It is quite difficult to overcome sniffer attacks. However, the following steps can be taken as countermeasures against such attacks:

* Use encrypted protocols for all communication.
* Segment the network to limit the spread of information.
* Use switches instead of hubs since they switch communications, which means that information is delivered only to the predefined host.
* Use a sniffer detector that checks whether an NIC is in promiscuous mode or not.
* For wireless networks, reduce the range of the network so that it can cover only the necessary surface area.

Explore More

What is a rootkit?

For me, it is the evolution of the Trojan Horse concept. It is, in these days, a complete package of trojanized system utilities, with some interesting add-on programs, like specially

Ur email can be intercepted!

Top 10 Places Your Email Can Be Intercepted The Internet has radically changed the way we communicate with each other. Email is obviouslyan extremely valuable and ubiquitous form of communication,

Whats is NetBIOS?

NetBIOS (Network Basic Input/Output System) was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources. Since its creation, NetBIOS has