How can he generate traffic on the network so that he can capture enough packets to crack the WEP key?
Which of the following tools would allow you to detect unauthorized changes or modifications of binary files on your system by unknown malware?