TupView

The fusion of computer and communications technology is just bringing a radical structural transformation to the business society.
The dimensions of this revolution are so vast that none can easily discern.  TupView, the latest product developed by Tup Software
Ltd., is intended to provide a topview for a small & medium business owner/executive who is in need gaining real-time insight/control
over every detailed activity on a PC host over the whole LAN.

TupView logs every meaningful action performed on a PC host to enforce acceptable-use computing and record keeping; it generates
statistical reports on software and hardware uses to give a quick glance into overall productivity, resource effectiveness, and
employees’ work habits; it is able to record, track, and play back continuously the screen activities appearing on a specific PC host for
appropriate investigative operation; it restricts installation and use of computer applications and peripherals for the purposes of
software compliance and data protection and security; and it automatically acquires the system information (both software and
hardware) of PC hosts over the whole LAN for better management of information technology environment.

More specifically, the main functions of TupView can be summarized as follows:
Product Links
  • Logging activities on a PC host in real time, so you can know what the employee is doing right now.

  • Taking a snapshot of an active screen for further information and investigation.

  • Tracking down and recording continuously the screen activities at a preset time interval (default 5 seconds and 4 PC
    hosts simultaneously.)

  • Recording the use of applications such as time opened and closed and the total running period, and giving statistical
    analysis on how effectively the application is used.

  • Logging window switch events so as to calculate the active time spent on an application.

  • Recording printing events including the user, time, file name, and total pages.

  • Logging in detail how a file and its content are modified by an employee.

  • Logging software and hardware changes such as when an application is deleted or a device removed, and listing the
    software and hardware installation details on a computer.

  • Regulating and restricting the use of applications with a preset blocking list, and enforcing through application
    identification, effectively preventing bypass via renaming or application modification.

  • Limiting the use of some hardware devices such as removable storages and CD drives for data protection.
Tup Software Ltd.
1828 Sutter Parkway
Powell, OH 43065
Email:
info@tupsoft.com
Tel: (614)-245-0171
Fax: (614)-798-2057
Documentation


User_Manual  (html)              User_Manual (PDF)
Download Links

TupView.zip  (at www.tupsoft.com)              

TupView.zip  (at www.fibreo.com)      

Search Keywords:

NAT Gateway

NAT Gateway

NAT Gateway

NAT Gateway

NAT Gateway

NAT Gateway

NAT Gateway

NAT Gateway

NAT Gateway

Search Keywords:

Proxy Server

Proxy Server

Proxy Server

Proxy Server

Proxy Server

Proxy Server

Proxy Server

Proxy Server

Proxy Server

Search Keywords:

NAT Router

NAT Router

NAT Router

NAT Router

NAT Router

NAT Router

NAT Router

NAT Router

NAT Router

Search Keywords:

DNS Forwarding

DNS Forwarding

DNS Forwarding

DNS Forwarding

DNS Forwarding

DNS Forwarding

DNS Forwarding

DNS Forwarding

DNS Forwarding

Search Keywords:

Port Mapping

Port Mapping

Port Mapping

Port Mapping

Port Mapping

Port Mapping

Port Mapping

Port Mapping

Port Mapping

Search Keywords:

Reverse Proxy

Reverse Proxy

Reverse Proxy

Reverse Proxy

Reverse Proxy

Reverse Proxy

Reverse Proxy

Reverse Proxy

Reverse Proxy

Search Keywords:

Internet Connection Sharing

Internet Connection Sharing

Internet Connection Sharing

Internet Connection Sharing

Internet Connection Sharing

Internet Connection Sharing

Internet Connection Sharing

Internet Connection Sharing

Internet Connection Sharing

Search Keywords:

Internet Activity Monitoring

Internet Activity Monitoring

Internet Activity Monitoring

Internet Activity Monitoring

Internet Activity Monitoring

Internet Activity Monitoring

Internet Activity Monitoring

Internet Activity Monitoring

Internet Activity Monitoring

Search Keywords:

Parental Internet Monitoring

Parental Internet Monitoring

Parental Internet Monitoring

Parental Internet Monitoring

Parental Internet Monitoring

Parental Internet Monitoring

Parental Internet Monitoring

Parental Internet Monitoring

Parental Internet Monitoring

Search Keywords:

