Network Diagnostics, Refined

Bcarchive Download New! May 2026

VisualRoute turns raw traceroute data into a clear, living picture of your network. Pinpoint the exact hop where latency climbs, packet loss begins, or routing changes break a connection, in seconds.

25+Years in Production
v14.2bCurrent Release
VisualRoute map and traceroute results

: Supports military-grade algorithms like AES-256, Blowfish, Triple DES, and IDEA.

: When viewing files, the software extracts them to a temporary folder and securely wipes them once the archive is closed to prevent "data remanence".

: Compatible with PKCS #12/X.509 and PGP keys, allowing you to encrypt files for others without sharing a password.

: Open the downloaded .exe and follow the prompts to complete the setup. How to Use BCArchive for Encryption

: You can create .exe files that allow recipients to decrypt data without having BCArchive installed.

: Navigate to the Jetico Free Security Tools page.

If you have a recipient's public key, select the option during the archive creation process. This eliminates the need to communicate a password over insecure channels like email. BCArchive v.2 - Jetico

: Ensure your system meets the minimum requirements, which include roughly 7MB of disk space and a compatible Windows OS (Windows XP up to Windows 11 and various Windows Server versions).

Built For The Hard Cases

When a ticket says "the internet is slow," VisualRoute tells you where.

Most tools stop at a flat traceroute table. VisualRoute goes further. It captures multiple routes simultaneously, maps them geographically, and surfaces the hop that is actually causing the pain, whether it's your ISP, a peering partner, or the destination itself.

  • Continuous trace and ping testing to catch intermittent faults
  • Server-side tracing from Visualware's global vantage points
  • OmniPath and NetVu for load-balanced and multi-path networks
  • Whois, DNS response testing, and port probing built in
Detailed traceroute results

Bcarchive Download New! May 2026

: Supports military-grade algorithms like AES-256, Blowfish, Triple DES, and IDEA.

: When viewing files, the software extracts them to a temporary folder and securely wipes them once the archive is closed to prevent "data remanence".

: Compatible with PKCS #12/X.509 and PGP keys, allowing you to encrypt files for others without sharing a password. bcarchive download

: Open the downloaded .exe and follow the prompts to complete the setup. How to Use BCArchive for Encryption

: You can create .exe files that allow recipients to decrypt data without having BCArchive installed. : Open the downloaded

: Navigate to the Jetico Free Security Tools page.

If you have a recipient's public key, select the option during the archive creation process. This eliminates the need to communicate a password over insecure channels like email. BCArchive v.2 - Jetico If you have a recipient's public key, select

: Ensure your system meets the minimum requirements, which include roughly 7MB of disk space and a compatible Windows OS (Windows XP up to Windows 11 and various Windows Server versions).

7Connected Views
Win 10/11Native
15 DayFree Trial

Try the full suite for 15 days.

No credit card. Windows installer, 4.4 MB. Bundled Java runtime.