Introduction - If you have any usage issues, please Google them yourself
These programs hope to bypass the TCP/IP protocol stack, directly deal with the underlying network communication data, they require direct access to the underlying network, that no such protocol stack (TCP/IP protocol stack) under the conditions of the entities involved in the network for the original visit.