The Best Snapchat Privacy Tips

Snapchat is hugely popular. Its prevalence means that if you’re not careful, you’re bound to get Snaps from random people, invites from folks you don’t know, chat requests, users spamming you to increase their Snapchat score, and maybe even the occasional call.

That is, unless you protect your privacy on Snapchat. There are several settings you can enable or disable to lock down your Snapchat and effectively prevent all the above. You just need to know where in your settings to look.

Beyond Snapchat’s settings are general privacy reminders that you should adhere to, like knowing how to use Snapchat so that you don’t accidentally send the wrong person a private Snapchat or post something to your Story that you intended to send to an individual.

Also, be sure to check out our guide to better privacy on Facebook, which is just as important as Snapchat privacy.

Change Snapchat Settings

There are several privacy-related
settings you should adjust to your preference and comfort level.
They’re super easy to access and can be turned on or off at any
time if you decide to change your mind about them later.

To change your Snapchat settings, open
the app and tap your profile image at the top left. Then, use the
settings/gear button on the top right to list all the Snapchat
settings you can tweak.

Protect Your Basic Details

Your full name and birthday might be listed in your settings, and if they are, anyone who can see you on Snapchat can see it too.

While these tiny facts about you might not seem like a security risk right off the bat, knowing the date you were born and your last name makes it rather easy for someone to research you online and dig up even more information about you, such as your hometown, address, workplace, etc.

You can remove your last name (or even
your entire name) so that new Snapchat friends only know you by your
first name. Tap Display Name in the settings to make this
change.

In the Birthday section, there is an option to disable Birthday Party so that on your birthday, Snapchat won’t put a cake next to your name, thus preventing users from knowing that information.

Something else that’s considered fundamental to your identity on Snapchat is your username. Anyone who knows your username can add you as a friend, and the same goes for your Snapcode.

Do not share these items with anyone unless you want them to add you as a friend. If this information goes public, you’re bound to get lots of messages.

Suppress Notifications From Prying
Eyes

Notifications will appear on the lock
screen of your device and pop up as alerts unless you edit their
behavior. You’ll want to make this change if you don’t want just
anyone who looks at your phone to see who is sending you Snaps.

Open Notifications from the settings to see all the options. To disable all Snapchat notifications, simply remove the box next to Enable Notifications.

If you want finer control over what Snapchat notifies you about, you can edit the other alert settings, such as for when someone tags you in a Snap, if you have yet to open a message from someone, when you get a Snapchat call, etc.

Another way to manage Snapchat
notifications is on a per-friend basis. Tap-and-hold on the friend
and go to More > Message Notifications. You can
silence just that one person’s Snaps without affecting your other
friends’ settings.

Make It Harder for People to Contact
You

Most Snapchat users probably welcome strangers – there are conversations to be made, new friends to be had, and lots of time to waste sending random pictures to random people. If this isn’t why you use Snapchat, it’s best you take note of all of the different ways people can locate you on Snapchat so that you can block those access points.

Open the Mobile Number and Email settings and disable the Let others find me option in both areas so that random Snapchatters (or even friends) can’t find you by searching for your number or email.

Scroll down to Contact Me and change it to My Friends so that you don’t get Snaps from people you don’t know.

The other option includes literally everyone, meaning that if someone has your username or Snapcode, they can send you images and video, start chats, and even call you directly without your approval.

Tap Show Me in Quick Add and remove the box next to that option. When enabled, this feature lets friends of friends see that you’re using Snapchat, which is a massive privacy risk if you’re not interested in making new Snapchat friends.

Another big concern you should have about your privacy on Snapchat is revealing where you are. That’s right! Snapchat is also a location tracker app, but only if you let it.

Tap My Location and either enable Ghost Mode or choose specific friends that should have access to your physical location.

If there’s a pesky user that keeps
adding you on Snapchat, then none of the above will really help. To
stop him or her from harassing you, just block them. To do that, tap
their face and use the three-dotted menu on the upper-right side of
the screen to Block and/or Report them.

Clear Local Data

Snapchat can retain your search history
and chat details long after you performed them. If you share your
phone with others or you’re afraid someone will find these details
if they use your device, it’s important to know how to clean up
these privacy holes.

Let’s start with conversations. Depending on how each friend is set up in your Snapchat, chats between you might remain up to 24 hours after viewing them. You can manually delete these chats as well as adjust the viewing period to something much shorter.

Hold your finger down on the user in
question and go to More > Clear Conversation History
to erase past messages. To make new messages disappear from your
Snapchat after you’ve viewed them, go back into the More
menu but then choose Delete Chats > After Viewing.

