Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 
 

Are you being sniffed?

Packet sniffing is the hacker’s technology of choice to probe networks. In this video, we explain how you can be watched or ‘sniffed’ and, more importantly, how to protect your network against this security threat.

http://www.youtube.com/watch?v=gbSJT6a0JVo

Comments
Eli Garimund March 22, 20124:43 am

The best point made here is that keeping a hacker from getting on your network is the most important part of protecting yourself, but it shouldn’t be the only point. It’s like making sure your home has a security system and a guard dog. If for some reason the intruder can slip or brute force their way past the first, they have to be prepared to deal with the additional measures.

J. Paul March 22, 201210:05 am

Now, this video is great and really useful, especially for newbies because it explains in a nutshell all the important stuff you need to snow about sniffing. Looking forward to see more of these!

Manolo Von Dertec March 22, 20125:56 pm

Be careful about using the out-of-the-mill anti-sniffing tool (usually these are the ones offered for free or in beta mode). Not all of them are created equal. In fact, some can even do more damage. There are also anti-sniffing tools that can make your web monitoring software crash, and worst corrupted.

Some anti-sniffing tools are too strict with their definition of what is to be monitored or not. This is where it categorically mislabels some web monitoring software as a malicious attack, when it fact it’s just a false positive.

 

Related Videos

 

Mac Malware

on June 27, 2012

In the past, few viruses have targeted Apple operating systems — but this is gradually changing. The increased popularity of Apple smart devices has led some cybercriminals to exploit a traditionally ignored audience. IT admins needs to educate their users …

2

Ten things administrators should never do

on June 6, 2012

Being a system administrator is a great job if you love juggling conflicting priorities, managing infinite to-do lists, annoying users and facing ever-changing technologies. In a busy environment, there are corners you can cut and those you really shouldn’t. There …

2

The Four Main Benefits of Automatic Patch Management

on May 30, 2012

Imagine having fully patched, fully protected computers without the days of planning, hours of downtime and the onerous job of applying them by hand. Imagine a place where you could automate the download and installation of patches across an entire …

3

The Perils of Public Wireless Networks

on April 18, 2012

We access Wi-Fi hotspots both for work and for play — but how much thought do we give security? Are administrators — and their users — fully aware of the risks of surfing openly on a public wireless network? This …

3

Why you Need to run a Vulnerability Assessment

on April 11, 2012

The old saying, “prevention is better than cure”, is as true today as it ever was – and it definitely applies to information security. But to protect against actual and potential network vulnerabilities, you first need to know what they …

1

10 Free Tools for Network Administrators

on March 21, 2012

Are you an administrator who wishes to reduce and facilitate your daily workload? If so, this video’s for you: It contains a list of free software tools that will be of tremendous assistance to the typical SMB (small and medium-size …

3