TrafficEmulator 1.8.3 freeware

... fast program which can simulate client activity. The tool is designed with a user-friendly interface and is easy to use. ...

Author Nsasoft US LLC
Released 2014-05-19
Filesize 484 kB
Downloads 2396
OS Win2000, Windows 7 x32, Windows 7 x64, Windows Vista, Windows Vista x64, Windows XP
Installation Install and Uninstall
Keywords traffic generator, routers, firewalls, stress test, network tool, network software, network utils, network security, computer security, enterprise security, information security, internet scanner, internet security, network attack, security software, freeware
Users' rating
(24 rating)
TrafficEmulatorOtherWin2000, Windows 7 x32, Windows 7 x64, Windows Vista, Windows Vista x64, Windows XP
Our rating 5 freeware award
TrafficEmulator - internet security tool Freeware Download Notice

TrafficEmulator Free Download - we do not host any TrafficEmulator torrent files or links of TrafficEmulator on rapidshare.com, depositfiles.com, megaupload.com etc. All TrafficEmulator download links are direct TrafficEmulator download from publisher site or their selected mirrors.

TrafficEmulator freeware - The Latest User Reviews
TrafficEmulator freeware - The Latest Versions History
1.8.3 May 19, 2014 Major Update Updated network traffic generator
1.8.2 Apr 10, 2014 Major Update Updated network traffic generator
1.8.1 Feb 15, 2014 Major Update Updated network traffic generator

Most popular Other freeware downloads

Nmap for Linux

7.95 freeware download

... open source (license) utility for network exploration or security auditing. Many systems and network administrators also find ... (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), and a utility for comparing scan results ...

TACACS.net

2.1.2 freeware download

... TACACS+ simplifies network administration and increases network security. It does this by centralizing management of users ... TACACS+ is recommended for compliance with most network security standards for E-Commerce, Health Care, Finance, and Government ...

I2P

2.8.2 freeware download

**I2P: The Invisible Internet Project - A Comprehensive Review** The Invisible Internet Project, commonly known as I2P, is a robust ... to each other securely and anonymously. Unlike traditional internet protocols, I2P is built to operate within its ...

TCP Optimizer

4.1.1 freeware download

Optimizing your Internet connection takes time and requires a certain set ... sure to get a boost in performance and security, as your connection, by default, does not operate ...

NetSpot WiFi Analyzer

3.1.2 freeware download

NetSpot 3 delivers powerful WiFi site surveys with internet speed, ping tests and device discovery to iPhone ... latency. High latency may indicate slow or laggy internet, which affects gaming or video calls quality. NetSpot ...

TrafficEmulator

1.8.3 freeware download

... fast program which can simulate client activity. The tool is designed with a user-friendly interface and is easy to use. ...

5 freeware award

Nmap for Mac OS X

7.95 freeware download

... open source (license) utility for network exploration or security auditing. Many systems and network administrators also find ... (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), and a utility for comparing scan results ...

ImpressCMS

1.3.9 freeware download

... a community developed Content Management System. With this tool maintaining the content of a website becomes as ... writing a word document. ImpressCMS is the ideal tool for a wide range of users: from business ...

BrowsingHistoryView

2.58 freeware download

... including popular ones like Google Chrome, Mozilla Firefox, Internet Explorer, Microsoft Edge, and Opera. It offers a ... activities across different platforms, making it an essential tool for both casual users and IT professionals. ...

NxFilter

4.7.3.1 freeware download

... filtering solution designed to provide comprehensive control over internet usage within a network. This software stands out ... allowing administrators to monitor usage patterns, identify potential security threats, and ensure compliance with organizational policies. These ...