By analyzing RAM it is possible to identify all established network connections and open ports which existed at the moment of acquiring RAM as well as local and remote information on such connections. This possibility allows the investigator to analyze the programs which were initiated on the computer itself and which can be a target of malware code that can give false information on the network status. When receiving information directly from RAM, it is much more difficult for the offender to hide his open connections or planted processes. Information on network traffic is among the most important information which can be obtained from the computer that is the subject of investigation and it is more reliable when it comes from RAM analysis or from independent scanning of IP traffic.