Evil Twin Strategy designing a spoof WiFi hot spot with the intent of intercepting sensitive data

 

 

http://www.math.dartmouth.edu/~doyle/docs/twin/twin/twin.html

 

 

 


http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci1052455,00.html

 

http://www.cnn.com/2005/TECH/internet/01/20/evil.twins/index.html