This document appears to be a presentation on network sniffers. It likely contains information on how sniffers work to monitor network traffic and may discuss how they can be used or misused. The presentation is for session 8 and provides a website for more information on the topic.