Skip to main content


View Detailed Info Of All Devices On Your Network


Whether at home or In a work environment, If you're running a network of devices and/or workstations, It's very Important to know the details of each and every connection. To do this, you'd need a tool that will automatically scan your local area network for IP-based devices, and return the results thereafter. In this tutorial, I will Introduce you to a tool that allows you to view detailed Information of every device on your network.


Depending on your environment and overall usability, there are many reasons why you should be kept up-to-date with what's going on within your local area network. Perhaps you wish to Implement MAC address filtering, or (If you're running a wireless network) make sure that an attacker hasn't cracked your wireless encryption key and gained unauthorized access. Whatever the reason may be, having the Information at your disposal Is paramount.

As such, I will show you how to monitor your network, by using a neat little tool named Slitheris Network Discovery, that can be downloaded from the official website or via this reputable source. If you have 25 devices or less, It's totally free to use. For the purpose of this article, I will be demonstrating my wireless home network. So without further delay, let's get this tutorial started.

Step One:

Once you've downloaded Slitheris Network Discovery, It must be Installed on your system. Then execute the tool, and hit the Scan All IP Ranges button as shown below. It will now begin to scan for every connected device on your network.


Step Two:

When finished, It will display an array of Information. To begin with, all my Device Names and their associated IP addresses have been returned, with the first entry being my Router/Access Point. Let's click on that IP address and see the result.


Step Three:

As you can see, It's redirected to my Microsoft Edge browser and prompting to authenticate via a username & password. Obviously I've changed It from It's default state, such as admin:admin, hence only I have access to my Router's gateway.


Step Four:

I've now scrolled a little further, and the operating systems of every computer has been Identified. The Linux entry Is my Router.


Step Five:

If I want to Implement MAC address filtering, by only allowing authorized devices that're connected to my network, the Information for every computer Is readily available as outlined In red.


Step Six:

And here's the Brand of every device. This comes In handy If I want to update the firmware, or perhaps replace the device with the same manufacturer.


Final Thoughts:

Unlike many other tools of similar nature, the good thing about Slitheris Network Discovery, Is that It's very user-friendly thus can be used by all types of computational users. It's also very light on system resources, and performs It's task In a very efficient and effective manner. Be sure to give It a try, you will not be disappointed.



Comments

Popular posts from this blog

How To Decode The Windows 10 Product Key

Every Windows 10 operating system that's Installed and activated on the computer, has what's called a Product Key, that Is either pre-Installed by the manufacturer, or added by the end user when formatting their PC. In order to have a fully-functional OS, It must contain a valid Product Key. Whilst there are many tools that can extract It from the operating system, In this tutorial, I will show you how to manually decode the Product Key.

How To Rename Any Power Plan In Windows 10

In terms of managing and controlling the way your computer utilizes power during It's computing operations, Windows has built-In power plans, that are basically a collection of hardware and system settings. By default, there are three In total, namely Balanced, Power Saver and High Performance. Whilst you can change the plan Itself, there's no option to do the same with It's name, hence In this tutorial, I will show you how to rename any power plan In Windows 10.

How To Create A Fake File Of Any File Size

Depending on your business environment or Individual requirements, sometimes there Is the need to test files of a given capacity. Such tests can Include Identifying how well your hard disks perform under heavy read/write operations, or to establish whether files can be securely deleted beyond recovery. Whatever the reason may be, In this tutorial, I will show you how to create a fake file of any file size.