Misplaced Pages

Rogue system: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 14:07, 28 December 2008 editRjwilmsi (talk | contribs)Extended confirmed users, Pending changes reviewers, Rollbackers932,080 editsm gen fixes: (1) add {reflist} above categories/infobox footers, using AWB← Previous edit Revision as of 09:06, 1 November 2009 edit undoHebrides (talk | contribs)Autopatrolled, Extended confirmed users, Pending changes reviewers105,219 editsm clean up, Replaced: be build → be built, using AWBNext edit →
Line 1: Line 1:
A '''rogue system''' is any system in a ] that has been placed by third parties in range of the wireless network in order to gather information about it, penetrate it or other malicious activities. <ref></ref> A '''rogue system''' is any system in a ] that has been placed by third parties in range of the wireless network in order to gather information about it, penetrate it or other malicious activities.<ref></ref>


==Common systems== ==Common systems==
Common rogue systems or devices are: Common rogue systems or devices are:
* ]'s * ]'s
* Conceilable ] equipped with WiFi-cards and antenna's. Examples are eg handhelds, microcomputers, ... Microcomputers are often cheap, as they can be build DIY (eg ], ], ... ) * Conceilable ] equipped with WiFi-cards and antenna's. Examples are eg handhelds, microcomputers, ... Microcomputers are often cheap, as they can be built DIY (eg ], ], ... )
* ]s * ]s
* ... * ...
Line 11: Line 11:
{{Reflist}}<!--added above categories/infobox footers by script-assisted edit--> {{Reflist}}<!--added above categories/infobox footers by script-assisted edit-->


{{DEFAULTSORT:Rogue System}}
] ]
] ]

Revision as of 09:06, 1 November 2009

A rogue system is any system in a wireless network that has been placed by third parties in range of the wireless network in order to gather information about it, penetrate it or other malicious activities.

Common systems

Common rogue systems or devices are:

References

  1. Rogue systems
Categories: