摘要 |
<p>Methods, apparatus and program products which monitor wireless access points through which data can be exchanged with a network, identify an unauthorized access point, and respond to monitored data flow in a variety of manners including determining the location of the identified unauthorized access point, astablishing filtering, and controlling accounting for access services.</p> |