mHotspot 7.8.8.9 | Portable


mHotspot is a completely free software which converts your windows 7 & 8 laptop into a virtual wifi router and creates a secure wifi hotspot.You can share single internet connection(LAN, Ethernet, Data-Card, 3G/4G, Wifi) for multiple devices like Laptops, iPhones, Android phones, PDAs, iPads etc.No router or external hardware is required apart from your existing one.
Read further

NETGEAR Genie 2.4.62 | Portable


NETGEAR Genie makes getting the most out of your home network fun & easy. More than six million downloads of the genie App lets users easily monitor, connect & control their home network from a PC, Mac, tablet or smartphone. With NETGEAR Genie you can share & stream music or videos, diagnose & repair network issues, set up parental controls & more.
Read further

TamoSoft CommView 6.5 Build 764 | CommView for Wifi 7.1 Build 841


CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Loaded with many user-friendly features, CommView combines performance and flexibility with an ease of use unmatched in the industry.

CommView for WiFi is a powerful wireless network monitor and analyzer for 802.11 a/b/g/n/ac networks. Loaded with many user-friendly features, CommView for WiFi combines performance and flexibility with an ease of use unmatched in the industry.
Read further

SoftPerfect NetWorx 6.2.8 | Portable | RePack by KpoJluk


RePack by KpoJluk — Multilanguage registered version!


NetWorx is a simple and free, yet powerful tool that helps you objectively evaluate your bandwidth situation. You can use it to collect bandwidth usage data and measure the speed of your Internet or any other network connection. NetWorx can help you identify possible sources of network problems, ensure that you do not exceed the bandwidth limits specified by your ISP, or track down suspicious network activity characteristic of Trojan horses and hacker attacks.
Read further