×

Loading...

wrong, as I see in the post , the guy use protocol analyzer to deal with it, he can see the source user id or password.

Report