dcsimg

The Secrets of Snoop


Download the authoritative guide: Data Center Guide: Optimizing Your Data Center Strategy

Download the authoritative guide: Cloud Computing: Using the Cloud for Competitive Advantage

Sniffers have exploded in popularity over the past several years, from Network General?s Netxray and Microsoft?s Network Monitor, to public domain tools such as Etherman and Curry Sniffer. These tools are used for various reasons, including network tr oubleshooting, traffic analysis, node discovery, etc. We will be covering one of the most common, yet effective sniffers, snoop. Of all the sniffers, this is one standby you always have access to with Solaris. The purpose of this article is to demonstrate how to leverage snoop, with examples focusing on network security. Sniffers have exploded in popularity over the past several years, from Network General?s Netxray and Microsoft?s Network Monitor, to public domain tools such as Etherman and Curry Sniffer. These tools are used for various reasons, including network tr oubleshooting, traffic analysis, node discovery, etc. We will be covering one of the most common, yet effective sniffers, snoop. Of all the sniffers, this is one standby you always have access to with Solaris. The purpose of this article is to demonstrate how to leverage snoop, with examples focusing on network security.

This article was originally published on Jan 13, 2001
Page 1 of 1

Thanks for your registration, follow us on our social networks to keep up-to-date