<<< Requirements for Network Forensics, cont. | Index | Wireless: No Choke Point >>> |
Data flow in clear text...
...Wi-Fi attacks encrypt all transmissions, hard to understand what the $@*# is going on!..
<<< Requirements for Network Forensics, cont. | Index | Wireless: No Choke Point >>> |