For example, this summer, British police arrested war driver
Gregory Straszkiewicz for illegally accessing a wireless connection.
The demonstration takes viewers through a step-by-step explanation of a hacker's activities, explaining how war drivers
find wireless networks, gather information about them, and eventually infiltrate them in order to gain access to personal identity and company confidential information.
While these security risks can take many forms, such as viruses, worms, hackers, or war drivers
, security vendors are targeting the low-end business and consumer markets with easy to use software, and plug-and-play hardware to secure the most novice computer user.