equal
deleted
inserted
replaced
37 \end{tabular} |
37 \end{tabular} |
38 \end{center} |
38 \end{center} |
39 |
39 |
40 \end{frame} |
40 \end{frame} |
41 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
41 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
42 |
|
43 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
44 \begin{frame}[c] |
|
45 \frametitle{Topical Slide} |
|
46 |
|
47 \begin{itemize} |
|
48 \item Protocoll attack against Wifi clients |
|
49 |
|
50 \item you can force a client to install choosen keys (000\ldots{}000) |
|
51 |
|
52 \item all Unix-based devices are affected (Windows not so much, since |
|
53 they do not fully implement the Wifi standard) |
|
54 \end{itemize} |
|
55 |
|
56 \end{frame} |
|
57 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
58 |
42 |
59 |
43 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
60 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
44 \begin{frame}[c] |
61 \begin{frame}[c] |
45 \frametitle{Protocols} |
62 \frametitle{Protocols} |
46 |
63 |