It is quite difficult to overcome sniffer attacks. However, the following steps can be taken as countermeasures against such attacks:

* Use encrypted protocols for all communication.
* Segment the network to limit the spread of information.
* Use switches instead of hubs since they switch communications, which means that information is delivered only to the predefined host.
* Use a sniffer detector that checks whether an NIC is in promiscuous mode or not.
* For wireless networks, reduce the range of the network so that it can cover only the necessary surface area.

Explore More

What is a stealth virus?

A stealth virus is a file virus. It infects the computer and then hides itself from detection by antivirus software. It uses various mechanisms to avoid detection by antivirus software.

Sony Rootkits your computer

SONY ROOTKITS SYSTEMS when you put a CD in to play it, a prospect that is both disturbing and scary at the same time. If you thought the record companies

Critical persistent xss vulnerabilities at IPAY : Myanmar Online payment Official Site

This evening, I found a fascinated  big bill board “IPAY” http://www.ipay.com.mm at Thamine Junction, Yangon, Myanmar. Then, I said my friend “googl3group” about it, and said  “NO XSS, NO SQL