Describe leeching.
What will be an ideal response?
Leeching is using another person's wireless network without that person's permission. It usually accompanies activities such as war driving (to seek out unprotected networks by using sniffer hardware and cruising neighborhoods) and war chalking (markings or symbols stenciled onto a nearby fence, gate, door, wall, or whatever, marking the open Wi-Fi signal).
Computer Science & Information Technology
You might also like to view...
When working with video files, an Adobe Flash media file has a file extension of ________
A) .avi B) .mp3 C) .swf D) .asv
Computer Science & Information Technology
The ____ property determine the way the column widths are sized in the DataGridView control.
A. AutoSizeColumns B. AutoResizeMode C. AutoSizeColumnsMode D. AutoResizeColumns
Computer Science & Information Technology