The attack can most effectively be carried out by a person who has administrative control over the network the target is connecting to.

Reply to this note

Please Login to reply.

Discussion

No replies yet.