Dian:
Don't misunderstand. I work full-time as a systems administrator/programmer, then do my own consulting business as well.
I think that the topic got diluted a little, and that's why I re-quoted the original post above. The onus was that someone (anyone) comes into the building, and without your knowledge, starts a packet sniffer. We weren't talking about a consultant that's in there to troubleshoot, we're talking about someone on YOUR network, without your knowledge, sniffing your network. I hope you see the difference.
If I needed to use a sniffer for whatever reason (or, for example, do a port scan for vulnerabilities), I let my client know that I'm going to be doing that. It's part of my job, and me doing a thorough job of consulting and security testing. *HOWEVER*, if I caught someone running a sniffer on my network that I manage, without my permission, that would be an entirely different story. If I hired a consultant to come in, and he said "Well, the easiest way to troubleshoot your <tech term> is to run a packet sniffer for a little bit and see where the bottleneck is", I would be fine with that.
This post was about *unapproved* sniffers running on your network. It wasn't about consultant bashing; it would never be about that, because I would wager that a high percentage of TT users are, in fact, consultants at one level or another.
Just my 2¢
"In order to start solving a problem, one must first identify its owner." --Me
--Greg