(This software can intuitively see the specific IP address where the communication takes place, and can timely capture those behind the theft through the domain name commonly used by modern "Trojans". Note: TCP traffic: TCP is a connection oriented, reliable and byte stream based transport layer communication protocol. The websites we usually browse and the updates (upload / download) of some software in the computer use TCP protocol for data transmission. UDP traffic: UDP is another network communication protocol, namely "user packet protocol". This is a connectionless transport layer protocol in the OSI reference model, which provides simple and unreliable transaction oriented information transmission services. Chat traffic: network traffic generated by various instant messaging software. "Default" is sorted by the most recent transmission time (the IP address where communication is taking place is displayed at the top and marked in red). Traffic ranking: displays the top 10 IP addresses with the largest data transmission traffic. Network connection: displays the network connection status of local programs (processes).
This document contains the following attachments:
config. dat
dashbk. dat
dashbk1.dat
dashcover. dat
floatwnd. dat
ication. dat
ipanother. txt
preal. dat
ptdescr. dat
topntab. dat
user. ini
IPTape. exe
readme. txt
xiprad. dll
xutil. dll
dat
IPRadar3....)