Packet Sniffer SDK for Windows (for Borland C compilers) 2.1
( View screenshot )
Packet Sniffer SDK static librariy for Borland C compilers is intended to use for network packets capture and packets generation tasks without using of preinstalled packet drivers. Support Gigabit networks.
Description: Packet Sniffer SDK (PSSDK) is the most powerful component suite for network packet capture in Windows OS family environment.
The main features of the Packet Sniffer SDK library are:
No pre-installed packet drivers are required;
Packet Sniffer SDK works fine on Gigabit networks;
Packet Sniffer SDK supports all modern development environments for Windows;
Packet Sniffer SDK (all its editions: ActiveX, VCL, DLL, and static libraries) is compiled from the same well-optimized C code. Therefore you can be assured that any Packet Sniffer SDK improvement is implemented in all its editions;
All editions of Packet Sniffer SDK components/libraries contain internal packet driver, which is dynamically loaded/unloaded when the application, using Packet Sniffer SDK, is launched/closed.
Currently Packet Sniffer SDK is represented in the following implementations: ActiveX,DLL,VCL, and static libraries for Microsoft VC compatible and Borland compilers.
Therefore, Packet Sniffer SDK component/library family allows you to use the full power of almost any of the modern visual or non-visual development environment for creating various network applications working with raw network adapter traffic.
Using Packet Sniffer SDK the developer does not need to create special network drivers or to learn internal implementation of the network functionalities in all Windows family operating systems.
Main Packet Sniffer SDK elements are developed as objects with properties, methods, and events that make the applications development process simpler and more flexible.
Borland folding C++Builder into Delphi Borland Software in 2005 plans to fold its C++Builder developer tool line into the company’s Delphi IDE tool family for Windows application development, thus answering the question about what the company had planned to do with the technology.
New TCP/IP Flaw Haunts Windows Microsoft issues a prepatch advisory with mitigation guidance after exploit code is published on a popular security Web site.