0 / 60 seg.

Which type of application can intercept sensative information such as passwords on a network segment?