Introduction - If you have any usage issues, please Google them yourself
several hacker procedures source description : a remote host* disk directory and file browser, and download, remote execution. 2* provide three forms of connectivity :* Udp single packet rapid interactive catalog browsing, Udp* TCP packets into reverse connect* Conventional TCP active connector. 3* Screen View-screen or continuous monitoring, since the definition of image quality (1-100), while mouse and keyboard control. 4* Easy search and process management : IP address and port combination with the range of scanning, can be found on the remote host running process, and arbitrary termination of its .5* Deputy control services framework : program structure can be constructed more than 100 computers and multi-node agents, relay the goal of computer transmission of information packe