Instructions for safe operation

Contents:

Multiple login

Preventing mutual visibility of extensions

Encrypted/unencrypted WLAN connection

WPA Encryption

IP/ARP Spoofing