Glossary entry (derived from question below)
Nov 2, 2010 01:57
13 yrs ago
Spanish term
escuchas
Spanish to English
Other
Computers: Systems, Networks
Hi all -
I am translating a document into English concerning network protocols and network management software, and what it does, etc.
The context:
Es importante que no puedan realizarse escuchas del tráfico de red que permitan obtener información técnica, contraseñas, datos de negocio, datos personales, etc.
How would this term best be translated into English? (In Word ref someone suggested "it was about wire tapping/telephone bugging" except this has nothing to do with telephones, it has to do with computer networks security being breached.)
I would appreciate anyone kindly sharing their expertise!
Thanks much!
I am translating a document into English concerning network protocols and network management software, and what it does, etc.
The context:
Es importante que no puedan realizarse escuchas del tráfico de red que permitan obtener información técnica, contraseñas, datos de negocio, datos personales, etc.
How would this term best be translated into English? (In Word ref someone suggested "it was about wire tapping/telephone bugging" except this has nothing to do with telephones, it has to do with computer networks security being breached.)
I would appreciate anyone kindly sharing their expertise!
Thanks much!
Proposed translations
(English)
5 +3 | sniffer | Steven Huddleston |
3 +2 | monitor/listen in to | David Hollywood |
4 +1 | eavesdropping/eavesdrop on | Luis Rey Ballesteros (Luiroi) |
4 | tapped into | riafontes |
4 -1 | bugs | eski |
Proposed translations
+3
4 mins
Selected
sniffer
The industry term.
--------------------------------------------------
Note added at 5 mins (2010-11-02 02:03:09 GMT)
--------------------------------------------------
In your context: that no network traffic sniffing is done
--------------------------------------------------
Note added at 5 days (2010-11-07 16:58:50 GMT) Post-grading
--------------------------------------------------
You are welcome! Glad to help.
--------------------------------------------------
Note added at 5 mins (2010-11-02 02:03:09 GMT)
--------------------------------------------------
In your context: that no network traffic sniffing is done
--------------------------------------------------
Note added at 5 days (2010-11-07 16:58:50 GMT) Post-grading
--------------------------------------------------
You are welcome! Glad to help.
Peer comment(s):
agree |
Lydia De Jorge
50 mins
|
¡Gracias, Lydia!
|
|
agree |
Eileen Banks
2 hrs
|
¡Gracias, Eileen!
|
|
agree |
eski
: The better translation; I believe. Saludos, Steve: eski
4 hrs
|
Saludos, Eski, ¡y gracias!
|
4 KudoZ points awarded for this answer.
Comment: "Thanks - the best answer I think and it ended up being confirmed by the client. (It needed an "s" at the end though which I added for the glossary...Thanks again! "
+2
2 mins
monitor/listen in to
couple of ideas ...
Peer comment(s):
agree |
Richard Jenkins
: Yes, David. One 'listens' to network traffic. One can also monitor this traffic too. Good :)
3 mins
|
thanks Richard :)
|
|
agree |
Julio Bereciartu
32 mins
|
-1
3 mins
bugs
Intercepted comunications:
http://www.wordmagicsoft.com/diccionario/en-es/bug.php
--------------------------------------------------
Note added at 5 mins (2010-11-02 02:02:40 GMT)
--------------------------------------------------
31 Aug 2006 ... Monitoring internet communication is nevertheless more ... webmail service would be able to avoid bugging by the authorities in Zimbabwe. ...
news.bbc.co.uk/2/hi/africa/5301146.stm - Cached - Similar
Saludos,
eski
http://www.wordmagicsoft.com/diccionario/en-es/bug.php
--------------------------------------------------
Note added at 5 mins (2010-11-02 02:02:40 GMT)
--------------------------------------------------
31 Aug 2006 ... Monitoring internet communication is nevertheless more ... webmail service would be able to avoid bugging by the authorities in Zimbabwe. ...
news.bbc.co.uk/2/hi/africa/5301146.stm - Cached - Similar
Saludos,
eski
Peer comment(s):
disagree |
Richard Jenkins
: No
2 mins
|
In the Spanish text, Richard."escuchas" is used as a NOUN: Thanks for your comment. eski
|
+1
4 hrs
eavesdropping/eavesdrop on
Eavesdropping means "escuchas"
"To eavesdrop on network traffic" in your specific case. Hope this helps you.
http://www.normes-internet.com/normes.php?rfc=rfc4778&lang=e...
