Example No. 3
"The wireless attacks
we saw—jamming, de-
(customer PDA)
authentication, denial-of-service, MAC spoofing, fake and
soft APs—were to be expected, particularly at a hacker
conference. We were more surprised to find that an
abundance of Bluetooth devices, microwave ovens,
802.11 frequency-hopping devices and Web cameras
were more effective at knocking out the conference's
wireless network
(customer PDA).
bestwritingserviceusaz.xyz