AET Tracer PRO will track the path the network packets travel from your computer to the abusers. The tracer will resolve IP-addresses and names for the routers along the way.
With the help of advanced algorithms and extensive databases the program will also display other
valuable information for each hop of the trace such as geographical position and ping time.
Once the trace is finished a range of other tools can be used to find out a lot more information
about the abuser. You can use the Whois tool, wich can show you information about the IP
address wich belongs to the abuser. A Whois query displays a lot of information about the owner wich usually
is the ISP (Internet Service Provider). Among other things you will find information such as names, addresses,
phone numbers and e-mail addresses of the people who is responsible for the IP-range. You can also
see what IP-range the specific IP address belongs to.
Another tool wich might come in handy is the Network scanner. The scanner actually consists of five different scanners, each serving it's own purpose. All scanners are controlled from the same graphical interface for ease of use and to give a nice overview of all the scans. Scanning results are displayed in two different ways simultaniously, a tree view with expandable and collapsable nodes and a console displaying plain text output.
The five scanners are:
TCP port scanner, UDP port scanner, NetBIOS scanner, Ping scanner and Name server entries scanner.
AET Tracer PRO's most important tool is probably the "Abuse Reporter". The "Abuse Reporter" will compile and send an abuse report e-mail to the abusers ISP. The reporter can work totally automatic or ask for input and validation for each abuse report.
The last tool, the "Netstat" display, is the only tool that is not used on specific traces, instead it's
made to monitor your own computers network adapters. You can use this tool to find out the IP-address
of any computer connected to you. "Netstat" will show you if there is any "Trojan horses" or remote
administration tools active on your computer. It will also indicate any attempt to hack your computer in
real time at the given moment.
The program also comes equiped with the "Plugin central". This is an open protocol plugin solution, developed to give users and developers the possibility to make their own modules and plug them in to AET Tracer PRO. Anyone can write their own plugins as long as they follow a very simple five rule protocol. AET Tracer is distributed with two plugins, the Editor and the DynoProxy. All plugins can be dynamically loaded and removed to the graphical interface during runtime. The "Plugin central" supports default plugins wich are loaded at program startup.
|