Compatible with Windows operating system with 32-bit and 64-bit cores.Receive detailed reports of network errors.Keep log files and maintain log dumps of traffic.View real-time data on actual network activity (connections, hosts, connection times, hosts, and bandwidth use) and access real-time information on current network activities (connections, hosts, times, and bandwidth usage).Work through a series of proxy servers that use different protocols.You can protect your privacy by concealing your IP address.Use proxy rules that are flexible, using hostnames and wildcards for application names.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |