1 | Works in Client - Server model; client and server communicate over UDP port 31337; port can be changed |
2 | Server must be installed on the victim machine; trivial to install; does not show up in the task list |
3 | Client runs on hacker's machine |
4 | Very nice GUI; there is also command line interface |