Solved

Outward data tracing

Posted on 2003-10-25
6
157 Views
Last Modified: 2013-12-04
Hello Members

Please, when by the time of an application installation the program calls me to fill my name and email to send them for online registration, I usually doubt the program will send *just* my name and email. So I ask you if there is some program (better if freeware) which could tell me (better if previously) all the data that will actualy be sent.

Thank you.

rcesar
0
Comment
Question by:rcesar
  • 3
  • 3
6 Comments
 
LVL 13

Expert Comment

by:Gnart
ID: 9621889
You have to capture the IP packages that were send and look at the data going out.  Get Ethereal.  

http://www.ethereal.com

cheers
0
 

Author Comment

by:rcesar
ID: 9668721
Sorry for delaying. I tried to install Ethereal but it has not a normal kind of installation, what turned it too difficult for me.

But after much searching I think I have found a shareware, with normal installation, which seems to be similar to Ethereal. It is Ultra Network Sniffer. So, I would be satisfied if you could confirm it really can do what I'm looking for, at  http://www.gjpsoft.com/UltraNetSniffer/
or suggest some other software (ok if shareware) that can do it instead Ethereal.

Thanks and regards
0
 
LVL 13

Expert Comment

by:Gnart
ID: 9671053
Sorry to hear about your experience with Ethereal.  Ethereal is very well known and probably is the top open source sniffer for both Unix & Windows.  It should have been a normal Windows installation.  You need to install popcap and then Ethereal as the directions stated.

UltraNetSniffer would do what Ethereal do.  You asked for freeware, UltraNetSniffer is not free.  Both will capture outgoing traffic messages for you to look at.  If you are running Sygate firewall, I think it will also capture packets.  My Sygate is not up right now.  I will check it and get back to you.

cheers
0
Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

 

Author Comment

by:rcesar
ID: 9675973
Thanks, Gnart. Having it righ from the firewall would be nice. Being the case, please, tell if I would lose some other significant feature if moving from ZoneAlarm to Sygate.

Waiting for you...
0
 
LVL 13

Accepted Solution

by:
Gnart earned 500 total points
ID: 9676439
I used ZoneAlarm then I heard about Sygate.  I tried Sygate and like it.  I went back to ZoneAlarm now and then just to compare them.  For now my preference is definitely Sygate.  It will capture and display packets for you.  I wouldn't run packet capture all the time as it definite capture a lot of data.  The packet capture will do what you need w/o using a sniffer.

cheers
0
 

Author Comment

by:rcesar
ID: 9706501
It really works, Gnart.
Thank you very much!
Best regards,
rcesar
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

790 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question