffic shaping firewall (computing)
License Shareware license
Website netlimiter.com

NetLimiter is a client-side traffic shaping, monitoring and firewall (computing) software for the Windows operating system. [1] Unlike most traffic-shaping utilities, which are based on centrally managed hardware, NetLimiter is a software-only solution. This has the advantage of being less expensive to deploy, but can result in being more difficult to manage its use across more than one computer.[ citation needed ]

Contents

While it has a significant market among more technically minded computer users, in medium-to-large networks it becomes difficult for administrators to maintain multiple copies of configuration files.[ citation needed ] It is, however, useful for simulating slow links between departments showing how the applications will work when deployed to slower sites.[ citation needed ]

It is often lumped together with other free or shareware in articles [2] that present the reader with 'essential' applications and poweruser-type utilities. [3]

Features and versions

The software is available in three versions: the freeware Monitor and two paid for versions, Lite and Pro. [4] Monitor provides real-time monitoring and statistics. Lite provides monitoring and limits, while the Pro version includes all Monitor and Lite features together with additional features including the ability to act as a firewall, remote administration via a webpage, and filtering.

The product has its own programming interface, allowing integration with other software. [5]

Version 1.3 of the software was criticized by cNet in 2009 as using too much memory (12 MB). [6]

Version 3 was released on August 31, 2010. [7]

Version 4.0.13 is a first NetLimiter 4 final release on August 5, 2015. [8]

Similar products

Related Research Articles

PHP-Nuke is a web-based automated news publishing and content management system based on PHP and MySQL originally written by Francisco Burzi. The system is controlled using a web-based user interface. PHP-Nuke was originally a fork of the Thatware news portal system by David Norman.

Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is often used to baseline application behavior, analyze network usage, troubleshoot network performance, ensure that data is in the correct format, check for malicious code, eavesdropping, and internet censorship, among other purposes. There are multiple headers for IP packets; network equipment only needs to use the first of these for normal operation, but use of the second header is normally considered to be shallow packet inspection despite this definition.

<span class="mw-page-title-main">Application firewall</span> Layer 7/application layer network security system

An application firewall is a form of firewall that controls input/output or system calls of an application or service. It operates by monitoring and blocking communications based on a configured policy, generally with predefined rule sets to choose from. The application firewall can control communications up to the application layer of the OSI model, which is the highest operating layer, and where it gets its name. The two primary categories of application firewalls are network-based and host-based.

Norton AntiVirus is an anti-virus or anti-malware software product founded by Peter Norton, developed and distributed by Gen Digital since 1990 as part of its Norton family of computer security products. It uses signatures and heuristics to identify viruses. Other features included in it are e-mail spam filtering and phishing protection.

Norton Internet Security, developed by Symantec Corporation, is a discontinued computer program that provides malware protection and removal during a subscription period. It uses signatures and heuristics to identify viruses. Other features include a personal firewall, email spam filtering, and phishing protection. With the release of the 2015 line in summer 2014, Symantec officially retired Norton Internet Security after 14 years as the chief Norton product. It was superseded by Norton Security, a rechristened adaptation of the Norton 360 security suite.

The following tables compare general and technical information for a number of File Transfer Protocol (FTP) clients. Unless otherwise specified in footnotes, comparisons are based on the stable versions without any add-ons, extensions, or external programs.

Take Command Console (TCC), formerly known as 4DOS for Windows NT (4NT), is a command-line interpreter by JP Software, designed as a substitute for the default command interpreter in Microsoft Windows, CMD.EXE.

Criticism of Windows XP deals with issues with security, performance and the presence of product activation errors that are specific to the Microsoft operating system Windows XP.

Axialis IconWorkshop is an icon editor developed by Axialis Software. IconWorkshop can create icons for Windows (.ico), Macintosh (.icns) and UNIX-like systems (.png). IconWorkshop includes a library of objects that can be put together to create many different styles of icons. The utility supports plugins and allows importing graphics directly from Photoshop and Illustrator.

Defensive computing is a form of practice for computer users to help reduce the risk of computing problems, by avoiding dangerous computing practices. The primary goal of this method of computing is to be able to anticipate and prepare for potentially problematic situations prior to their occurrence, despite any adverse conditions of a computer system or any mistakes made by other users. This can be achieved through adherence to a variety of general guidelines, as well as the practice of specific computing techniques.

