captivair
- Downloads:
- Views:
- Rating:

A captive portal system for administrators of public WiFi hotspots.
Free download from Shareware Connection - A captive portal system for administrators of public WiFi hotspots.
Version: 0.3.0 | Size: 16 KB | Platform: Linux
Released Date: 13-07-2012 | Rating: 0 | Title: captivair
Author Url: http://thorwifi.sourceforge.net
Program Info Url: http://thorwifi.sourceforge.net
Download Url: http://sourceforge.net/projects/thorwifi/files/
Medieval Bluetooth Diagnostic Tool
DiskAccess Lite Windows NFS Client
Colasoft MAC Scanner Pro
Advanced LAN Scanner
PRTG - Paessler Router Traffic Grapher
Windows IP & Socket Monitor
WirelessMon
Emsa Bandwidth Monitor
Ultra Network Sniffer
NetAdjust Anonymous Proxy
CommView for WiFi
WiFi Manager
NetDog Anti Porn
Kiwi Syslog Daemon
Backup
Benchmarking
Calculators
Clipboard
Desktop Enhancements
File & Disk Management
File Compression
File Splitters
Font Tools
Keyboard
Icon Tools
Launchers
Memory Management
Mouse
Captive Portal
Captive Portal Guest Access
How Unlock Wifi Hotspots
Toolbar Wifi Hotspots
Blocking Wifi Hotspots
Shareware Connection periodically updates pricing and software information of 'captivair' from company source 'thorwifi.sourceforge.net' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft, Using 'captivair' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of captivair.
SnapCrab - Nearly every PC users need to take screenshots from time to time, whether it is for personal or professional needs. While using the basic Windows screenshot capture method is available, it is not adequate for everyone. When you want to capture ...
SeaMonkey, Portable Edition - Using the Internet has become a necessity for a majority of people, including those who do not use a PC regularly. To browse web, stream video or download online content, people often resort to using various third party apps. For example, using ...
Style Jukebox - No matter if you use a computer for personal needs or work in a networked setup, listening to music is commonplace. It is required for relaxation amidst work and nearly every user indulges in it. For music playback on PC, the WMP is not the only ...
PureSync Personal - When you use computers, there is no way you can escape using specialized third party software. These need to be used for various needs including office productivity, web access, taking back-up and ensuring proper synchronization across multiple ...
Hekasoft Backup & Restore - There was a time a majority of Windows PC users stuck to Internet Explorer as it was the integrated web browsing app. After arrival and growth of Open Source rivals like Firefox and Chrome, the scenario has changed a lot. PC users are now spoilt ...
PhoXo - Even a few years back, it was mostly graphic design professionals or people involved in print media were seen using image editing applications. With digital camera prices nose-diving and mobile imaging reaching new heights, things have undergone ...
HWiNFO32 - While Windows ships with its inbuilt utilities and there are command prompts to diagnose hardware and software components, these may not be feasible for all users. To learn about exact hardware and software configuration in a computer, either ...
SumatraPDF - The PDF format is used worldwide to distribute document files without changing formatting, alignment and layout. It can also be used to share complex engineering designs and diagrams along with massive amounts of text. The biggest benefit of this ...
Norton Security with Backup - Symantec is an old time player in PC security and its various security suites with Norton brand name are used all over the world. With time, Norton security apps have been tweaked to consume fewer resources and they come with several bells and ...
Emsisoft Emergency Kit - The way malware creators and hackers are adapting to newer measures to sneak past PC security, it is no longer enough to stay complacent after installing a standalone antivirus. You never know when a stealthy malware sneaks past its scan and ...