Your search history is also viewable
forever unless you remove those items, too. Open the settings and
select Clear Search History to delete that list.

Protect Who Sees Your Snaps

One of the worst feelings is sending a
goofy picture to someone you never intended to share it with. Below
are directions for how to properly add more than one person to a Snap
and how to protect your Snapchat stories from specific users.

Review Recipients Before Sending

After composing a new Snap, it’s time
to tap the arrow and choose which friends to add as recipients. You
can search for friends using the search bar or scroll and tap the
people that should receive the Snap.

Before going any further, especially if
you’ve added lots of people to it, take a quick breather and review
who will get the Snap. To do that, tap the names at the bottom
of the screen (not the blue arrow).

When you select the names, you’re
given a clean list of all the friends who will receive your Snap.
From there, you can tap any friend to remove them from the list. Just
remember that once you tap that second blue arrow, the message will
send, and you can’t reverse it!

Restrict Who Can See Your Stories

A Story is like a public Snap to all
your friends. It’s a great way to advertise how you’re feeling,
what you’re up to, new products you’re selling, etc. If you want
only certain friends to be able to see your Snapchat Stories, you
need to learn how to make private Stories.

In the settings, under View My
Story
, is an option to restrict who can see your Snapchat
Stories. Pick Friends Only or Custom to choose specific
friends.

Another way to share Stories with
specific people only is during the Snap itself. Instead of choosing
friends to share it with, tap Private Story at the top of the
page and then select some people to share it with. Friends not
selected will not see the Story.

Can Pacemakers (and Other Medical Devices) Really Be Hacked?

A pacemaker sitting on an electrocardiograph.
Swapan Photography/Shutterstock

From pacemakers to smartwatches, we’re increasingly becoming a cybernetic species. That’s why recent headlines about vulnerabilities in implanted medical devices might set off alarm bells. Can your grandfather’s pacemaker really be hacked and, if so, what’s the real-world risk?

It’s a timely question. Yes, there are significant changes in medical technology afoot—implantable devices can now communicate wirelessly, and the coming medical Internet of Things (IoT) is bringing with it various wearable devices to keep healthcare providers and patients more connected. But a major medical device manufacturer has made headlines with not one, but two critical security vulnerabilities.

Vulnerabilities Highlight Hacking Risks

This past March, the Department of Homeland Security warned that hackers could wirelessly access implanted pacemakers made by Medtronic. Then, just three months later, Medtronic voluntarily recalled some of its insulin pumps for similar reasons.

On the surface, this is terrifying, but it might not be quite as bad as it sounds. Hackers can’t access implanted pacemakers from some remote terminal hundreds of miles away or conduct broad-scale attacks. To hack one of these pacemakers, the attack has to be conducted in close physical proximity to the victim (within Bluetooth range), and only when the device connects to the Internet to send and receive data.

While unlikely, the risk is real. Medtronic designed the device’s communication protocol so that it doesn’t require any authentication, nor is the data encrypted. So, anyone sufficiently motivated could change the data in the implant, potentially modifying its behavior in a dangerous or even fatal way.

Like the pacemakers, the recalled insulin pumps are wirelessly enabled to connect to related equipment, like a metering device, that determines how much insulin gets pumped. This family of insulin pumps also don’t have built-in security, so the company is replacing them with a more cyber-aware model.

The Industry Is Playing Catch-Up

X-ray showing an implanted pacemaker.
ChooChin/Shutterstock

At first glance, it might appear Medtronic is the poster child for clueless and dangerous security (the company didn’t respond to our request for comment on this story), but it’s far from alone.

“The state of cybersecurity in medical devices is poor, overall,” said Ted Shorter, Chief Technology Officer at IoT security firm Keyfactor.

Alaap Shah, a lawyer who specializes in privacy, cybersecurity, and regulation in health care at Epstein Becker Green, explains: “Manufacturers have not historically developed products with security in mind.”

Read the remaining 22 paragraphs

The 10 Best Local Co-op Games for Nintendo Switch

The Switch is a perfect platform for local co-op multiplayer games.
Nintendo

The Switch’s dock and KitKat controllers make it perfect for multiplayer games. But if you’re looking for something without intense competition, a cooperative local multiplayer game is what you need. Here are the best ones on the console.

