Mirrored Ports and Keystroke Loggers

So you're encrypting your network traffic, but is that enough to stop the snoops? Maybe not.

If you're using document encryption tools such as PGP, or encrypted mail services such as Hushmail, then those might be easily defeated using keystroke loggers. And if you're moving your data through various switches -- any of which that might support mirrored ports -- then how do you know someone isn't capturing every bit of your network traffic?

Check out this story over at CNet and when they talk about catching criminals swap the roles in your mind -- consider that criminals might be doing this to catch YOU !

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.