OS / Platform:
Windows XP,
Editors Note
Make use of this handy program for ICF users to monitor the unauthorized logging of hackers into your system. Determine their port number and have your personal information hidden. Include or exclude protocols, TCP flags etc., and maintain your online privacy.