Date: 04/24/07 (Computer Geeks) Keywords: web so what if someone were to knowingly set up an open wireless access point and have the traffic through that unit logged to a system to create nice neat logs with hostname, ip address and websites visited, as well as instant messages logged? Source: http://community.livejournal.com/computergeeks/1064166.html
|