Misplaced Pages

Rogue system

Article snapshot taken from[REDACTED] with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

This is an old revision of this page, as edited by John of Reading (talk | contribs) at 16:19, 27 November 2012 (Typo/general fixing, replaced: eg → e.g. (2), added orphan tag using AWB (8686)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Revision as of 16:19, 27 November 2012 by John of Reading (talk | contribs) (Typo/general fixing, replaced: eg → e.g. (2), added orphan tag using AWB (8686))(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)
This article is an orphan, as no other articles link to it. Please introduce links to this page from related articles; try the Find link tool for suggestions. (November 2012)

A rogue system is any system in a wireless network that has been placed by third parties in range of the wireless network in order to gather information about it, penetrate it or other malicious activities.

Common systems

Common rogue systems or devices are:

References

  1. Rogue systems
Categories:
Rogue system Add topic