00:00 - Xframe is fired up. 00:09 - Safari is fired up. 00:17 - Safari directed to the Xframe product page. Xframe sniffs the traffic. 00:26 - Xframe's seven panels and the main window put in the foreground. 00:34 - Safari closed. 00:40 - Double-clicking to see the frame's actual data dump. 00:48 - Xfile opened to access the Xframe log. 00:50 - Rixstep opened to view the Xframe log. 00:54 - Scrolling through the Xframe log with Rixedit. 01:17 - Xframe's sniffing paused, dump window dismissed. 01:24 - Spike opened for further experiments with Xframe. 01:27 - Spike will perform a 'GET' on the Apple website, Xframe again capturing the traffic. 01:45 - Tests of accessing apple.com without 'www', trailing slash, and 'host' field. 01:52 - 'Host' field filled in; new access attempt at www.apple.com. 01:54 - Access successful. Xframe still recording. 02:10 - 'GET' at radsoft.net without trailing slash. Xframe capturing packets. 02:26 - Trailing slash added, apple 'host' field removed. Access successful. 02:34 - Ping attempted at radsoft.net. Xframe still sniffing. 02:41 - Port scan of radsoft.net. Xframe still sniffing. 02:50 - Block scan of radsoft.net's IP range begun. Xframe still sniffing. 03:04 - Block scan halted. Xframe still sniffing. 03:08 - Double click displays dump of Xframe packet in dedicated window. 03:14 - Double click displays dump of Xframe packet in dedicated window. 03:19 - Double click displays dump of Xframe packet in dedicated window. 03:26 - UDP window put in foreground, row in UDP window selected. 03:29 - Checking the Xframe menu - capture must be halted to synchronise the Xframe views. 03:31 - Xframe capture halted. 03:34 - 'Sync' selected from menu. Corresponding records in all windows are highlighted simultaneously. 03:45 - Frame dump displayed from main window. 03:54 - Frame dump displayed from UDP window. 04:02 - Frame dump displayed from UDP window.