Based on RedHat Linux, users can accurately simulate an enterprise network populated with real servers and workstations on a SINGLE COMPUTER (the system literally runs several real networked operating systems simultaneously inside one computer). It also runs multiple firewalls, gateways, routers, VPNs, or any other network device. Security experts (or hackers) can create a virtual network, populate it with Windows systems and then attack them with the latest exploits. In addition, all packet traffic can be (sniffed) sent to a file or displayed in real time. This provides security experts with detailed information about the nuts and bolts exchanges between networked computers. Thus, software-programming flaws can be identified and exploited. In addition, the system is a outstanding platform to create and test the most twisted of viruses. The kicker is you can build a virus, instantly infect a networked os, and then rapidly see the results. If it doesn't work correctly, within seconds you can restore the infected windows os to a virgin state, modify the virus, and try it again.