summaryrefslogtreecommitdiffstats
path: root/usr.sbin/wicontrol/wicontrol.8
diff options
context:
space:
mode:
Diffstat (limited to 'usr.sbin/wicontrol/wicontrol.8')
-rw-r--r--usr.sbin/wicontrol/wicontrol.82
1 files changed, 1 insertions, 1 deletions
diff --git a/usr.sbin/wicontrol/wicontrol.8 b/usr.sbin/wicontrol/wicontrol.8
index c300c97..0b80fba 100644
--- a/usr.sbin/wicontrol/wicontrol.8
+++ b/usr.sbin/wicontrol/wicontrol.8
@@ -449,7 +449,7 @@ miles, than one might otherwise expect given a specialized antenna
used in point to point applications.
The attacker can recover the keys from a 128-bit WEP network with only
5,000,000 to 6,000,000 packets.
-While this may sound like a large number of packets, emperical
+While this may sound like a large number of packets, empirical
evidence suggests that this amount of traffic is generated in a few
hours on a partially loaded network.
Once a key has been compromised, the only remedial action is to
OpenPOWER on IntegriCloud