Pink Glitter

Thursday, November 21, 2013

1. Packet Sniffers

Computer-network administrators use packet sniffers to monitor their networks, perform diagnostic tests, and solve problems.  A packet sniffer is a program that can see all of the information that is being passed through the network that it is connected to.  The program analyzes each packet; the part of a message that has been broken up.  A packet sniffer can be unfiltered, which means that it will analyze all packets.  It can also be filtered, meaning that it will only analyze those packets that contains specific data elements.  Packets with the targeted data are copied onto the hard disk as they pass through the network.  They can then be analyzed carefully for specific information.  Packet sniffers are also able to monitor one's Internet activity, which includes what sites are visited, what is being looked at on the site, who one is sending e-mails to and what those e-mails contain, what is being downloaded from any sites, and what streaming applications are being used.
Packet sniffers are easily available to anyone who would like to use them, as they are completely free.
They can be used to test one's network's security, but it can also be used for hacking.  Hacking has some serious consequences, including fines and being arrested, so this is not recommended.  There a many different packet sniffing programs, but there are a few that are particularly powerful.  One example is Ethereal, which can be used for Unix and Windows.  This programs allows one to examine data from a live network of from a capture file on a disk.  It has a rich filter and it also allows the viewer to go back and view the stream of analysis.  Another example of a good packet sniffer is Analyzer.  This program is still under development, but still has great potential.  It is used in the Win32 environment and can capture all packets that are supported by WinPcap.


References:

http://computer.howstuffworks.com/workplace-surveillance2.htm

http://archive.networknewz.com/2001/0723.html


No comments:

Post a Comment