From owner-freebsd-questions Wed Oct 6 1: 0:41 1999 Delivered-To: freebsd-questions@freebsd.org Received: from fw.wintelcom.net (ns1.wintelcom.net [209.1.153.20]) by hub.freebsd.org (Postfix) with ESMTP id 333EB15019 for ; Wed, 6 Oct 1999 00:59:25 -0700 (PDT) (envelope-from bright@wintelcom.net) Received: from localhost (bright@localhost) by fw.wintelcom.net (8.9.3/8.9.3) with ESMTP id BAA08777; Wed, 6 Oct 1999 01:18:13 -0700 (PDT) Date: Wed, 6 Oct 1999 01:18:13 -0700 (PDT) From: Alfred Perlstein To: Jeffrey Bernt Cc: freebsd-questions@FreeBSD.ORG Subject: Re: Sniffer info... In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Tue, 5 Oct 1999, Jeffrey Bernt wrote: > Hello. > Quick question. I run a few computers on a network at college, and was > wondering if there is any way to protect against a password sniffer? I ran > the sniff program in the ports collection and was surprised what information > I could collect =) What are my options to protect myself as well as the data > I send and recieve? > Any clues to this puzzle would be awesome. check out /usr/ports/security, in particular ssh, secure shell, it allows encrypted log on without your password being sent over in plain-text. -Alfred To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message