Possible Duplicate:
Tracking down a rogue access point
Rogue access points can pose a threat, when employees connect to them. What are some techniques that can be used to find these devices, and what actions can be taken against them?
Possible Duplicate:
Tracking down a rogue access point
Rogue access points can pose a threat, when employees connect to them. What are some techniques that can be used to find these devices, and what actions can be taken against them?