Tag Archives: exploit

Active and Passive Network Monitoring

Active and Passive Network Monitoring Active monitoring entails injecting test traffic onto a network and monitoring the flow of that traffic. Passive monitoring is more an observational study. Instead of injecting artificial traffic into a network, passive monitoring entails monitoring traffic that is already on the network (Sullivan, 2013). One popular passive monitoring tool is Wireshark. Wireshark technically… Read More »

Adobe Flash Player Vulnerabilities-Sharp Increase Since 2005

Adobe Flash Player Vulnerabilities Zaharia (2015) states that over 3 million developers use Flash to create interactive content. Flash is primarily used to display text, graphics, and animations for video games and applications, allows audio and video streaming, and it can capture mouse, keyboard, microphone and camera input. Flash is deeply integrated into web browsers and is used… Read More »