Site home page
(news and notices)

Get alerts when Linktionary is updated

Book updates and addendums

Get info about the Encyclopedia of Networking and Telecommunicatons, 3rd edition (2001)

Download the electronic version of the Encyclopedia of Networking, 2nd edition (1996). It's free!

Contribute to this site

Electronic licensing info



Promiscuous Mode

Related Entries    Web Links    New/Updated Information

Search Linktionary (powered by FreeFind)

Note: Many topics at this site are reduced versions of the text in "The Encyclopedia of Networking and Telecommunications." Search results will not be as extensive as a search of the book's CD-ROM.

A network-connected device operating in promiscuous mode captures all frames on a network, not just frames that are addressed directly to it. A network analyzer operates in this mode to capture network traffic for evaluation and to measure traffic for statistical analysis. A hacker may also use a promiscuous mode device to capture network traffic for unscrupulous activities. Network traffic can be encrypted to protect against such eavesdropping. Refer to "Network Analyzers" for a discussion of how promiscuous mode is applied.

Copyright (c) 2001 Tom Sheldon and Big Sur Multimedia.
All rights reserved under Pan American and International copyright conventions.