<span>To move a file, you use the mv command along with the source file name and destination name</span>
just to ensure people, its desaturate (kinda like saturation)
Answer:
Man-in-the-middle attack
Explanation:
In this type of attack, the hacker uses the virus or malware to get and change his IP address and hostname to match the address and hostname of the target host computer. The allows the hacker to gain access to information sent to the target IP address first.