Problems with Port Explorer Socket Spy - Best viewer for capture.bin? I am packet sniffing a process during a session which is communicating over port 443 (sometimes over port 80) to see if the process is leaking the username and password (and other info) in the clear (plain text), when it should be encrypted. When I open capture.bin with notepad, I am able to search for the specific keywords in the whole session (user and pass) and find that the processs is leaking the info in the clear. But when I manually step through each packet in socket spy (it really needs a session search capability for the spied on process/socket and sorting ability), I cannot find the same leaked username and password. The capture.bin is in a custom format with most of it being gibberish in notepad. When I find the leak in capture.bin, there is no identifying number to match it up with socket spy to help narrow down where and when the leak is coming from. This makes packet sniffing a process and finding where the leak is difficult. Is there a superior viewer for capture.bin (other than notepad) that will show the log in the best way with search capability and some identifying number so I can match the packet up in socket spy? Thank you.