Discussion
In no less than 250 words, describe a hacking tool that is used to gain access to a network. Explain how the tool is used, how it works and how a netwoprk administrator can prevent this tool from access the network.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.