When your computer is constantly connected to the Internet or to a network, it is vulnerable to attacks and malware infections. In addition to using a powerful and updated antivirus solution, you can also use a network analysis tool to identify the malicious packets and block them. Such an application is Portable Wireshark and it comes with no price tag.
Portable Wireshark features the same functions provided by Wireshark, with the sole difference that it does not need to be installed onto the host computer and does not add any entries to Windows Registry. It can also be run directly from one’s USB flash drive.
Portable Wireshark requires you to have WinPcap installed on your computer in order to function without any issues. If you are using several network cards, Wireshark allows you to choose the one you want to use for capturing the network traffic. Once the capture has begun, you can monitor all the connections and their corresponding details – you also get the chance to create filters so as to track only certain types of connections.
Another way to make sure you correctly monitor the type of packets you want is to apply color schemes for each type of connection, so that the most important ones are the most visible. If you are not satisfied with the color templates provided by Portable Wireshark, you can create your own custom one, by specifying the shade you prefer and the string to be monitored.
Portable Wireshark also comes with a Statistics function that can be used to generate reports to be analyzed at a later time. Depending on your necessities, you can choose to view the details of the protocol hierarchy, endpoint, packet lengths or the IO graph.
Overall, Portable Wireshark can come in handy to all those who want to be in control of their network connections and limit them whenever needed. However, it does take an expert to use the app to its full potential.
What's New in This Release:
The following vulnerabilities have been fixed:
wnpa-sec-2013-54:
· The Bluetooth HCI ACL dissector could crash. Discovered by Laurent Butti. (Bug 8827)
· Versions affected: 1.10.0 to 1.10.1
wnpa-sec-2013-55:
· The NBAP dissector could crash. Discovered by Laurent Butti. (Bug 9005)
· Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9
wnpa-sec-2013-56:
· The ASSA R3 dissector could go into an infinite loop. Discovered by Ben Schmidt. (Bug 9020)
· Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9
wnpa-sec-2013-57:
· The RTPS dissector could overflow a buffer. Discovered by Ben Schmidt. (Bug 9019)
· Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9
wnpa-sec-2013-58:
· The MQ dissector could crash. (Bug 9079)
· Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9
wnpa-sec-2013-59:
· The LDAP dissector could crash. Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9
wnpa-sec-2013-60:
· The Netmon file parser could crash (Bug 8742)
· Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9
· The following bugs h...