skipped 7 lines 8 8 9 9 # Features 10 10 11 - - [Dashboard](Application/Dashboard) 12 - - [Network Interface](Application/NetworkInterface) - Information, Bandwidth, Configure 13 - - [WLAN](Application/WLAN) - Networks, Channels 14 - - [IP Scanner](Application/IPScanner) 15 - - [Port Scanner](Application/PortScanner) 16 - - [Ping Monitor](Application/PingMonitor) 17 - - [Traceroute](Application/Traceroute) 18 - - [DNS Lookup](Application/DNSLookup) 19 - - [Remote Desktop](Application/RemoteDesktop) 20 - - [PowerShell](Application/PowerShell) 21 - - [PuTTY](Application/PuTTY) ([requires PuTTY](https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html){:target="_blank"}) 22 - - [TigerVNC](Application/TigerVNC) ([requires TigerVNC](https://tigervnc.org/){:target="_blank"}) 23 - - [Web Console](Application/WebConsole) ([requires Microsoft Edge - WebView2 Runtime](https://developer.microsoft.com/en-us/microsoft-edge/webview2/){:target="_blank"}) 24 - - [SNMP](Application/SNMP) - Get, Walk, Set 25 - - [Discovery Protocol](Application/DiscoveryProtocol) - LLDP, CDP 26 - - [Wake on LAN](Application/WakeOnLAN) 27 - - [Whois](Application/Whois) 28 - - [Subnet Calculator](Application/SubnetCalculator) - Calculator, Subnetting, Supernetting 29 - - [Lookup](Application/Lookup) - OUI, Port 30 - - [Connections](Application/Connections) 31 - - [Listeners](Application/Listeners) 32 - - [ARP Table](Application/ARPTable) 11 + - [Dashboard](Documentation / Application/Dashboard) 12 + - [Network Interface](Documentation / Application/NetworkInterface) - Information, Bandwidth, Configure 13 + - [WLAN](Documentation / Application/WLAN) - Networks, Channels 14 + - [IP Scanner](Documentation / Application/IPScanner) 15 + - [Port Scanner](Documentation / Application/PortScanner) 16 + - [Ping Monitor](Documentation / Application/PingMonitor) 17 + - [Traceroute](Documentation / Application/Traceroute) 18 + - [DNS Lookup](Documentation / Application/DNSLookup) 19 + - [Remote Desktop](Documentation / Application/RemoteDesktop) 20 + - [PowerShell](Documentation / Application/PowerShell) 21 + - [PuTTY](Documentation / Application/PuTTY) ([requires PuTTY](https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html){:target="_blank"}) 22 + - [TigerVNC](Documentation / Application/TigerVNC) ([requires TigerVNC](https://tigervnc.org/){:target="_blank"}) 23 + - [Web Console](Documentation / Application/WebConsole) ([requires Microsoft Edge - WebView2 Runtime](https://developer.microsoft.com/en-us/microsoft-edge/webview2/){:target="_blank"}) 24 + - [SNMP](Documentation / Application/SNMP) - Get, Walk, Set 25 + - [Discovery Protocol](Documentation / Application/DiscoveryProtocol) - LLDP, CDP 26 + - [Wake on LAN](Documentation / Application/WakeOnLAN) 27 + - [Whois](Documentation / Application/Whois) 28 + - [Subnet Calculator](Documentation / Application/SubnetCalculator) - Calculator, Subnetting, Supernetting 29 + - [Lookup](Documentation / Application/Lookup) - OUI, Port 30 + - [Connections](Documentation / Application/Connections) 31 + - [Listeners](Documentation / Application/Listeners) 32 + - [ARP Table](Documentation / Application/ARPTable) 33 33 34 34 35 35 Hosts can be stored in profiles, which can be used across all features. Individual settings such as the path to an SSH key can be stored here to override the global settings. The profile files can be stored encrypted on disk and protected with a master password to provide an additional layer of security.