Kirby Star Allies

Nintendo’s pink puffball tends to fly under the radar of bigger franchises like Mario and Zelda, but Kirby games have been dependably delivering co-op platforming for a long time. Star Allies is all about making friends, throwing “hearts” around and recruiting classic Kirby bad guys to help you out. Up to four players can go at it in local cooperative multiplayer. Secondary players can combine their friend abilities with Kirby’s gobble-em-up powers for combination super attacks.

Cuphead

Cuphead has become an instant classic among fans of indie 2D games. It’s sort of the opposite of Kirby: an insanely difficult platforming game with an art style inspired by some disturbing 1930s cartoons. The game is absolutely beautiful in motion, but don’t get distracted, because the brutal enemies and screen-filling bosses will wipe you out in seconds. Thankfully, Cuphead is built from the ground up for two-player co-op, so you can tackle the challenge together.

Fire Emblem Warriors

Fire Emblem Warriors is a mash-up of Nintendo’s strategy-slash-dating sim fantasy games with Koei’s Dynasty Warriors series, giving the feudal characters massive battlefields filled with thousands of enemies to hack and slash in real-time. Ridiculous melee and magic attacks fill the screen as you take down dozens of enemies at once, carving your way through the map for strategic objectives. Two local players can tackle the battlefield in split-screen mode.

Death Road to Canada

What happens when you mix top-down combat with a long Oregon Trail-style resource management game, then sprinkle in zombies? Death Road to Canada, that’s what. This unique pixelated title has you controlling survivors of a zombie apocalypse as they get the hell out of Dodge, collecting new party members and facing massive zombie hoards. The co-op setup offers up to four local players, but one stays “in control” of the group, so it’s a good game if you’re looking to play with a child without surrendering to too much chaos.

Mario Tennis Aces

Read the remaining 14 paragraphs

Update Your Logitech Wireless Dongle Right Now

Logitech’s Unifying Receiver (wireless dongle) is vulnerable to some newly discovered vulnerabilities, updating the firmware will patch the flaws.

If you use a Logitech Unifying Receiver (also knows as the wireless dongle) download and install the latest firmware update to protect against vulnerabilities. Unless you’ve updated the firmware, the Logitech Unifying Receiver is still vulnerable to an issue discovered in 2016 as well as some newly discovered vulnerabilities.

Logitech didn’t recall the Unifying Receiver back in 2016 when the hack called “Mousejack” appeared. Many of the Unifying Receivers were still on the market, though Logitech started releasing updated dongles sold with mice, keyboard and stand alone receivers. Not long after the discovery, Logitech issued a firmware update but it wasn’t widely known and the firmware isn’t all that easy to find on the site. If you didn’t update the firmware then (and most of us didn’t know about it) now is a good time to get the update as new vulnerabilities have been discovered.

Logitech isn’t the only company that’s been affected; any device that uses the same Nordic and Texas Instruments chips and firmware for wireless receivers are impacted, including devices from Microsoft, Dell, HP, and Lenovo. If you use a wireless device from one of those companies, you might want to check if the firmware can be updated. Logitech lets you update the firmware on the wireless dongle.

NetCrunch by AdRem Software – REVIEW 2019

When it comes to monitoring networks, it seems like there are simply too many options to choose from. And while every vendor states that his product is better than its competitor’s for this and that reason, in the end, they are pretty much all the same. They all are different but the differences are usually in the minute details with most products essentially providing the same basic functionality.

The latest version of NetCrunch by AdRem Software is yet another network monitoring system. It has, however, some very interesting features and uncommon flexibility that set it apart from competing products. Keep reading to know more about this product, its features and what actually sets it apart from the rest of the crowd.

NetCrunch Nodes view

We’ll start off by having a look at what is required—or rather, expected—from a typical network monitoring tool. It will help us better understand how NetCrunch by AdRem Software can benefit you. We’ll then give you a quick introduction to the product, highlighting its best features. Our next order of business will be to discuss the product’s installation and initial setup, followed by a deeper look at the various types of monitoring that it offers. The software’s user interface and its alerting subsystem will then be discussed before we introduce its licensing and pricing structure.

About Monitoring Tools

We often compare network traffic to road traffic. This is actually a very good analogy and cars on a highway can be likened to packets on a network. But when it comes to monitoring, the analogy is not so great anymore. Whereas you can see highway traffic and easily spot when and if a problem happens somewhere, things are different on a network. Everything happens within cables or invisible radio carriers. In order to “see” network traffic, you need some special tool. This is where the network monitoring tool comes in handy.

