Completion requirements
Recall that you learned about the perils of unencrypted wireless connections in a previous section. Watch this video to learn how a hacker can use a sniffer to intercept unencrypted traffic.
Source: IowaCyber, https://www.youtube.com/watch?v=0_SxSYyEvos This work is licensed under a Creative Commons Attribution 3.0 License.
Last modified: Wednesday, 7 August 2024, 2:02 PM