I. What’s New

 

3/31/2010  Version 2.86 adds the following functions:

(1)     Improving the capture of Yahoo Webmail.

(2)     Capturing AIM 7.1, QQ 2010, and MSN Plus for TupEnterprise.

 

1/1/2010  Version 2.85 adds the following functions:

(3)     Capturing Skype 4.1 and Yahoo Messenger 10 for TupEnterprise.

(4)     Tuning up Windows 7 compatibility.

 

8/21/2009  Version 2.82 fixes the Delphi bug.

 

5/21/2009  Version 2.79 adds the following functions:

(1)     Capturing AOL Web mail sent for TupSight/TupEnterprise.

(2)     Capturing AIM 6.8, Skype 4.0, and Yahoo Messenger 9.0 for TupEnterprise.

(3)     Decoding URL title for TupView.

(4)     MSI file for Workstation installation for better deployment capabilities.

 

3/18/2009  Version 2.75 adds the following functions:

(1)     Capturing Web mail sent such as hotmail and Yahoo mail for TupSight/TupEnterprise.

(2)     Capturing Windows Live Messenger 9.0, and Skype 3.5 and 3.6 for TupEnterprise.

(3)     Capable of blocking file transfer through MSN for TupEnterprise.

(4)     Managing remote resources for TupEnterprise.

(5)     Monitoring upload files for TupEnterprise.

(6)     Capable of blocking modification to local connection for TupEnterprise.

(7)     Capable of backing up files created for TupEnterprise.

(8)     Option for USB read only for TupEnterprise.

 

4/5/2008 Network TAP (Test Access Point) Compatibility

 

We have tested a TAP (NuTAP) kindly provided by Xtramus and herewith certify its complete compatibility with our products. TAPs are truly passive devices that have full access to all packets of full-duplex traffic (including errors from physical layers) in line and in real time. They cause no data stream interference, and the monitoring computer can be completely isolated from the outside. For a thorough discussion of the TAP advantages over SPAN and hubs, please see http://www.lovemytool.com/blog/2007/08/span-ports-or-t.html.

 

 

For more information about NuTAP, please directly contact sales@xtramus.com or us.  

 

2/1/2008 Version 2.63 redesigns the data structure to improve the searchability. As a result of the changes, the previously-captured data should be imported using a data update program when one upgrades the products. Here is the procedure for the update:

 

(1)   Download the newer version of TupSight/TupEnterprise from www.tupsoft.com.

(2)   Uninstall the existing TupSight/TupEnterprise programs (the server and the console) retaining the data folders and files.

(3)   Restart the computer.

(4)   Install the newer programs. If they are installed in the same directory as before, a data update program will auto-run.

(5)   Single-click the “Start” button for Ver. 2.3-2.4 OR Ver. 2.5-2.6 accordingly; For the data update of Versions 2.3-2.4, one needs to single-click the “Start” button again for Ver. 2.5-2.6, after the import is finished from Ver. 2.0-2.4 into Ver. 2.5-2.6.

(6)   Run the console, and click the “About” button from the main menu to see whether one needs to re-input the serial number.

(7)   After the registration, check whether all the settings are correct.

(8)   To upgrade the Agent program of TupEnterprise, click the “Host” button from the main menu and then the “Upgrade Agent,” select the upgrade file from the table, and single-click the “Start” button.

 

1/15/2008 Version 2.62 upgrades the AIM, Skype, and ICQ capture of TupEnterprise to their newest versions.

 

5/5/2007 Version 2.41-42 extends the operation spectrum by adding “Bridge Mode” and “Promiscuous Mode”

 

Though without the total controllability as in the Gateway mode, the newly-added two modes offer our users more operation freedom to adapt to the actual local area networks (LANs) and meet the task requirements without changing much of the existent networking structure.

 

A)    The Bridge Mode

 

This mode is also called “a machine-in–the-middle.” There is a bridging capability called the “Network Bridge” built into Windows XP and Server 2003. This is a feature of the Network Connections folder that allows a machine with two network interface cards (NICs) to act as a transparent bridge, connecting different local area network (LAN) segments and capturing all the traffic to and from one segment.

 

Procedure for the Bridge Mode

 

Step 1. Plan ahead and create a network bridge before the software installation (If you have installed the program, uninstall it first.)

 

After the NICs are installed and connected, open Control Panel, and click Network and Internet Connections and then Network Connections.

 

 

 

Next click both the network connections (using the Ctrl key), right-click one, and then click Bridge Connections.

After the completion of bridge configuration, the Network Connections window will look like the following one.

 

For more references and troubleshooting,

see http://www.microsoft.com/windowsxp/using/networking/expert/crawford_02april22.mspx.

 

Step 2. Install the software and set up the capturing NIC.

 

Go to Operation View, click Config, and you will see a window that looks like the one below.

 

 

There are three NICs shown in the table: One is the virtual NIC created as a result of bridging; and the other two are real NICs. If you are not sure which one is the external NIC capturing the traffic, you can try one by one by double-clicking them until there are data shown in Real-Time Log.

 

If you want to switch the operation from the Bridge mode to another one, the bridge connection must be deleted before enabling the changes.

 

B)    The Promiscuous Mode (with Hub or Mirroring Port)

 

For details, see the TupInsight part of our FAQ page at http://www.tupsoft.com/faq.htm.

 

II. Do You Know?  (5/5/2007)

 

1.     You can import a third-party blacklist (in Text File format) into our products for website access control.

2.     To monitor the complete chat content of the newer version of MSN, i.e., Windows Live Messenger, you need to upgrade to TupEnterprise.

 

Search Keywords:

NAT Gateway

NAT Gateway

NAT Gateway

NAT Gateway

NAT Gateway

NAT Gateway

NAT Gateway

NAT Gateway

NAT Gateway

Search Keywords:

Proxy Server

Proxy Server

Proxy Server

Proxy Server

Proxy Server

Proxy Server

Proxy Server

Proxy Server

Proxy Server

Search Keywords:

NAT Router

NAT Router

NAT Router

NAT Router

NAT Router

NAT Router

NAT Router

NAT Router

NAT Router

Search Keywords:

DNS Forwarding

DNS Forwarding

DNS Forwarding

DNS Forwarding

DNS Forwarding

DNS Forwarding

DNS Forwarding

DNS Forwarding

DNS Forwarding

Search Keywords:

Port Mapping

Port Mapping

Port Mapping

Port Mapping

Port Mapping

Port Mapping

Port Mapping

Port Mapping

Port Mapping

Search Keywords:

Reverse Proxy

Reverse Proxy

Reverse Proxy

Reverse Proxy

Reverse Proxy

Reverse Proxy

Reverse Proxy

Reverse Proxy

Reverse Proxy

Search Keywords:

Internet Connection Sharing

Internet Connection Sharing

Internet Connection Sharing

Internet Connection Sharing

Internet Connection Sharing

Internet Connection Sharing

Internet Connection Sharing

Internet Connection Sharing

Internet Connection Sharing

Search Keywords:

Internet Activity Monitoring

Internet Activity Monitoring

Internet Activity Monitoring

Internet Activity Monitoring

Internet Activity Monitoring

Internet Activity Monitoring

Internet Activity Monitoring

Internet Activity Monitoring

Internet Activity Monitoring

Search Keywords:

Parental Internet Monitoring

Parental Internet Monitoring

Parental Internet Monitoring

Parental Internet Monitoring

Parental Internet Monitoring

Parental Internet Monitoring

Parental Internet Monitoring

Parental Internet Monitoring

Parental Internet Monitoring

Search Keywords:

Internet Filtering

Internet Filtering

Internet Filtering

Internet Filtering

Internet Filtering

Internet Filtering

Internet Filtering

Internet Filtering

Internet Filtering

Search Keywords:

Internet Activity Statistics

Internet Activity Statistics

Internet Activity Statistics

Internet Activity Statistics

Internet Activity Statistics

Internet Activity Statistics

Internet Activity Statistics

Internet Activity Statistics

Internet Activity Statistics

Search Keywords:

Employee Internet Management

Employee Internet Management

Employee Internet Management

Employee Internet Management

Employee Internet Management

Employee Internet Management

Employee Internet Management

Employee Internet Management

Employee Internet Management

Search Keywords:

Web Access Control

Web Access Control

Web Access Control

Web Access Control

Web Access Control

Web Access Control

Web Access Control

Web Access Control

Web Access Control

Search Keywords:

Online Restriction

Online Restriction

Online Restriction

Online Restriction

Online Restriction

Online Restriction

Online Restriction

Online Restriction

Online Restriction

Search Keywords:

Network Monitoring

Network Monitoring

Network Monitoring

Network Monitoring

Network Monitoring

Network Monitoring

Network Monitoring

Network Monitoring

Network Monitoring

Search Keywords:

URL Block

URL Block

URL Block

URL Block

URL Block

URL Block

URL Block

URL Block

URL Block

Search Keywords:

Email Capture

Email Capture

Email Capture

Email Capture

Email Capture

Email Capture

Email Capture

Email Capture

Email Capture

Search Keywords:

Chat Log

Chat Log

Chat Log

Chat Log

Chat Log

Chat Log

Chat Log

Chat Log

Chat Log

Search Keywords:

MSN Recorder

MSN Recorder

MSN Recorder

MSN Recorder

MSN Recorder

MSN Recorder

MSN Recorder

MSN Recorder

MSN Recorder

Search Keywords:

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Search Keywords:

Skype Logger

Skype Logger

Skype Logger

Skype Logger

Skype Logger

Skype Logger

Skype Logger

Skype Logger

Skype Logger

Search Keywords:

Computer Activity Log

Computer Activity Log

Computer Activity Log

Computer Activity Log

Computer Activity Log

Computer Activity Log

Computer Activity Log

Computer Activity Log

Computer Activity Log

Search Keywords:

Real Time Monitoring

Real Time Monitoring

Real Time Monitoring

Real Time Monitoring

Real Time Monitoring

Real Time Monitoring

Real Time Monitoring

Real Time Monitoring

Real Time Monitoring

Search Keywords:

Screen Tracking

Screen Tracking

Screen Tracking

Screen Tracking

Screen Tracking

Screen Tracking

Screen Tracking

Screen Tracking

Screen Tracking

Search Keywords:

Software Compliance

Software Compliance

Software Compliance

Software Compliance

Software Compliance

Software Compliance

Software Compliance

Software Compliance

Software Compliance

Search Keywords:

Data Protection Security

Data Protection Security

Data Protection Security

Data Protection Security

Data Protection Security

Data Protection Security

Data Protection Security

Data Protection Security

Data Protection Security

Search Keywords:

Acceptable Computing

Acceptable Computing

Acceptable Computing

Acceptable Computing

Acceptable Computing

Acceptable Computing

Acceptable Computing

Acceptable Computing

Acceptable Computing

Search Keywords:

Employee Investigative Operation

Employee Investigative Operation

Employee Investigative Operation

Employee Investigative Operation

Employee Investigative Operation

Employee Investigative Operation

Employee Investigative Operation

Employee Investigative Operation

Employee Investigative Operation

Search Keywords:

Switch Sniffer

Switch Sniffer

Switch Sniffer

Switch Sniffer

Switch Sniffer

Switch Sniffer

Switch Sniffer

Switch Sniffer

Switch Sniffer

Search Keywords:

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Search Keywords:

Ethernet Capture

Ethernet Capture

Ethernet Capture

Ethernet Capture

Ethernet Capture

Ethernet Capture

Ethernet Capture

Ethernet Capture

Ethernet Capture

Search Keywords:

Network Tap

Network Tap

Network Tap

Network Tap

Network Tap

Network Tap

Network Tap

Network Tap

Network Tap

Search Keywords:

MITM

MITM

MITM

MITM

MITM

MITM

MITM

MITM

MITM

Search Keywords:

ARP Poisoning

ARP Poisoning

ARP Poisoning

ARP Poisoning

ARP Poisoning

ARP Poisoning

ARP Poisoning

ARP Poisoning

ARP Poisoning

Search Keywords:

ARP Spooling

ARP Spooling

ARP Spoofing

ARP Spoofing

ARP Spoofing

ARP Spoofing

ARP Spoofing

ARP Spoofing

ARP Spoofing

Search Keywords:

