LAD: LateralAccessDevice

takes you back to before the Internet

How It Works | Download LAD | Support | LAD Security | Features & Uses | Resources

Features & Uses

The LateralAccessDevice (LAD for short) is a purpose-built, multi-dimensional tool for network management and control. It is software that turns your hardware into a high-performance, multipurpose Internet/network tool that combines multi-dimensional firewalling, monitoring, access control, packet capture, DNS, NAT and a host of other applications into one easy to use, integrated, high-security package. In simpler terms, it is an all-in-one networking system that you run on your own hardware/computer, converting it into the single piece of equipment that you need for accessing the Internet and running your home or office network securely. It combines the features and functions of a firewall, switch, router, packet capture appliance and network monitoring and visualization tool.

LAD lets you see what is going on throughout your network both at the perimeter and within, between the individual networked devices, down to the level of individual data packets. It lets you monitor, restrict and manage the communications of the computers and other devices on your network, including IoT gadgets, such as IP cameras, that use your network and the internet as part of their functionality.

With LAD you may record all or portions of your network traffic, automatically or on demand, to its encrypted storage. If you see something going on that you don't like, you can block it off and still be able to do the things that you want to do. LAD lets you filter out and disconnect the adware, malware and other unwanted-ware while retaining the connectivity, functions and functionalities that you want.

We are constantly adding to and updating LAD, so the best way to find out what it can do for you is to try it out. Below is a short list of the features LAD offers:

  • Multi-Dimensional Firewall: Thousands of sophisticated rules let you control specifically what is allowed and what is not allowed, down to as granular a level as you like [read more].
  • Date & Time Scheduling: Want your computer to disconnect at the end of the day, when you do? LAD's scheduling features let you cut off Internet access partially or fully on a schedule of your choosing.
  • Packet Capture: LAD's packet capture feature lets you capture as much or as little of the Internet and network traffic as you like. This information comes in handy should a network incident require investigation [read more].
  • Network Visualization: This fancy term means that LAD can visually plot network activity on a graph.
  • NAT: Network address translation obscures private/internal IP addresses from the public internet, so that only the Internet-facing IP address is used for communications leaving the private/internal network.
  • DNS: LAD's domain name resolution feature lets you control DNS at a granular level, making it possible both to resolve domain names and block the resolution of specific names, for example, to prevent adware and spyware from connecting to their command-and-control servers [read more].
  • Switching & Routing: LAD provides switching and routing services, meaning you can plug all of your devices directly into your LAD without an intervening switch or router.
  • Remote Access Control: Lets you securely access specific devices or applications from a remote location on demand, without opening up your network to the whole Internet. LAD grants access on a per-device and per-application basis, meaning that access is only granted to your specific remote device or application and only for the time that you need it.
  • Local Access Control: Locally you can limit which devices on the network can talk to each other and with the Internet, as well as specify the types of communications allowed [read more].
  • Daily Activity Report: Automatic daily reports on aggregate network traffic give you an overview into your network traffic, plus individual graphs on bandwidth usage for each device on your network.

LAD takes you back to before the Internet

While we say this tongue in cheek, LAD makes it possible to simplify your Internet and network experience by blocking what you don't want and keeping what you do. For example, before the Internet, your security camera couldn't upload its video feed to anywhere without you knowing. Before the Internet, your computer couldn't take part in a DoS (denial of service) campaign to harass and harm others, nor could it secretly keylog (record the key strokes from your keyboard) and send off your banking passwords. LAD lets you reacquire control and visibility into what your computers and other gadgets are doing.

In a sense, users' lack of knowledge about what their computers are doing (and inability to do anything about it) are their biggest security threats. Success for the the hacker is directly tied to the user's obliviousness that anything is going on. If you knew that your computer was sending out your secret information, wouldn't you like to know so you could put an end to it? LAD is the tool that lets you do exactly that, without having to give up the Internet that you like.

To give an example, some or many users may have run afoul of their ISP's bandwidth rules and had their bandwidth restricted, without knowing the reason why. In some cases, unbeknownst to the user, hackers had set up clandestine content distribution services on their computers and run gobs of video, audio, image, SPAM and all other imaginable content through the user's internet connection, triggering the ISP's bandwidth restrictions. With LAD in place, those users would have been able to detect the secret (and possibly illicit) distribution of content and take steps to block it off, before they got blocked. Without a way (such as LAD) to detect these types of secret communications, file transfers and the like, however, there isn't much any user could do.

Download LateralAccessDevice today for free.

LAD: LateralAccessDevice is software that turns a computer chassis into a high-performance, multi-purpose Internet / network tool that combines multi-dimensional firewalling, network monitoring, access control, packet capture, DNS, NAT and a host of other applications into one easy to use, integrated, high-security package. You can get it already preinstalled on a computer from your own vendor or you can download it directly from this website. The software is the same either way, though the version might be different.