b5media.com

Advertise with us

Enjoying this blog? Check out the rest of the Business Channel

Work Boxers

December 8th, 2007

Uncovering Deliberate Traffic Tampering

A review by Law.com on the EFF’s new traffic interference detection software;

“The new software compares lists of data packets sent and received by two different computers and looks for discrepancies between what one sent and the other actually received. Previously, the process had to be done manually.”

fragmentation_sm.jpg

Reality check? How about the fact that there are a few who are making it more difficult for many. Correct. As in those greedy enough or inconsiderate enough have created the motivation for the ISP’s to need to do something about the level of traffic moving over their pipes through excessive downloading or exchanging extremely large files. Therefore many of us wind up needing this simply to protect our interests because the tools the ISP’s use don’t, unfortunately, discriminate between real people and the pigs who lack a conscience. To quote Law.com: “Some online activities, like peer-to-peer file-sharing, swallow massive amounts of bandwidth and can slow Internet connections for other subscribers.”

Still, forgery isn’t right, morally or ethically, just because it’s called “technology.”

Detecting packet injection: a guide to observing packet spoofing by ISPs

Before you attempt to use this there are requirements to be paid attention to;

Read More

Tags:

By mark -- 0 comments