ARP Firewall

ARP Firewall

ARP Firewall

ARP Firewall

ARP Firewall

ARP Firewall

ARP Firewall

ARP Firewall

ARP Firewall

Search Keywords:

MAC Flooding

MAC Flooding

MAC Flooding

MAC Flooding

MAC Flooding

MAC Flooding

MAC Flooding

MAC Flooding

MAC Flooding

Search Keywords:

Promiscuous Mode

Promiscuous Mode

Promiscuous Mode

Promiscuous Mode

Promiscuous Mode

Promiscuous Mode

Promiscuous Mode

Promiscuous Mode

Promiscuous Mode

Search Keywords:

Block Instant Messaging

Block Instant Messaging

Block Instant Messaging

Block Instant Messaging

Block Instant Messaging

Block Instant Messaging

Block Instant Messaging

Block Instant Messaging

Block Instant Messaging

Search Keywords:

Web Content Monitoring

Web Content Monitoring

Web Content Monitoring

Web Content Monitoring

Web Content Monitoring

Web Content Monitoring

Web Content Monitoring

Web Content Monitoring

Web Content Monitoring

Search Keywords:

Employee Computer Abuse

Employee Computer Abuse

Employee Computer Abuse

Employee Computer Abuse

Employee Computer Abuse

Employee Computer Abuse

Employee Computer Abuse

Employee Computer Abuse

Employee Computer Abuse

Search Keywords:

Internet Policy Enforcement

Internet Policy Enforcement

Internet Policy Enforcement

Internet Policy Enforcement

Internet Policy Enforcement

Internet Policy Enforcement

Internet Policy Enforcement

Internet Policy Enforcement

Internet Policy Enforcement

Search Keywords:

Website Filter

Website Filter

Website Filter

Website Filter

Website Filter

Website Filter

Website Filter

Website Filter

Website Filter

Search Keywords:

Email Backup

Email Backup

Email Backup

Email Backup

Email Backup

Email Backup

Email Backup

Email Backup

Email Backup

Search Keywords:

Electronic Evidence

Electronic Evidence

Electronic Evidence

Electronic Evidence

Electronic Evidence

Electronic Evidence

Electronic Evidence

Electronic Evidence

Electronic Evidence

Search Keywords:

E-Discovery

E-Discovery

E-Discovery

E-Discovery

E-Discovery

E-Discovery

E-Discovery

E-Discovery

E-Discovery

Search Keywords:

Digital Archive

Digital Archive

Digital Archive

Digital Archive

Digital Archive

Digital Archive

Digital Archive

Digital Archive

Digital Archive

Search Keywords:

IM Recovery

IM Recovery

IM Recovery

IM Recovery

IM Recovery

IM Recovery

IM Recovery

IM Recovery

IM Recovery

Search Keywords:

Virtual Shredding

Virtual Shredding

Virtual Shredding

Virtual Shredding

Virtual Shredding

Virtual Shredding

Virtual Shredding

Virtual Shredding

Virtual Shredding

Search Keywords:

Workplace Internet Misuse

Workplace Internet Misuse

Workplace Internet Misuse

Workplace Internet Misuse

Workplace Internet Misuse

Workplace Internet Misuse

Workplace Internet Misuse

Workplace Internet Misuse

Workplace Internet Misuse

Search Keywords:

Internet Usage Policy

Internet Usage Policy

Internet Usage Policy

Internet Usage Policy

Internet Usage Policy

Internet Usage Policy

Internet Usage Policy

Internet Usage Policy

Internet Usage Policy

Search Keywords:

Application Program Locker

Application Program Locker

Application Program Locker

Application Program Locker

Application Program Locker

Application Program Locker

Application Program Locker

Application Program Locker

Application Program Locker

Search Keywords:

PC Activity Checker

PC Activity Checker

PC Activity Checker

PC Activity Checker

PC Activity Checker

PC Activity Checker

PC Activity Checker

PC Activity Checker

PC Activity Checker

Search Keywords:

Workplace Porn Filter

Workplace Porn Filter

Workplace Porn Filter

Workplace Porn Filter

Workplace Porn Filter

Workplace Porn Filter

Workplace Porn Filter

Workplace Porn Filter

Workplace Porn Filter

Search Keywords:

