It is technically possible for someone to set up what is known as a "sniffer" on a network. This is a program which looks at the content of the packets on the network as they float by. Generally, this is done to try and discover a user's password, which is often transmitted in plain text by many programs. Such a sniffer could be located anywhere on the path between you and our server.
When you connect to our server with your web browser to use the web version of the Account Manager
or to view your web logs analysis, your browser transmits your password in plain text, so it can be
easily "sniffed".
For this reason, we recommend that when connecting to the web version of the account manager or
when you view your log analysis reports, you do so via an SSH tunnel. With SSH, your entire
connection (including your password) is encrypted, making it impossible to sniff your password.
For further information on setting up an SSH tunnel, please
click here for more details.
Alternatively, you can access the web site via SSL. There is a link to a secure version of the Account Manager on the home page, and to view your log reports via SSL, you can type the following URL into your browser:
https://www.twistedbits.net/~usercode/wwwlogs/reports
(Obviously, change "usercode" to your own actual usercode. The squiggly looking thing in front of usercode is a tilde, and it is usually located to the left of the "1" key on your keyboard.)