Figure 3 describes the use case diagram of DroidGlance. DroidGlance provides user with
several feature which are Ping, Traceroute, Topology Generator, Port Scanning, Vulnerability
Checking, Report Saving, Open Report, Listen and References. Listen is an additional feature
to spoof a network. With Listen feature, a user can capture cookies from insecure connected
host. Therefore, further actionscan be taken to prevent those insecure connection. It can be
beneficial to guard devices in the network from accessing any critical or restricted area. Some
of these features are arranged in a Wizard so that user can use data from an operation to
perform the next operation.
Figure 3 describes the use case diagram of DroidGlance. DroidGlance provides user with
several feature which are Ping, Traceroute, Topology Generator, Port Scanning, Vulnerability
Checking, Report Saving, Open Report, Listen and References. Listen is an additional feature
to spoof a network. With Listen feature, a user can capture cookies from insecure connected
host. Therefore, further actionscan be taken to prevent those insecure connection. It can be
beneficial to guard devices in the network from accessing any critical or restricted area. Some
of these features are arranged in a Wizard so that user can use data from an operation to
perform the next operation.
การแปล กรุณารอสักครู่..
