You are here: hacking technology > hacker course > Content
Hot Articles
Recommend Articles
New Articles
Strong encryption L?solutions should preferably be in fiber optic networks(2)
  Add date: 10/21/2010   Publishing date: 10/21/2010   Hits: 26
Total 2 pages, Current page:2, Jump to page:
 

- Splitter or type of attachment or the type of bending of the cable curve, a kleinesdie amount of light emerging from the fiber. A hacker with the right equipment can capture that light photo detector and the data they contain. Ger?te and tools for the application of this method easily train?accessible and h?frequently used by service technicians. - Do not touch sensitive method to perform optical photo detectors are placed around the optical cable. These detectors are used to measure kleinerdie amount of light that naturally radiates from the cable (so-called Rayleigh scattering). Hacker k?information can no k?anxiety further contact with the fiber or even to get even?the same light. - When you analyze a faucet that has been reached, a packet sniffer software that records, monitors and data - can be used to capture all transmitted data. Spectrum of analysis readily available for users of optical multiplexing techniques such as wavelength division multiplexing (WDM) anf?llig to attack. Since it unm?is possible, control of fiber-optic network all the only real L?solution for Pr?Convention for the protection of information is to encrypt the data before it goes over the net. The complete?LinkedIn report is for?public www.IDC.com


 
Other pages: : <<Prev * 1 * 2
Prev:ConvexSoft DJ Audio Mixer Denial of Service Next:U.S. still more spam than any other country relay

Comment:

Category: Home > hacker course