enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Packet analyzer - Wikipedia

    en.wikipedia.org/wiki/Packet_analyzer

    A packet analyzer used for intercepting traffic on wireless networks is known as a wireless analyzer - those designed specifically for Wi-Fi networks are Wi-Fi analyzers. [ a ] While a packet analyzer can also be referred to as a network analyzer or protocol analyzer these terms can also have other meanings.

  3. Sniffer (protocol analyzer) - Wikipedia

    en.wikipedia.org/wiki/Sniffer_(protocol_analyzer)

    The Sniffer [1] was a computer network packet and protocol analyzer developed and first sold in 1986 by Network General Corporation [2] of Mountain View, CA. By 1994 the Sniffer had become the market leader [ 3 ] in high-end protocol analyzers.

  4. Promiscuous mode - Wikipedia

    en.wikipedia.org/wiki/Promiscuous_mode

    In promiscuous mode, some software might send responses to frames even though they were addressed to another machine. However, experienced sniffers can prevent this (e.g., using carefully designed firewall settings). An example is sending a ping (ICMP echo request) with the wrong MAC address but the right IP address.

  5. Comparison of packet analyzers - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_packet_analyzers

    Sniffer: Netscout (formerly Network General) 2013 [11] GUI Proprietary Non-free SteelCentral Transaction Analyzer OPNET Technologies/Riverbed Technology: June 9, 2014 / 17.0.T-PL1 [12] GUI Proprietary: Non-free snoop: Sun Microsystems: December 11, 2006 / Solaris 10 CLI: CDDL: Free tcpdump: The Tcpdump team April 7, 2023 / 4.99.4 [13] CLI: BSD ...

  6. Zenith Cable Modem - Wikipedia

    en.wikipedia.org/wiki/Zenith_Cable_Modem

    Willingness to participate, when called between December 15, 1994, and January 3, 1995; The result was a population of 1/4 of 1% of the homes passed, or 64,000 homes passed for 150 users. At the time two-way communication over this service area was assumed reliable given that two-way Impulse Pay Per View cable boxes were deployed to these same ...

  7. Monitor mode - Wikipedia

    en.wikipedia.org/wiki/Monitor_mode

    Monitor mode can also be used to help design Wi-Fi networks. For a given area and channel, the number of Wi-Fi devices currently being used can be discovered. This helps to create a better Wi-Fi network that reduces interference with other Wi-Fi devices by choosing the least used Wi-Fi channels.

  8. Carnivore (software) - Wikipedia

    en.wikipedia.org/wiki/Carnivore_(software)

    Carnivore, later renamed DCS1000, was a system implemented by the Federal Bureau of Investigation (FBI) that was designed to monitor email and electronic communications. It used a customizable packet sniffer that could monitor all of a target user's Internet traffic.

  9. Wireshark - Wikipedia

    en.wikipedia.org/wiki/Wireshark

    It is also the top-rated packet sniffer in the Insecure.Org network security tools survey [20] and was the SourceForge Project of the Month in August 2010. [21] Combs continues to maintain the overall code of Wireshark and issue releases of new versions of the software. The product website lists more than 2000 contributing authors. [22]