1INFORMATION TECHNOLOGY Wardriving Wardriving is referred to the way of searching for Wi-Fi wireless networks by the person moving in a vehicle. This includes usage of smartphone or with the help of laptop. The software for wardriving is available on the internet for free of cost.This includes slowly driving in the area where Wi-Fi signals are located (Lee et al., 2018).This is mainly achieved when two or more people are associated with this networks. The one will be associated with driving the vehicles and the other one will focus on searching the wireless networks. Warflying Warflyingis also sometimes referred to as warstorming. This includes activity that contains components of Wi-Fi equipped computer. That are laptop or a PDA that helps in detecting the networks of Wi-Fi. Warflying shares similarities to Wardriving. Warchalking Warchalkingis the concept of sketching symbols in community places in order to create advertisement of a Wi-Fi network. This was inspired by hobo symbols. Warchalking marks were developed a group of friends in the year 2002 and finally got revealed by Matt Jones (Rahalkar, 2016). Matt jones designed the icons and developed a document that can be downloaded easily containing the similar set of cons. Electronic emanations Electronicemanationisreferredtotheproblemthatariseswiththeuseof electromagnetic items. With the help of electromagnetic shielding, electrically conductive
2INFORMATION TECHNOLOGY materials are placed around other electronic devices (Sapiezynski et al., 2015). This reduces electromagneticemanationsandalsohelpsinreducingsusceptibilitytowardsthe electromagnetic pulses. Each components are related to each other as this all are related to Wi-Fi signals. The way Wi-Fi can be used in day to day life. Wardriving, electronic emanations, warflying and warchalking are related to the technology and effects the network system.
3INFORMATION TECHNOLOGY References Lee, H. S., Choi, D. H., Sim, K., & Yook, J. G. (2018). Information Recovery Using ElectromagneticEmanationsFromDisplayDevicesUnderRealistic Environment.IEEE Transactions on Electromagnetic Compatibility, (99), 1-9. Rahalkar, S. A. (2016). Wireless Hacking. InCertified Ethical Hacker (CEH) Foundation Guide(pp. 143-151). Apress, Berkeley, CA. Sapiezynski, P., Gatej, R., Mislove, A., & Lehmann, S. (2015, October). Opportunities and challengesincrowdsourcedwardriving.InProceedingsofthe2015Internet Measurement Conference(pp. 267-273). ACM.