You should be submitted in Blackboard CTEC445\ HW4: See: Due Date in Blackboard
TextBook1: Chapter 4
Are there cases where a network sniffer is a legitimate application to be running?
What operating systems will support a packet sniffing application?
Name four Linux-based packet sniffers.
Name four Windows-based packet sniffers.
What is a good way to keep sniffer technology from discovering your e-mail passwords?
What protocol would you consider for encrypting passwords?
What does a time domain reflectometer do?
What are the components of an average packet sniffer?
What is a MAC address?
What equipment uses a MAC address?
What feature of a NIC on a TCP/IP network does a sniffer exploit?