t several different actions on it, provided he or she has the appropriate permissions: view shared folders, access the web server or FTP, do a ping test, or run Telnet.
Plus, you can also use this program to find out details on the detected computers, including: PC name, the group it belongs to, MAC address, etc.