enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Wireshark - Wikipedia

    en.wikipedia.org/wiki/Wireshark

    Wireshark is very similar to tcpdump, but has a graphical front-end and integrated sorting and filtering options.. Wireshark lets the user put network interface controllers into promiscuous mode (if supported by the network interface controller), so they can see all the traffic visible on that interface including unicast traffic not sent to that network interface controller's MAC address.

  3. Network traffic measurement - Wikipedia

    en.wikipedia.org/wiki/Network_traffic_measurement

    Network performance could be measured using either active or passive techniques. Active techniques (e.g. Iperf) are more intrusive but are arguably more accurate. Passive techniques have less network overhead and hence can run in the background to be used to trigger network management actions.

  4. ngrep - Wikipedia

    en.wikipedia.org/wiki/Ngrep

    ngrep (network grep) is a network packet analyzer written by Jordan Ritter.It has a command-line interface, and relies upon the pcap library and the GNU regex library.. ngrep supports Berkeley Packet Filter logic to select network sources or destinations or protocols, and also allows matching patterns or regular expressions in the data payload of packets using GNU grep syntax, showing packet ...

  5. Promiscuous mode - Wikipedia

    en.wikipedia.org/wiki/Promiscuous_mode

    Promiscuous mode is often used to diagnose network connectivity issues. There are programs that make use of this feature to show the user all the data being transferred over the network. Some protocols like FTP and Telnet transfer data and passwords in clear text, without encryption, and network scanners can see this data.

  6. Packet analyzer - Wikipedia

    en.wikipedia.org/wiki/Packet_analyzer

    Troubleshoot performance problems by monitoring network data from an application; Serve as the primary data source for day-to-day network monitoring and management; Spy on other network users and collect sensitive information such as login details or users cookies (depending on any content encryption methods that may be in use)

  7. Protocol analyzer - Wikipedia

    en.wikipedia.org/wiki/Protocol_analyzer

    A protocol analyzer is a tool (hardware or software) used to capture and analyze signals and data traffic over a communication channel.Such a channel varies from a local computer bus to a satellite link, that provides a means of communication using a standard communication protocol (networked or point-to-point).

  8. pcap - Wikipedia

    en.wikipedia.org/wiki/Pcap

    Scapy, a packet manipulation tool for computer networks, written in Python by Philippe Biondi. Snort, a network-intrusion-detection system. Suricata, a network intrusion prevention and analysis platform. Symantec Data Loss Prevention, Used to monitor and identify sensitive data, track its use, and location. Data loss policies allow sensitive ...

  9. tcpdump - Wikipedia

    en.wikipedia.org/wiki/Tcpdump

    tcpdump is a data-network packet analyzer computer program that runs under a command line interface. It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. [3] Distributed under the BSD license, [4] tcpdump is free software.