The development of the legend of king Arthur spans more than one thousand years. From the briefest mentions of a valiant warrior that fended off the Anglo-Saxon invasions of the island, to the elaborate in depth legend of a man destined to rule England with his knights of the round table. The development of this legend is a fascinating insight to how history was written, and more interestingly not written, and who ended up writing the version that stood the test of time. History is often written…
While ubiquitous Internet access is extremely convenient and enables marvelous new applications for mobile users, it also creates a major security vulnerability—by placing a passive receiver in the vicinity of the wireless transmitter, that receiver can obtain a copy of every packet that is transmitted! These packets can contain all kinds of sensitive information, including passwords, social security numbers, trade secrets, and private personal messages. A passive receiver that records a copy of…