Revision as of 11:35, 2 October 2008 editGenetics4good (talk | contribs)Extended confirmed users13,041 editsNo edit summary← Previous edit | Revision as of 14:07, 28 December 2008 edit undoRjwilmsi (talk | contribs)Extended confirmed users, Pending changes reviewers, Rollbackers932,080 editsm gen fixes: (1) add {reflist} above categories/infobox footers, using AWBNext edit → | ||
Line 6: | Line 6: | ||
* Conceilable ] equipped with WiFi-cards and antenna's. Examples are eg handhelds, microcomputers, ... Microcomputers are often cheap, as they can be build DIY (eg ], ], ... ) | * Conceilable ] equipped with WiFi-cards and antenna's. Examples are eg handhelds, microcomputers, ... Microcomputers are often cheap, as they can be build DIY (eg ], ], ... ) | ||
* ]s | * ]s | ||
* ... |
* ... | ||
==References== | |||
{{Reflist}}<!--added above categories/infobox footers by script-assisted edit--> | |||
] | ] |
Revision as of 14:07, 28 December 2008
A rogue system is any system in a wireless network that has been placed by third parties in range of the wireless network in order to gather information about it, penetrate it or other malicious activities.
Common systems
Common rogue systems or devices are:
- Fake AP's
- Conceilable computers equipped with WiFi-cards and antenna's. Examples are eg handhelds, microcomputers, ... Microcomputers are often cheap, as they can be build DIY (eg Arduino, ECB ATmega32/644, ... )
- Trojan horses
- ...