Far more uses/dangers for this in the non-military world as well (bring down security systems or just bring down the system which can be used as a diversion for other miscreant actions). As I introduce in WiFi networking (coming in week 8), it is also possible to interrupt communications between router and hosts causing them to re-login at which point you can set up an evil twin, become an intermediary and capture all communications.
Recent Emergent Topics
Emergent Topics/TagsAI Analytics & BI Android Apple Apps&Software Automobile Big Data Browser Business Clothing Cloud Education Ethics Google Government Green+ Hardware HCI Health I/O Information Systems Internet IoT Jobs Linux Location Microsoft Military Mobile Networking Open Source OS PC Power Privacy Programming Robotics Security Social Computing Storage Technology Virtualization Web Design Wireless WWW
Emergent Topics Archives