Misplaced Pages

Rogue system: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 11:35, 2 October 2008 editGenetics4good (talk | contribs)Extended confirmed users13,041 editsNo edit summary← Previous edit Revision as of 11:35, 2 October 2008 edit undoGenetics4good (talk | contribs)Extended confirmed users13,041 editsNo edit summaryNext edit →
Line 1: Line 1:
A rogue system is any system in a ] that has been placed by third parties in range of the wireless network in order to gather information about it, penetrate it or other malicious activities. <ref></ref> A '''rogue system''' is any system in a ] that has been placed by third parties in range of the wireless network in order to gather information about it, penetrate it or other malicious activities. <ref></ref>


==Common systems== ==Common systems==

Revision as of 11:35, 2 October 2008

A rogue system is any system in a wireless network that has been placed by third parties in range of the wireless network in order to gather information about it, penetrate it or other malicious activities.

Common systems

Common rogue systems or devices are:

  1. Rogue systems
Categories: