I'd be more scared of the hacker that can bypass wep, than the average joe without wep.
The hacker knows how to exploit your wep-decrypted network traffic, the average joe doesn't even if it were plain-text data.
I'd be more scared of the hacker that can bypass wep, than the average joe without wep.
The hacker knows how to exploit your wep-decrypted network traffic, the average joe doesn't even if it were plain-text data.