This method applies to any device on your network where you can change the values of the network proxy. I sought out this information with the intent to learn how secure are some of the the mobile applications I had been using day to day were. And when I’m sick with a head-cold the mind […]