<span class="mw-page-title-main">Pandora FMS</span> Software for monitoring computer networks

Pandora FMS is software for monitoring computer networks. Pandora FMS allows the visual monitoring of the status and performance of several parameters from different operating systems, servers, applications and hardware systems such as firewalls, proxies, databases, web servers or routers.

<span class="mw-page-title-main">Software remastering</span>

Software remastering is software development that recreates system software and applications while incorporating customizations, with the intent that it is copied and run elsewhere for "off-label" usage. The term comes from remastering in media production, where it is similarly distinguished from mere copying.

Opengear is a global computer network technology company headquartered in Edison, New Jersey, U.S., with R&D operations in Brisbane, Qld, Australia and production in Sandy, UT.

<span class="mw-page-title-main">Microsoft Security Essentials</span> Free antivirus product produced by Microsoft for the Windows operating system

Microsoft Security Essentials (MSE) is an antivirus software (AV) product that provides protection against different types of malicious software, such as computer viruses, spyware, rootkits, and Trojan horses. Prior to version 4.5, MSE ran on Windows XP, Windows Vista, and Windows 7, but not on Windows 8 and later versions, which have built-in AV components known as Windows Defender. MSE 4.5 and later versions do not run on Windows XP. The license agreement allows home users and small businesses to install and use the product free of charge. It replaces Windows Live OneCare, a discontinued commercial subscription-based AV service, and the free Windows Defender, which only protected users from spyware until Windows 8.

<span class="mw-page-title-main">Teechart</span>

TeeChart is a charting library for programmers, developed and managed by Steema Software of Girona, Catalonia, Spain. It is available as commercial and non-commercial software. TeeChart has been included in most Delphi and C++Builder products since 1997, and TeeChart Standard currently is part of Embarcadero RAD Studio 11 Alexandria. TeeChart Pro version is a commercial product that offers shareware releases for all of its formats, TeeChart. Lite for .NET is a free charting component for the Microsoft Visual Studio .NET community and TeeChart for PHP is an open-source library for PHP environments. The TeeChart Charting Library offers charts, maps and gauges in versions for Delphi VCL/FMX, ActiveX, C# for Microsoft Visual Studio .NET, Java and PHP. Full source code has always been available for all versions except the ActiveX version. TeeChart's user interface is translated into 38 languages.

LiveCode is a cross-platform rapid application development runtime system inspired by HyperCard. It features the LiveCode Script programming language which belongs to the family of xTalk scripting languages like HyperCard's HyperTalk.

Actian Zen is an ACID-compliant database management system (DBMS) developed by Pervasive Software. It is optimized for embedding in applications and used in several different types of packaged software applications offered by independent software vendors (ISVs) and original equipment manufacturers (OEMs). It is available for software as a service (SaaS) deployment due to a file-based architecture enabling partitioning of data for multitenancy needs.

<span class="mw-page-title-main">Web shell</span> Interface enabling remote access to a web server

A web shell is a shell-like interface that enables a web server to be remotely accessed, often for the purposes of cyberattacks. A web shell is unique in that a web browser is used to interact with it.

<span class="mw-page-title-main">Remote Utilities</span> Remote desktop software

Remote Utilities is a remote desktop software that allows a user to remotely control another computer through a proprietary protocol and see the remote computer's desktop, operate its keyboard and mouse.

References

  1. StreamingMedia review of NetLimiter 1.30 http://www.streamingmedia.com/article.asp?id=8608 Posted on April 28, 2004.
  2. "Techie Tools for the Internet and Home Network". PCWorld, http://www.pcworld.com/article/id,131449/article.html
  3. ComputerWorld Review related to NetLimiter 2.0 Monitor http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9058842&pageNumber=3 Posted on February 6, 2008.
  4. Feature List http://netlimiter.com/featurelist.php
  5. API usage examples http://netlimiter.com/devzone.php
  6. Cnet Download review - NetLimiter 1.3 http://www.download.com/NetLimiter/3000-12776_4-10227458.html?tag=dl.1 Posted on February 27, 2009.
  7. Official site, list of version 3 releases http://netlimiter.com/Download/products/netlimiter-3
  8. Official site, list of version 4 releases https://netlimiter.com/products/nl4