This preview shows page 1. Sign up to view the full content.
Unformatted text preview: monitoring the network. You could check how vulnerable your machines are by packet sniffing them. Activity 3 You can find the origin of a spoofed email often by checking the history included in the email and tracing all the hops it has taken back to the original place it was sent from. If the history is not included in the email or you cannot see it. Check the ASCII file as it has the original email in it. Activity 4 Encryption in a chat is used for privacy. If one were to chat unencrypted on a network or the Internet anyone with the technology to scan the network could read that individuals conversation....
View Full Document
- Spring '07