Computer network security: theory and practice - Resultado de la Búsqueda de libros de Google
Jie Wang - 2009 - Computers - 384 páginas
In network communications, the purpose of eavesdropping is to intercept data from network traffic using a networking device and a packet sniffer. ...
books.google.com.mx/books?isbn=7040241625...
[PDF]
MCSE 70-298: Designing Security for a Windows Server 2003 Network ...
Formato de archivo: PDF/Adobe Acrobat
internal user to eavesdrop on network traffic to gain access to information that he should not actually have access to. Moreover, internal users usually do ...
www.computerprep.com/proddesc/SAMPLE.../0619205865.PDF
[PDF]
National Information Assurance Partnership
- [ Traducir esta página ]
Formato de archivo: PDF/Adobe Acrobat - Vista rápida
27 Jul 2010 ... A malicious user could eavesdrop on network traffic to gain unauthorized access to TOE data. Users whether they be malicious or ...
www.niap-ccevs.org/st/st_vid10341-vr.pdf
http://www.ucertify.com/article/what-is-eavesdropping.html
#
What is eavesdropping, is that like hacking?
- [ Traducir esta página ]
Eavesdropping is the intentional interception of data (like e-mail, usernames, passwords, ... It only protects network traffic from eavesdroppers. ...
www.querycat.com/.../c81a5741229816c8e452c0b07b155285 - En caché
#
New Threat: Network Eavesdropping - Security/Perimeter - DarkReading
- [ Traducir esta página ]
1 Aug 2007 ... New Threat: Network Eavesdropping. Smart hackers can execute surprising exploits just by watching your traffic, experts say ...
www.darkreading.com/.../showArticle.jhtml?... - En caché - Similares
#
Wi-Fi Security - Resultado de la Búsqueda de libros de Google
Stewart S. Miller - 2003 - Computers - 309 páginas
Eavesdropping Hackers can easily eavesdrop on your network traffic by monitoring the radio waves transmitted by your access point or wireless router. ...
books.google.com.mx/books?isbn=0071410732...
"To eavesdrop on network traffic" in your specific case. Hope this helps you.
http://www.normes-internet.com/normes.php?rfc=rfc4778&lang=e...
Computer network security: theory and practice - Resultado de la Búsqueda de libros de Google
Jie Wang - 2009 - Computers - 384 páginas
In network communications, the purpose of eavesdropping is to intercept data from network traffic using a networking device and a packet sniffer. ...
books.google.com.mx/books?isbn=7040241625...
[PDF]
MCSE 70-298: Designing Security for a Windows Server 2003 Network ...
Formato de archivo: PDF/Adobe Acrobat
internal user to eavesdrop on network traffic to gain access to information that he should not actually have access to. Moreover, internal users usually do ...
www.computerprep.com/proddesc/SAMPLE.../0619205865.PDF
[PDF]
National Information Assurance Partnership
- [ Traducir esta página ]
Formato de archivo: PDF/Adobe Acrobat - Vista rápida
27 Jul 2010 ... A malicious user could eavesdrop on network traffic to gain unauthorized access to TOE data. Users whether they be malicious or ...
www.niap-ccevs.org/st/st_vid10341-vr.pdf
http://www.ucertify.com/article/what-is-eavesdropping.html
#
What is eavesdropping, is that like hacking?
- [ Traducir esta página ]
Eavesdropping is the intentional interception of data (like e-mail, usernames, passwords, ... It only protects network traffic from eavesdroppers. ...
www.querycat.com/.../c81a5741229816c8e452c0b07b155285 - En caché
#
New Threat: Network Eavesdropping - Security/Perimeter - DarkReading
- [ Traducir esta página ]
1 Aug 2007 ... New Threat: Network Eavesdropping. Smart hackers can execute surprising exploits just by watching your traffic, experts say ...
www.darkreading.com/.../showArticle.jhtml?... - En caché - Similares
#
Wi-Fi Security - Resultado de la Búsqueda de libros de Google
Stewart S. Miller - 2003 - Computers - 309 páginas
Eavesdropping Hackers can easily eavesdrop on your network traffic by monitoring the radio waves transmitted by your access point or wireless router. ...
books.google.com.mx/books?isbn=0071410732...
Peer comment(s):
agree |
Lanna Rustage
: It has te right threatening feel - monitoring to me is what the authorities do
2 hrs
|
Thank you, Lanna! Good description... Saludos
|
10 hrs
tapped into
Esta sería mi opción
Discussion
Sniffers is what I expected (I have a software background, not networking). I had thought of packet sniffing but that seems to be a completely different term according to this blog...