<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Are you being sniffed?</title>
	<atom:link href="http://www.gfi.com/blog/are-you-being-sniffed/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/are-you-being-sniffed/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=are-you-being-sniffed</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Manolo Von Dertec</title>
		<link>http://www.gfi.com/blog/are-you-being-sniffed/comment-page-1/#comment-31951</link>
		<dc:creator>Manolo Von Dertec</dc:creator>
		<pubDate>Thu, 22 Mar 2012 16:56:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8283#comment-31951</guid>
		<description><![CDATA[Be careful about using the out-of-the-mill anti-sniffing tool (usually these are the ones offered for free or in beta mode). Not all of them are created equal. In fact, some can even do more damage. There are also anti-sniffing tools that can make your web monitoring software crash, and worst corrupted. 

Some anti-sniffing tools are too strict with their definition of what is to be monitored or not. This is where it categorically mislabels some web monitoring software as a malicious attack, when it fact it&#039;s just a false positive.]]></description>
		<content:encoded><![CDATA[<p>Be careful about using the out-of-the-mill anti-sniffing tool (usually these are the ones offered for free or in beta mode). Not all of them are created equal. In fact, some can even do more damage. There are also anti-sniffing tools that can make your web monitoring software crash, and worst corrupted. </p>
<p>Some anti-sniffing tools are too strict with their definition of what is to be monitored or not. This is where it categorically mislabels some web monitoring software as a malicious attack, when it fact it&#8217;s just a false positive.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: J. Paul</title>
		<link>http://www.gfi.com/blog/are-you-being-sniffed/comment-page-1/#comment-31942</link>
		<dc:creator>J. Paul</dc:creator>
		<pubDate>Thu, 22 Mar 2012 09:05:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8283#comment-31942</guid>
		<description><![CDATA[Now, this video is great and really useful, especially for newbies because it explains in a nutshell all the important stuff you need to snow about sniffing. Looking forward to see more of these!]]></description>
		<content:encoded><![CDATA[<p>Now, this video is great and really useful, especially for newbies because it explains in a nutshell all the important stuff you need to snow about sniffing. Looking forward to see more of these!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Eli Garimund</title>
		<link>http://www.gfi.com/blog/are-you-being-sniffed/comment-page-1/#comment-31935</link>
		<dc:creator>Eli Garimund</dc:creator>
		<pubDate>Thu, 22 Mar 2012 03:43:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8283#comment-31935</guid>
		<description><![CDATA[The best point made here is that keeping a hacker from getting on your network is the most important part of protecting yourself, but it shouldn&#039;t be the only point. It&#039;s like making sure your home has a security system and a guard dog. If for some reason the intruder can slip or brute force their way past the first, they have to be prepared to deal with the additional measures.]]></description>
		<content:encoded><![CDATA[<p>The best point made here is that keeping a hacker from getting on your network is the most important part of protecting yourself, but it shouldn&#8217;t be the only point. It&#8217;s like making sure your home has a security system and a guard dog. If for some reason the intruder can slip or brute force their way past the first, they have to be prepared to deal with the additional measures.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 11:12:38 by W3 Total Cache --