You are chatting with your friends and transferred pictures by using a popular application (which uses ftp and http, a faked scenario). However, someone intercept your traffic by sniffing the communication signals and dumped into a few log files
Lab Instruction
Quiz
Disk Image Files
Disk Image Files2