Describe leeching.

What will be an ideal response?

Leeching is using another person's wireless network without that person's permission. It usually accompanies activities such as war driving (to seek out unprotected networks by using sniffer hardware and cruising neighborhoods) and war chalking (markings or symbols stenciled onto a nearby fence, gate, door, wall, or whatever, marking the open Wi-Fi signal).

Computer Science & Information Technology

You might also like to view...

When working with video files, an Adobe Flash media file has a file extension of ________

A) .avi B) .mp3 C) .swf D) .asv

Computer Science & Information Technology

The ____ property determine the way the column widths are sized in the DataGridView control.

A. AutoSizeColumns B. AutoResizeMode C. AutoSizeColumnsMode D. AutoResizeColumns

Computer Science & Information Technology