Warning
if you intend to experiment with these tools on a corporate network, we strongly advise you to seek the cooperation of your local IT and Network Administration staff. All the of tools described in this article are capable of performing actions that will set off network intrusion detection systems. All of the tools described in this article are capable of performing actions that will likely violate company policies. At some companies, unauthorized possession of these tools behind the company firewall is grounds for immediate termination.The link for this article located at Search Software is no longer available.