diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/101-wifi.md b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/101-wifi.md index 0566d1066..c9ca14712 100644 --- a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/101-wifi.md +++ b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/101-wifi.md @@ -39,3 +39,5 @@ To protect yourself and your devices, follow these best practices: - **Use a Virtual Private Network (VPN)**: Connect to the internet using a VPN, which provides a secure, encrypted tunnel for data transmission. By understanding the potential security risks associated with WiFi connections and following these best practices, you can enjoy the convenience, flexibility, and mobility of WiFi while ensuring a secure browsing experience. + +- [Wireless Networks - Howstuffworks](https://computer.howstuffworks.com/wireless-network.htm) \ No newline at end of file