At its base, a network monitoring tool will measure network traffic at various points on a network. To stick with the highway analogy, monitoring tools are the highway equivalent of these counting tubes you sometimes see stretched across a road. The latter counts passing cars while the former counts passing bits. Actually, monitoring tools don’t really count bits. It is the monitored devices that do the actual counting. Typical monitoring tools merely read the counters, compile the information and present it in a useful and meaningful way.

A tool like NetCrunch does way more than that, though. As we’re about to discover, there can be much more to network monitoring than simply reading traffic counters. Systems such as NetCrunch provide several types of monitoring and they allow you to keep a watchful eye on several important operational metrics of your network and the systems it comprises.

NetCrunch In A Nutshell

First and foremost, NetCrunch is a network monitoring system. It has, however, several features that set it apart from its competitors. AdRem Software claims it can monitor as many as a million metrics. This effectively means that the product scales up very well and will suit huge networks just as well as it will suit smaller ones. For optimal performance, the platform makes use of three databases. There’s a proprietary NoSQL database to store network performance metric history. There’s also an in-memory database which is used to store real-time statuses for quicker access, and there’s an embedded SQL database for storing alerts.

NetCrunch makes use of predefined monitoring packs which work by grouping common sets of performance monitors and alert conditions. In all, there are hundreds of these. They cover most types and brands of equipment. In addition to switches and routers from most major vendors, it will also monitor security devices from Cisco, Fortinet, Juniper and SonicWALL as well as NAS appliances from Buffalo, Netgear, Qnap and Synology. And if you need to monitor servers, there are even packs for Dell EMC iDRAC, Fujitsu iRMC, HP iLO and Lenovo IMM remote management controllers.

Customizability and flexibility are possibly the most unique characteristics of NetCrunch. Pretty much everything within the product can be customized. You can create live maps where you add widgets to show live data or status information. And with the console supporting multiple monitors, you’re not really limited in the size of your maps or the number widgets you add to them. Notification is another area that allows a lot of customization. The platform supports user profiles and groups and can even be integrated with Active Directory.

Installation And Discovery

The first step in using NetCrunch is installing it and setting it up and this is truly where the pleasure of using the product begins. The hardware requirements are relatively low. It will install on any 64 bit Windows server with at least two cores and 3.5 GB of RAM. The installation itself is easy and quick. When I say quick, I mean quick, really quick. We installed it on a Windows server, ran the discovery wizard and had a complete readout of our test network in about fifteen minutes. Granted our test network does not have thousands of components but it was still impressively fast. Furthermore, device identification was spot-on. The tool correctly identified all devices and systems including network devices, Windows servers and workstations, virtualization hosts, and even vintage Macintosh devices. And once the discovery was complete, monitoring started right away and alerted us that one system was running low on memory.

A Look At NetCrunch’s Monitoring Features

We’ve briefly touched the vast array of what can be monitored with NetCrunch. Let’s now have a more in-depth look at the various types of monitoring that are available and explain how each one works and what it can do for you. If you’re anything like me, you’ll be impressed at all that’s available.

SNMP Monitoring

SNMP stands for Simple Network Management Protocol. It is the most basic type of monitoring. The one that pretty much all monitoring tools use. One of the biggest advantages of using SNMP is that the client part or agent is built into most network-attached devices. All enterprise-class switches and routers—and even many home devices—support the protocol. Monitoring tools use it to read operational metrics from the devices they monitor as well as their interface counters. The use the data from these counters—which just count bytes in and out—to extrapolate the average bandwidth utilization of each interface.

NetCrunch has built-in support for all SNMP versions as well as support for SNMP version 3 traps. It can use SNMP to monitor routers, switches, printers, firewalls, sensors, and most SNMP-enabled devices. Using SNMP will let you monitor various metrics such as user activity, hardware utilization, network bandwidth, and more. The platform can use SNMP actively by reading performance counters, or passively by receiving SNMP Traps from networked devices. Thresholds can be set to notify administrators of potential issues.

Switch And Router Monitoring

When monitoring switches and routers, NetCrunch can monitor several aspects of their health, including the status of device interfaces and per-interface bandwidth usage. The tool will also display information about each switch port including VLANs, port status, and devices connected to each port. It will also discover and map physical layer 2 connections between switches and nodes and built topology maps. These physical maps can be automatically updated when new nodes are added or when connection changes are discovered. And if your network is made of Cisco devices, NetCrunch will also let you monitor Cisco IP SLA performance and operational parameters. This would, among others, enable you to monitor VOIP jitter.

