it can be used to gather information about your network, describe the countermeasures you can deploy to safeguard against packet sniffers. Packet sniffing which is another predominant Internet security threat. So this is a broadcast style where it uses broadcast UD methods. For example, such as UDP, the network interface called the NIC. By definition reads all packets that are past five, when it's in the promiscuous mode. It can read all unencrypted data. So that password is sent in the clear. For example, like we tell them a NIC card that's been promiscuous mode will pick that up. We'll take a look at this diagram here on Slide 14. We say client be communicating on point A the payloads rather the field headers in the IP package talks about the source as being B the destination being A, and the payload. While client C running and promiscuous smelled won't be able to detect all of that information. So how do we conduct counter measures against this? One countermeasure for packet sniffing is that all of the hosts old computer clients plus the computer network services like servers and routers and switches run software that check periodically, if that host interfaces in the promiscuous mode. So as you can see, that NIC card promiscuous mode is the dangerous element to that. So basically we also have the setup only one host per segment of the broadcast media which is either switched Ethernet at hub. So the diagram once again on the bottom of Page 15 shows the threat and the opportunity for clients C to pick up message traffic between B and A when it's in a promiscuous as well.