Hackers often set up _________ in areas such as airports where users are expecting to find a free, wireless access point. botnets Trojan horses nodes rogue hotspots