In combination with automated discovery of other network sources (see DHCP and Zeroconf) This might quite possibly lead wireless end users to ship sensitive information to the incorrect middle-guy when trying to find a location (see person-in-the-middle assault). As an example, a user could inadvertently use an unsecure network to http://riveryocrf.collectblogs.com/17992858/the-single-best-strategy-to-use-for-full-form-of-wifi-in-hindi