Compromising the customer computer, for example by installing a malicious root certification in to the program or browser have confidence in retail outlet. CIDR is based on the concept that IP addresses might be allocated and routed primarily based on their own community prefix as an alternative to their course, http://XXX