Internet Filtering

Internet Filtering

Internet Filtering

Internet Filtering

Internet Filtering

Internet Filtering

Internet Filtering

Internet Filtering

Internet Filtering

Search Keywords:

Internet Activity Statistics

Internet Activity Statistics

Internet Activity Statistics

Internet Activity Statistics

Internet Activity Statistics

Internet Activity Statistics

Internet Activity Statistics

Internet Activity Statistics

Internet Activity Statistics

Search Keywords:

Employee Internet Management

Employee Internet Management

Employee Internet Management

Employee Internet Management

Employee Internet Management

Employee Internet Management

Employee Internet Management

Employee Internet Management

Employee Internet Management

Search Keywords:

Web Access Control

Web Access Control

Web Access Control

Web Access Control

Web Access Control

Web Access Control

Web Access Control

Web Access Control

Web Access Control

Search Keywords:

Online Restriction

Online Restriction

Online Restriction

Online Restriction

Online Restriction

Online Restriction

Online Restriction

Online Restriction

Online Restriction

Search Keywords:

Network Monitoring

Network Monitoring

Network Monitoring

Network Monitoring

Network Monitoring

Network Monitoring

Network Monitoring

Network Monitoring

Network Monitoring

Search Keywords:

URL Block

URL Block

URL Block

URL Block

URL Block

URL Block

URL Block

URL Block

URL Block

Search Keywords:

Email Capture

Email Capture

Email Capture

Email Capture

Email Capture

Email Capture

Email Capture

Email Capture

Email Capture

Search Keywords:

Chat Log

Chat Log

Chat Log

Chat Log

Chat Log

Chat Log

Chat Log

Chat Log

Chat Log

Search Keywords:

MSN Recorder

MSN Recorder

MSN Recorder

MSN Recorder

MSN Recorder

MSN Recorder

MSN Recorder

MSN Recorder

MSN Recorder

Search Keywords:

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Yahoo Messenger Sinffer

Search Keywords:

Skype Logger

Skype Logger

Skype Logger

Skype Logger

Skype Logger

Skype Logger

Skype Logger

Skype Logger

Skype Logger

Search Keywords:

Computer Activity Log

Computer Activity Log

Computer Activity Log

Computer Activity Log

Computer Activity Log

Computer Activity Log

Computer Activity Log

Computer Activity Log

Computer Activity Log

Search Keywords:

Real Time Monitoring

Real Time Monitoring

Real Time Monitoring

Real Time Monitoring

Real Time Monitoring

Real Time Monitoring

Real Time Monitoring

Real Time Monitoring

Real Time Monitoring

Search Keywords:

Screen Tracking

Screen Tracking

Screen Tracking

Screen Tracking

Screen Tracking

Screen Tracking

Screen Tracking

Screen Tracking

Screen Tracking

Search Keywords:

Software Compliance

Software Compliance

Software Compliance

Software Compliance

Software Compliance

Software Compliance

Software Compliance

Software Compliance

Software Compliance

Search Keywords:

Data Protection Security

Data Protection Security

Data Protection Security

Data Protection Security

Data Protection Security

Data Protection Security

Data Protection Security

Data Protection Security

Data Protection Security

Search Keywords:

Acceptable Computing

Acceptable Computing

Acceptable Computing

Acceptable Computing

Acceptable Computing

Acceptable Computing

Acceptable Computing

Acceptable Computing

Acceptable Computing

Search Keywords:

Employee Investigative Operation

Employee Investigative Operation

Employee Investigative Operation

Employee Investigative Operation

Employee Investigative Operation

Employee Investigative Operation

Employee Investigative Operation

Employee Investigative Operation

Employee Investigative Operation

Search Keywords:

Switch Sniffer

Switch Sniffer

Switch Sniffer

Switch Sniffer

Switch Sniffer

Switch Sniffer

Switch Sniffer

Switch Sniffer

Switch Sniffer

Search Keywords:

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Search Keywords:

Ethernet Capture

Ethernet Capture

Ethernet Capture

Ethernet Capture

Ethernet Capture

Ethernet Capture

Ethernet Capture

Ethernet Capture

Ethernet Capture

Search Keywords:

Network Tap

Network Tap

Network Tap

Network Tap

Network Tap

Network Tap

Network Tap

Network Tap

Network Tap

Search Keywords:

MITM

MITM

MITM

MITM

MITM

MITM

MITM

MITM

MITM

Search Keywords:

ARP Poisoning

ARP Poisoning

ARP Poisoning

ARP Poisoning

ARP Poisoning

ARP Poisoning

ARP Poisoning

ARP Poisoning

ARP Poisoning

Search Keywords:

ARP Spooling

ARP Spooling

ARP Spoofing

ARP Spoofing

ARP Spoofing

ARP Spoofing

ARP Spoofing

ARP Spoofing

ARP Spoofing

Search Keywords:

ARP Firewall

ARP Firewall

ARP Firewall

ARP Firewall

ARP Firewall

ARP Firewall

ARP Firewall

ARP Firewall

ARP Firewall

Search Keywords:

MAC Flooding

MAC Flooding

MAC Flooding

MAC Flooding

MAC Flooding

MAC Flooding

MAC Flooding

MAC Flooding

MAC Flooding

Search Keywords:

Promiscuous Mode

Promiscuous Mode

Promiscuous Mode

Promiscuous Mode

Promiscuous Mode

Promiscuous Mode

Promiscuous Mode

Promiscuous Mode

Promiscuous Mode

Search Keywords:

Block Instant Messaging

Block Instant Messaging

Block Instant Messaging

Block Instant Messaging

Block Instant Messaging

Block Instant Messaging

Block Instant Messaging

Block Instant Messaging

Block Instant Messaging

Search Keywords:

Web Content Monitoring

Web Content Monitoring

Web Content Monitoring

Web Content Monitoring

Web Content Monitoring

Web Content Monitoring

Web Content Monitoring

Web Content Monitoring

Web Content Monitoring

Search Keywords:

Employee Computer Abuse

Employee Computer Abuse

Employee Computer Abuse

Employee Computer Abuse

Employee Computer Abuse

Employee Computer Abuse

Employee Computer Abuse

Employee Computer Abuse

Employee Computer Abuse

Search Keywords:

Internet Policy Enforcement

Internet Policy Enforcement

Internet Policy Enforcement

Internet Policy Enforcement

Internet Policy Enforcement

Internet Policy Enforcement

Internet Policy Enforcement

Internet Policy Enforcement

Internet Policy Enforcement

Search Keywords:

Website Filter

Website Filter

Website Filter

Website Filter

Website Filter

Website Filter

Website Filter

Website Filter

Website Filter

Search Keywords:

Email Backup

Email Backup

Email Backup

Email Backup

Email Backup

Email Backup

Email Backup

Email Backup

Email Backup

Search Keywords:

Electronic Evidence

Electronic Evidence

Electronic Evidence

Electronic Evidence

Electronic Evidence

Electronic Evidence

Electronic Evidence

Electronic Evidence

Electronic Evidence

Search Keywords:

E-Discovery

E-Discovery

E-Discovery

E-Discovery

E-Discovery

E-Discovery

E-Discovery

E-Discovery

E-Discovery

Search Keywords:

Digital Archive

Digital Archive

Digital Archive

Digital Archive

Digital Archive

Digital Archive

Digital Archive

Digital Archive

Digital Archive

Search Keywords:

IM Recovery

IM Recovery

IM Recovery

IM Recovery

IM Recovery

IM Recovery

IM Recovery

IM Recovery

IM Recovery

Search Keywords:

Virtual Shredding

Virtual Shredding

Virtual Shredding

Virtual Shredding

Virtual Shredding

Virtual Shredding

Virtual Shredding

Virtual Shredding

Virtual Shredding

Search Keywords:

Workplace Internet Misuse

Workplace Internet Misuse

Workplace Internet Misuse

Workplace Internet Misuse

Workplace Internet Misuse

Workplace Internet Misuse

Workplace Internet Misuse

Workplace Internet Misuse

Workplace Internet Misuse

Search Keywords:

