dc.contributor.author | LACHI, Arina | |
dc.date.accessioned | 2021-09-10T09:31:40Z | |
dc.date.available | 2021-09-10T09:31:40Z | |
dc.date.issued | 2014 | |
dc.identifier.citation | LACHI, Arina. Network analysis. In: Conferinţa Tehnico-ştiinţifică a Colaboratorilor, Doctoranzilor şi Studenţilor, Universitatea Tehnică a Moldovei, 15-23 noiembrie, 2013. Chişinău, 2014, vol. 1, pp. 46-49. ISBN 978-9975-45-310-3. ISBN 978-9975-45-311-0 (Vol.1). | en_US |
dc.identifier.isbn | 978-9975-45-310-3 | |
dc.identifier.uri | http://repository.utm.md/handle/5014/16963 | |
dc.description.abstract | Packet sniffer’s, are protocol analyzers meant to capture the packets that are seen by a machine’s network interface. When a sniffer runs on a system, it grabs all the packets that come into and goes out of the Network Interface Card (NIC) of the machine on which the sniffer is installed. This means that, if the NIC is set to the promiscuous mode, then it will receive all the packets sent to the network if that network is connected by a hub. Fortunately, in a switched network, since switches do not broadcast the packets, sniffers cannot see any packet that is not having the destination address of the machine on which it is installed. A network analyzer can be a standalone hardware device with specialized software, or software that is installed on a desktop or laptop computer. Network analyzer is a tool, and like all tools, it can be used for both good and bad purposes. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Tehnica UTM | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | network analyzer | en_US |
dc.subject | sniffer | en_US |
dc.subject | traffic | en_US |
dc.subject | promiscuous mode | en_US |
dc.subject | VPN | en_US |
dc.title | Network analysis | en_US |
dc.type | Article | en_US |
The following license files are associated with this item: