top of page

Fifth meeting

  • Writer: fypss154b
    fypss154b
  • Nov 5, 2015
  • 1 min read

Date: 6th Nov 2015

Time: 7:45pm to 11pm

Venue: Skype

Attendees: Jun Jie, Gladys, Li Fang, Derrick

We've discussed that the administrator is able to jam the network, and also bypass it with a secret trapdoor information. Other users who acquires the trapdoor information will be able to avoid the effect of wireless jamming as well. We discussed whether to use network ID or MAC Address and decided to use MAC Address of the Wifi Access Point as it is unique.


 
 
 

Comments


Recent Posts
Archive
bottom of page