VisualSniffer 2.0
free powerful Sniffer
Screen Shots
Useful links
"100% CLEAN" Softpedia award
Download VisualSniffer 2.0
Download Source Code
License of Open Source
Help us

VisualSniffer is free. If you think it is valuable and wish to express your appreciation for the time and resources we expended developing it over the years, we do accept and appreciate monetary donations. You can make check to BVTech Inc, and mail it to: 770 Locks Way, Martinez, GA30907, USA

You can also order Amazon books via this site. Your support will keep VisualSniffer alive and powerful.

To keep up with the latest release or help us to improve our products, please sign our guestbook.

VisualSniffer is a powerful packet capture tool and protocol analyzer (ip sniffer or packet sniffer) for Windows system. VisualSniffer can be used by LAN administrators, and security professionals for network monitoring, intrusion detection, and network traffic logging. It can also be used by network programmers for checking what the developing program has sent and received, or others to get a full picture of the network traffic. For example, parents may want to know what kids are doing online. If you stored important data in your PC, you may need to detect whether your data is sending out by some "Adware" or "Spyware". If you are a student, you may want to know how your network is working and the mechanism of each network protocol. VisualSniffer is free software, available with full source code under the terms of the BSD License.
Screen Shot
Screen Shot of VisualSniff

Recommended Books on Network Monitoring More Books...

Key Features More about VisualSniffer...

  • Analyzing network traffic based on user defined rule set (Snort Rule) in real-time.
  • Saving and loading of the whole captured traffic for later reference.
  • Automatically saving data on a hard disk so as to monitor traffic for a long period.
  • Saving captured packets into a log file with format of "libpcap", it can also load data from a "libpcap" file.
  • Searching packets based on criteria including IP address, protocol, content, size, time, etc. in a whole captured traffic.
  • Filtering to receive only subsets of the network traffic.
  • Displaying captured packets based on their source and destination addresses and connections. Users can define workspaces so as to monitor various packets based on criteria including IP address, protocol, content, size, time, etc.
  • Graphical and statistical displays with colored charts.
  • Schedule regular capture tasks
  • Decode an variety of network protocol.

  • Articles on internet More articles...

    2/5/2006, How Really Power Surges Destroy Your Computer and How to Avoid by Dicky Satrio Sudiro - Power surge are one of the most feared incident on electronic devices. Same as computer, they are really susceptible to power surges. Even though surges usually last only milliseconds (and are somewhat filtered by the transformer in the power supply), that high voltage can exceed the withstand voltage of the insulating layers inside the integrated circuit chips and burned everything inside your computer. The power delivered to your electronics devices and computer is stable and constant, in theory of course.
    2/2/2006, Why Most People Pay Double for Laser Toner Cartridges by Larry Andrew - If you own a laser printer, you already know the most expensive part of ownership is purchasing laser toner cartridges. A normal laser printer has a life expectancy of five years. However, many laser printers will last longer than five years.
    1/22/2006, The Task Of VoIP Security by Mark Woodcock - Voice over Internet protocol (VOIP) is not a new phenomenon. It has been around the business community for many years. But it's increasing popularity among average citizens looking for more affordable and technology-driven options in long distance telephone service is becoming quite the phenomenon. As with any "new" technology on the forefront, often the excitement of getting the product out and available to the public precludes any real consideration for issues such as security flaws. And the consumers often don't consider such problems until it is too late, like when they have fallen victim to a hacker. Just as traditional telephone systems are vulnerable to breaches in security, VOIP has its own, more complex security issues.
    1/19/2006, Cleaning and Organizing Your Computer by Jeff - It is a good idea to think of your PC as an office. It stores files, programs, pictures. This can be compared to an actual office's files, machines and decorations. The operating system is the boss. With this image in mind, think of an office you've visited that was slow and inefficient. There were probably many different reasons for the inefficiency. This is the same with a computer. There can be many items that slow down your computer. Perhaps the one most commonly overlooked is disorganization and clutter.

    About us | Home | Partner Links
    Tell a friend:
    Welcome to We provide high-quality free software for our users. To keep up with the latest release or help us to improve our products, please sign our guestbook.

    Copyright 2005 BVTech, Inc. All Rights Reserved