P-663HN-51 Support Notes
Ethernet are based on capturing the first part of the connection session, where
the data would typically include the username and password. An intruder can
masquerade as that user by using this captured information. An intruder who
monitors the wireless network can apply this same attack principle on the
wireless.
35
All contents copyright © 2009 ZyXEL Communications Corporation.