-1
Is a rogue access point simply an additional access point inserted into a network? Is it distinctly different from an access point which is trying to spoof another official access point?
-1
Is a rogue access point simply an additional access point inserted into a network? Is it distinctly different from an access point which is trying to spoof another official access point?
2
Rogue access points are setup by rogues; e.g., they are malicious. Fake access points are not the real access point for whatever reason; e.g., set up by a rogue or by an administrator as a honeypot.
Your question is rather vague and open ended per the [faq]. Is this question based on an actual problem you have? If so, please provide more details. – CharlieRB – 2011-12-30T20:44:05.477
2
Sorry. That sounded harsh. Not saying your question is not worth answering, it just doesn't seem you put much effort into researching yourself. Check this out.
– CharlieRB – 2011-12-30T20:54:15.553