Server And Operating System Monitoring

NetCrunch is not just a network device monitoring platform. It will also monitor your servers. Both physical and virtual servers are supported and, for virtual servers, their hosts’ operational metrics can also be monitored.

For Windows servers, there is not much that NetCrunch won’t monitor. It can monitor all performance counters, including, for example, disk counters. The actual list of what can be monitored largely depends on the specific system and its installed applications. You can, of course, set alert thresholds on performance counters using eight different types of trigger. The tool will also monitor Windows services and alert you if a required service stops running. Furthermore, NetCrunch can monitor applications running on servers. It can even monitor files and folders, potentially alerting you of a missing file or, if you prefer, of an unplanned change to any given file.

 

NetCrunch Server monitoring

But not all servers are running Windows. If your environment includes other operating systems, you’re covered just as well. On Linux, for instance, NetCrunch will track more than 100 performance counters to determine the health of servers running kernel 2.4 or newer. Administrators managing BSD, Solaris or Mac OS servers are covered as well with operating system-specific monitoring packs.

Another strength of NetCrunch is its monitoring of VMware ESX. The platform supports ESXi version 5.5, 6 and 6.5 and connects directly to the ESX servers, without the need for vSphere to be installed. It comes with pre-configured Automatic Monitoring Packs that make monitoring virtual hosts a breeze. The monitoring packs will allow you to easily monitor the hardware, the ESX software as well as the guest virtual machines running on your hosts.

Application Monitoring

Although not an application monitoring platform, NetCrunch comes bundled with a ton of application-specific monitoring packs. One such pack, for example, will monitor most virus protection packages and ensure they are running in good order. Other packs are available to monitor most server-based Microsoft applications. You have, for example, packs for Exchange, IIS, ISA, MS Project, MS SQL, and SharePoint.

The software will also monitor major applications from various third-party vendors. For example, monitoring packs are available for ARCserve, Avaya Modular Messaging Server, Blackberry Enterprise Service, CiscoWorks, Citrix Xen App server, Lotus Domino server, Oracle and Squid, just to name a few.

Traffic Monitoring

NetCrunch supports flow analysis for traffic monitoring. Flow analysis is a type of monitoring which relies on the monitored network devices to capture data about the various data flows they transport and send the, to an external analyzer and collector. It includes a NetFlow collection and analysis module which is able to process flow data from a range of network devices using all popular flow analysis protocols such as NetFlow (v5 and v9), IPFix, sFlow, JFlow, netStream, cFlow, AppFlow, and rFlow.

NetCrunch Flow dashboard

NetCrunch integrates flow data within its monitoring database, ensuring that traffic is measured properly per device instead of per IP address, letting you analyze traffic using various criteria. Furthermore, it also allows you to create custom application definitions and it supports Cisco NBAR technology for application monitoring. NetCrunch collects performance trends on summary traffic data as well as specific node data, letting you create reports or set alerting thresholds on these parameters.

Remote Probes

One of the newest features of NetCruch is the possibility to use remote probes. Remote probes can be installed in external locations to extend the monitoring capabilities of the platform. They can be thought of as satellite instances of the product under centralized control. This is a brand-new feature of version 10.6 and it permits the monitoring of remote resources using any of the available sensors including not only SNMP but also WMI, SQL and several more. And to make things even better, remote probes also support network discovery.

NetCrunch remote probes are perfect for remote locations where no network administration staff is present. Alerts can be set on the remote probe node and a notification can be issued if and when the probe connection goes down. So, not only will it monitor remote locations, but it will also notify you if it ever stops working for whatever reason. Talk about robustness.

Log Monitoring

Log collecting monitoring systems are rarely built into monitoring tools. This is different with NetCrunch which includes that functionality. The tool offers many predefined event log views and it lets you create custom ones using an intuitive query builder. The created views can then be saved and used for any node group. And for each event in the event log, this product offers a details view containing all alert details and parameters. For instance, if an alert was triggered on a performance counter value, the tool will display a chart showing metric values at the time of the alert.

The NetCrunch file sensor is used to monitor text log files which it can fetch through FTP/s or HTTP/s, Windows/SMB and SSH/Bash. This sensor can even process logs remotely without having to download them. The product come built-in with parsers for common log formats and it allows you to write own parsing expressions using various methods such as regexp, Javascript, for example.

Wait! There More!

So far, we’ve covered a lot of what NetCrunch can monitor but, even if we’re going to look like an infomercial, there’s way more than what we’ve mentioned. In fact, there is so much monitoring power packed into this tool that it’s simply impossible to cover it all in detail.