Streaming Media Ban

Streaming Media Ban

Streaming Media Ban

Streaming Media Ban

Streaming Media Ban

Streaming Media Ban

Streaming Media Ban

Streaming Media Ban

Streaming Media Ban

Search Keywords:

Stock Streamer Blocker

Stock Streamer Blocker

Stock Streamer Blocker

Stock Streamer Blocker

Stock Streamer Blocker

Stock Streamer Blocker

Stock Streamer Blocker

Stock Streamer Blocker

Stock Streamer Blocker

Search Keywords:

Download Restriction

Download Restriction

Download Restriction

Download Restriction

Download Restriction

Download Restriction

Download Restriction

Download Restriction

Download Restriction

Search Keywords:

PC Screen Tracker

PC Screen Tracker

PC Screen Tracker

PC Screen Tracker

PC Screen Tracker

PC Screen Tracker

PC Screen Tracker

PC Screen Tracker

PC Screen Tracker

Search Keywords:

USB Lockup

USB Lockup

USB Lockup

USB Lockup

USB Lockup

USB Lockup

USB Lockup

USB Lockup

USB Lockup

Search Keywords:

Workplace Online Privacy

Workplace Online Privacy

Workplace Online Privacy

Workplace Online Privacy

Workplace Online Privacy

Workplace Online Privacy

Workplace Online Privacy

Workplace Online Privacy

Workplace Online Privacy

Search Keywords:

School Internet Monitoring

School Internet Monitoring

School Internet Monitoring

School Internet Monitoring

School Internet Monitoring

School Internet Monitoring

School Internet Monitoring

School Internet Monitoring

School Internet Monitoring

Search Keywords:

Library Online Solution

Library Online Solution

Library Online Solution

Library Online Solution

Library Online Solution

Library Online Solution

Library Online Solution

Library Online Solution

Library Online Solution

Search Keywords:

Network Surveillance

Network Surveillance

Network Surveillance

Network Surveillance

Network Surveillance

Network Surveillance

Network Surveillance

Network Surveillance

Network Surveillance

Search Keywords:

Kid PC Activity

Kid PC Activity

Kid PC Activity

Kid PC Activity

Kid PC Activity

Kid PC Activity

Kid PC Activity

Kid PC Activity

Kid PC Activity

Search Keywords:

EIM Software

EIM Software

EIM Software

EIM Software

EIM Software

EIM Software

EIM Software

EIM Software

EIM Software

Search Keywords:

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Search Keywords:

Network Performance Tester

Network Performance Tester

Network Performance Tester

Network Performance Tester

Network Performance Tester

Network Performance Tester

Network Performance Tester

Network Performance Tester

Network Performance Tester

Search Keywords:

Network Testing Products

Network Testing Products

Network Testing Products

Network Testing Products

Network Testing Products

Network Testing Products

Network Testing Products

Network Testing Products

Network Testing Products

Search Keywords:

Network Protocol Analyzer

Network Protocol Analyzer

Network Protocol Analyzer

Network Protocol Analyzer

Network Protocol Analyzer

Network Protocol Analyzer

Network Protocol Analyzer

Network Protocol Analyzer

Network Protocol Analyzer

 

 

 

 

 

 

 

 

 

 

 

louis vuitton outlet michael kors outlet legend blue 11s louis vuitton outlet louis vuitton outlet beats by dre outlet jordan 11 legend blue jordan 11 legend blue jordan retro 11 lebron 12 louis vuitton outlet jordan 11 legend blue jordan 6 black infrared beats by dre cheap beats by dre outlet black infrared 6s coach outlet online jordan retro 11 jordan 6 black infrared black infrared 6s coach outlet online legend blue 11s coach factory outlet Nike kd vii legend blue 11s Legend Blue 11s black infrared 6s jordan 11 legend blue louis vuitton outlet jordan 11 legend blue michael kors outlet coach factory outlet black infrared 6s coach factory outlet jordan 11 legend blue beats by dre outlet black infrared 6s jordan 6 black infrared louis vuitton outlet legend blue 11s