Content deleted Content added
{{more citations needed}} |
m Reverted edit by 2C0F:FE38:2321:636:D55A:BD71:BE4E:BB44 (talk) to last version by Discospinster |
||
(4 intermediate revisions by 4 users not shown) | |||
Line 5:
==Software==
A '''network enumerator'''
Malicious (or "[[Black hat hacking|black-hat]]") hackers can, on entry of the network, get to security-sensitive information or corrupt the network making it useless. If this network belonged to a company which used this network on a regular basis, the company would lose the function to send information internally to other departments.
|