You are right. But to our defense: at this point we are again beyond the passive eavesdropping scenario I think we discussed above.
When you own the networking gear it is more or less game over for the victim anyway, isn't it?
You are right. But to our defense: at this point we are again beyond the passive eavesdropping scenario I think we discussed above.
When you own the networking gear it is more or less game over for the victim anyway, isn't it?