Rustys,
Thanks or the links. Didn't look 'Tiz the same guy.
For the benefit of others reading this:Radio link:
In he case of Wi-Fi (Wireless) connections, each station is a
transponder and engages in two-way link to establish transmissions. But a hacker can intercept the data and extract sensitive information if the security is weak.
Wired Link:
The Ethernet cable is the media. Anybody reviving the data has to have a real wired connection. If the house, office or warehouse is secure there is no way a hacker can get into the Ethernet without forcing entry into the area.
Now having said that, a real persistent spy will conjure up some way to circumvent these general rules. Even top-secret projects have been compromised by organized attacks on data security. Such methods are beyond the resources of most vandals.
Tools to sniff out data security leaks are sold by major data equipment companies. One such company is Cisco Systoles.
http://www.cisco.com/