The education delivery mechanism is a constantly changing landscape and lately we are seeing more and more of virtual reality-based education and training. And it makes perfect sense. If you can show a third grader the surface of the moon, Saturn’s rings, and Mars’ moon, why would you want them to learn the same thing by reading about it? It’s a faster & better experience, can be interactive, and most importantly it’s a fun way to learn.
Category: Wireless
Wireless Security: Threats, Origins, & Modern Solutions
Wireless security is key to any successful wireless network operation. There are many vulnerabilities that can exploit wireless networks for reconnaissance, compromise, degrade, or disable wireless access all together. Examples include Airsnarf attacks, rogue Access Points, honeypot & honeypotter tools, and Denial-of-Service (DoS) attacks like beacon flood, deauth flood, and some of the recent ones such as KRACK and FRAG attacks. See the Resources section for a detailed list of common attacks & signatures.