Internet Usage Policy

Internet Usage Policy

Internet Usage Policy

Internet Usage Policy

Internet Usage Policy

Internet Usage Policy

Internet Usage Policy

Internet Usage Policy

Internet Usage Policy

Search Keywords:

Application Program Locker

Application Program Locker

Application Program Locker

Application Program Locker

Application Program Locker

Application Program Locker

Application Program Locker

Application Program Locker

Application Program Locker

Search Keywords:

PC Activity Checker

PC Activity Checker

PC Activity Checker

PC Activity Checker

PC Activity Checker

PC Activity Checker

PC Activity Checker

PC Activity Checker

PC Activity Checker

Search Keywords:

Workplace Porn Filter

Workplace Porn Filter

Workplace Porn Filter

Workplace Porn Filter

Workplace Porn Filter

Workplace Porn Filter

Workplace Porn Filter

Workplace Porn Filter

Workplace Porn Filter

Search Keywords:

Streaming Media Ban

Streaming Media Ban

Streaming Media Ban

Streaming Media Ban

Streaming Media Ban

Streaming Media Ban

Streaming Media Ban

Streaming Media Ban

Streaming Media Ban

Search Keywords:

Stock Streamer Blocker

Stock Streamer Blocker

Stock Streamer Blocker

Stock Streamer Blocker

Stock Streamer Blocker

Stock Streamer Blocker

Stock Streamer Blocker

Stock Streamer Blocker

Stock Streamer Blocker

Search Keywords:

Download Restriction

Download Restriction

Download Restriction

Download Restriction

Download Restriction

Download Restriction

Download Restriction

Download Restriction

Download Restriction

Search Keywords:

PC Screen Tracker

PC Screen Tracker

PC Screen Tracker

PC Screen Tracker

PC Screen Tracker

PC Screen Tracker

PC Screen Tracker

PC Screen Tracker

PC Screen Tracker

Search Keywords:

USB Lockup

USB Lockup

USB Lockup

USB Lockup

USB Lockup

USB Lockup

USB Lockup

USB Lockup

USB Lockup

Search Keywords:

Workplace Online Privacy

Workplace Online Privacy

Workplace Online Privacy

Workplace Online Privacy

Workplace Online Privacy

Workplace Online Privacy

Workplace Online Privacy

Workplace Online Privacy

Workplace Online Privacy

Search Keywords:

School Internet Monitoring

School Internet Monitoring

School Internet Monitoring

School Internet Monitoring

School Internet Monitoring

School Internet Monitoring

School Internet Monitoring

School Internet Monitoring

School Internet Monitoring

Search Keywords:

Library Online Solution

Library Online Solution

Library Online Solution

Library Online Solution

Library Online Solution

Library Online Solution

Library Online Solution

Library Online Solution

Library Online Solution

Search Keywords:

Network Surveillance

Network Surveillance

Network Surveillance

Network Surveillance

Network Surveillance

Network Surveillance

Network Surveillance

Network Surveillance

Network Surveillance

Search Keywords:

Kid PC Activity

Kid PC Activity

Kid PC Activity

Kid PC Activity

Kid PC Activity

Kid PC Activity

Kid PC Activity

Kid PC Activity

Kid PC Activity

Search Keywords:

EIM Software

EIM Software

EIM Software

EIM Software

EIM Software

EIM Software

EIM Software

EIM Software

EIM Software

Search Keywords:

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Gigabit Ethernet Analyzer

Search Keywords:

Network Performance Tester

Network Performance Tester

Network Performance Tester

Network Performance Tester

Network Performance Tester

Network Performance Tester

Network Performance Tester

Network Performance Tester

Network Performance Tester

Search Keywords:

Network Testing Products

Network Testing Products

Network Testing Products

Network Testing Products

Network Testing Products

Network Testing Products

Network Testing Products

Network Testing Products

Network Testing Products

Search Keywords:

Network Protocol Analyzer

Network Protocol Analyzer

Network Protocol Analyzer

Network Protocol Analyzer

Network Protocol Analyzer

Network Protocol Analyzer

Network Protocol Analyzer

Network Protocol Analyzer

Network Protocol Analyzer