The key from one device can be extracted, and can be used to intercept traffic from any other Cyberoam client. Cyberoam has not responded publicly on this matter.

Read More


Copyright 2006-2012 Techie Buzz. All Rights Reserved. Our content may not be reproduced on other websites. Content Delivery by MaxCDN