Content deleted Content added
{{more citations needed}} |
m bold definitions for redirect articles |
||
Line 5:
==Software==
A '''network enumerator'''
Malicious (or "[[Black hat hacking|black-hat]]") hackers can, on entry of the network, get to security-sensitive information or corrupt the network making it useless. If this network belonged to a company which used this network on a regular basis, the company would lose the function to send information internally to other departments.
|