WHAT IT DOES: "Targeted Ping" works by taking a text file with a list of hostnames or IP addresses and pinging them to check they are alive hosts. It then provides an output file marking alive/dead hosts. Thats all it does. Its only been tested on Windows XP, we are unlikely to make any requested changes or fixes but you can try :) HOW TO USE IT: Create a text file. Copy an item to be pinged on each new line. Launch "Targeted Ping" Point it to your text file. "Targeted Ping" will start checking hosts. When done press the prompt to open the results file which defaults to the root of your C:\ drive. The results file (c:\working.txt) will list each result next to the relevant hostname (Hostname, OK/bad).You may need Administrator priviledges on your local PC for that. WHY IT COULD BE USEFUL : Many commercial scanning tools are non targeted and deal with IP address ranges rather than imported lists of hostnames. In addition it is simple and has no cost attached. We use it to begin troubleshooting clients that do not report or have some other issues. Where NS has a large collection of computers from a report or similar, you can copy the computers into a text file to scan. With the results file you can sort using Microsoft XL - after this and do whatever it is you want, knowing these are live clients...eg fire back into the client install, put in a collection for jobs etc. Because the application is standalone and because the lists are static, you can run the scans very fast. It also gives some peace of mind using a second system to test the first. LICENSE: Its supplied as is, as freeware. It is compiled with AutoIt , a free scripting tool. You may do what you like with the tool. WAIVER: The owner, supplier, host or distributor of the file will not accept any blame for anything that anyone does with this file that results in anything bad happening. Please test it in your own environment and begin by using small lists of hostnames first. It will run many shortened pings to the list of supplied hostnames/IP addresses and thus does use appropriate computer resources which are within normal usage on a computer. Be mindful that the intended action of this script in many ways can be similar to some of the actions of virus or malware and you should consider network implications as a result (intusion detection systems, other network security monitors). Happy pinging.