Chapter 2 WLAN and its Inherent Insecurities