Mirrored Ports and Keystroke Loggers

So you're encrypting your network traffic, but is that enough to stop the snoops?

ITPro Today

July 10, 2007

1 Min Read
ITPro Today logo in a gray background | ITPro Today

So you're encrypting your network traffic, but is that enough to stop the snoops? Maybe not.

If you're using document encryption tools such as PGP, or encrypted mail services such as Hushmail, then those might be easily defeated using keystroke loggers. And if you're moving your data through various switches -- any of which that might support mirrored ports -- then how do you know someone isn't capturing every bit of your network traffic?

Check out this story over at CNet and when they talk about catching criminals swap the roles in your mind -- consider that criminals might be doing this to catch YOU !

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like