Compromising the client Laptop, such as by installing a destructive root certification into the program or browser rely on store. CIDR relies on the concept that IP addresses can be allotted and routed based on their own network prefix instead of their class, which was the standard way o Mainly http://XXX