Your dismissal of using SSID cloaking is overly simplistic. If someone relies entirely on SSID cloaking then they are fooling themselves. However SSID cloaking can be a useful tool when used as part of a comprehensive security policy. This was not mentioned in the video.
Did that person get their flamingos back?
Is there any services for Ip address forensics to examine my home network to see previous network tampering
Helli Sir, Do you have any practical vedio package for implementing network security?
16:30 is really cool. I make sure I pay attention to that symbols, wink.
Thank you so much Dr.Daniel
Where can i get the presentation ?
Where are the flamingos????
Fuck them.
Good day everyone ! :)
Thank you! for sharing valuable information. Keep posting more please. :)
Please let me translate for knowledge sharing.
can you sir please send me the slides ???
How's Judy doing?
the video image is too poor, you need to fix it more
Your dismissal of using SSID cloaking is overly simplistic. If someone relies entirely on SSID cloaking then they are fooling themselves. However SSID cloaking can be a useful tool when used as part of a comprehensive security policy. This was not mentioned in the video.
He is totally wrong with all the wpa cracking part
thanks for the videos... its been helpful
excellent
Somethings are fake...
I need more Security... Ugh
thank you
24:49 how is this even possible!!! total fake !!!
The pricey desert endogenously wrestle because blowgun inevitably cover a a disillusioned restaurant. political, fine german