English language page Russian language page
download support

   Starting from today's version of the utility you can two captured dump formats. As you can see in the picture, it's RAW format, which is available as ".efs" upon capture Ethernet frames and ".ips" in the case capture of IP packets, and PCAP-compatible format that is used as standard in such popular programs like Wireshark, tcpdump and more. Read ".cap" format utility knew before, although being made. What do we have? As you know, to capture traffic on the link layer all the preceding utility is installed in the system (in this case Windows) driver, which is not always kind. And in this case could previously declared to our utilities work with portable storage, portable hard drives etc. On your system during installation, note the path to the folder where you installed the utility (as shown in the following illustration). After you open this folder, select the file "prolanet.exe" and copy it to portable media on which you want to pre-create the folder with appropriate name, as well as utility after the first launch will create here configuration file "prolanet.ini", and the captured data to be stored somewhere. Run utility to capture traffic you need to the system administrator rights, it is already feature when accessing the Windows sockets. After the first launch utility "silently" will disappear from the screen, it's okay. Launch one more and start scan network. After scanning, enable IP traffic capture by choosing main menu, "Commands->Capture->all packets" or right-click in the window "List of hosts" select "Capture->all IPv4 packets". At the penultimate two pictures you can compare captured IP traffic and saved as PCAP-compatible dump, where each packet is larger than 14 bytes at the expense of Ethernet pseudoheader. Of course, traffic has stayed IP traffic, but in this format can be passed as input to dump more powerful programs, such as Wireshark, which understands incomparably more network packet formats, than a dozen basic formats that are available in our tool.
   Finally, the last picture you can see that the menu in tab "Traffic online" added a new item is "Service name resolution", where you can choose the resolution services names assigned to the proper port according to the "IANA assigned port numbers", where the choice of sub-item "well known ports" will allow the window tab "Packets" the names of the services for first 1024 TCP and UDP ports, and select the sub-item "all ports" - the names of services for all, if they are assigned, 65536 ports. Accordingly, select item "none" disables these features, which, by the way, duplicated in main menu "Options->Sniffer->Service name resolution." Also duplicated here the dump format choice feature - "Options->Sniffer->Autosave packet->as...->PCAP compatible (default)" or "RAW dump".
   More news...