For instance, NetCrunch can be used to monitor Apache web servers. Its Apache sensor will let you monitor various performance metrics. There’s also an advanced web page sensor which can load and render dynamic web pages containing Javascript as if a browser loaded them. It even allows you to check pages requiring a login while supporting both standard HTML or custom login forms.

For even greater flexibility, NetCrunch can read data using multiple protocols such as FTP/S, HTTP/S, SSH/Bash, SFTP, or Windows/SMB. It supports various formats including JSON and XML and also allows creating custom data parsers for specific data.

NetCrunch’s User Interface

It’s one thing to collect data but what good is it if you don’t make it available. The user interface is another place where NetCrunch really shines. The main element of the NetCrunch console is called the Atlas and it presents a highly customizable, colour-coded overview of all monitored devices. It lets you see at a glance which devices have issues or which ones are down and automatically presents you with views based on the content selected in the left pane. The “Smart Pages” functionality takes this to the next level. The Atlas and the console offer full search facilities, making it easy to find a device of interest.

NetCrunch Network Atlas

To make things even more interesting, custom pages can be easily created and selecting a network segment in the left pane will bring up a Layer 2 map with real-time views of network traffic passing between each node. This is one of the monitoring tools that makes the best use of the visual presentation.

Alerting in NetCrunch

OK, now we have a tool that can monitor just about anything computer-related. We also have a tool that can display various monitored parameters in highly customizable ways. There’s only one problem left. You probably don’t want to have someone sit at the tool’s console twenty-four hours a day just in case it detects something odd worth closer inspection. This is where alerting comes in. Most monitoring tools do include some form of alerting but NetCrunch brings it one step—or should I say one leap—further. It has one of the most flexible and configurable alerting systems.

NetCrunch supports both internal and external alerts. Internal ones are triggered whenever a monitored parameter reaches or exceeds a given threshold. As for external alerts, they are received from external sources such as SNMP traps, syslog or Windows events. The tool even supports conditional alerting that can, for example, only notify you when a combination of alerts is raised or when an alert has been raised a certain number of times within a time frame. Several more conditions are available making this a very flexible tool.

NetCrunch Pending Alerts

Alerts in NetCrunch trigger actions. As a response to an alert, this tool can execute a sequence of actions. You can choose between a number of actions such as notification, logging, control actions and remote script execution. Notifications can be controlled by user profiles and groups, and they can be combined with a node group membership, making it possible to send notifications to different groups based on network node location or some other relationship.

Actions in NetCrunch can be executed immediately or after a specified delay. For example, you could configure the tool to send a notification to some person and then, after some time, execute a server restart operation. Alternatively, you could opt to send the next notification to a different person. This all makes for one of the most flexible systems.

Licensing And Pricing

NetCrunch is available in several flavours with increasing functionality. The most basic level is the NetCrunch for SNMP Devices. It includes SNMP monitoring with SNMPv3 support, SNMP traps, a MIB compiler, and the monitoring more than 70 network services. It full-featured and has dashboards, graphical maps, and event database.

The next level is NetCrunch for Network Infrastructure. It is also primarily based on SNMP monitoring and it contains all the SNMP features and adds layer 2 mapping and monitoring, VLAN support and flow analysis with Cisco NBAR2 support.

Next up is NetCrunch Performance Monitor, a comprehensive package for monitoring anything on your network. It supports SNMP devices, logs, servers, operating system, VMware, WMI, IPMI, Web, Cloud, and other applications.

At the top is the NetCrunch Monitoring Suite. This is a complete all-in-one package with all advanced features necessary for managing a high number of monitored elements. It is the most scalable NetCrunch option with the ability to manage thousands of nodes and metrics.

NetCrunch is licensed per-node or per-interface, depending on which of the two numbers is greater, and all purchases come with 1 Year upgrade subscription, maintenance, and support. Prices are not readily available but can easily be obtained from AdRem Software by requesting a quote. If you want to give the tool a try before purchasing it, a 30-day trial version can be downloaded from AdRem’s website.

Final Words

What more can be said about NetCrunch by AdRem Software? We’re dealing with one of the most complete all-in-one monitoring solutions you can find. It will support most—if not all—your networked devices and provide you with the peace of mind of knowing that no event or issue will go unnoticed. A large number of customization options can make setting up the tool a bit more involved than some other competing tools but this is highly compensated by the uncommon flexibility built right into the platform.

Read NetCrunch by AdRem Software – REVIEW 2019 by Renaud Larue-Langlois on AddictiveTips – Tech tips to make you smarter