Thanks for this question.
After visiting so many sites I am giving you the most opt one. Its technical in nature basically. I have filtered and would like to present it as follows:
Although network cloaking may add a small sense of security, it is common for people not to realize just how easy it is to discover hidden networks. Because of the various ways an SSID is broadcast, network cloaking is not considered a security measure.
Use encryption, preferably WPA (Wi-Fi Protected Access), or WPA2. Even WEP (Wired Equivalent Privacy), while weak and vulnerable, provides more security than hiding the SSID.
There are many programs that are able to scan for wireless networks, including hidden ones, and display their information such as IP addresses, SSIDs, and encryption types.
These programs are capable of "sniffing" out any wireless networks in range by essentially eavesdropping and analyzing network traffic and packets to gather information about those specific networks.
The reason these programs can sniff out the hidden networks is because when the SSID is transmitted in the various frames, it is displayed in cleartext (unencrypted format), and therefore able to be read by anyone who has found it.
An eavesdropper can passively sniff the wireless traffic on that network undetected (with software like Kismet), and wait for someone to connect, revealing the SSID.
Alternatively, there are faster (albeit detectable) methods where a cracker spoofs a "disassociate frame" as if it came from the wireless bridge, and sends it to one of the clients connected; the client immediately re-connects, revealing the SSID. Some examples of these sniffing programs include the following:
Passive:
KisMAC
Kismet
Prads
ESSID-Jack
Active:
NetStumbler
inSSIDer
The downside of passive scanning is that in order to gather any information, a client already connected to that specific network needs to be generating and therefore providing network traffic to be analyzed.
These programs are then able to discover the cloaked networks and their SSIDs through picking through frames of information such as:
Probe request frames:
Probe request frames are sent unencrypted by the client computer when trying to connect to a network. This unprotected frame of information, which can easily be intercepted and read by someone willing, will contain the SSID.
Probe response frames:
In response to the probe request, the requested station will send back a frame of information also containing the SSID as well as other details about the network.
Association request frames:
An association request frame is what begins the process of initializing a relationship between the computer and the access point. Once associated properly, the AP will be able to assign some of its resources to the network interface controller (NIC). Once again, through this process, the SSID is transmitted.
Re-association request frames:
Re-association request frames are transmitted when a NIC notices a stronger signal from another access point and switches over from the previous one. This new access point will then "take over" and handle the data that may still be caught up in the previous session. The request of a new connection to a new beacon signal will of course require the transmission of a new SSID.
Because of these multiple ways the network name is still being broadcast while the network is "cloaked," its not completely hidden from persistent hackers.
Worse, because a station must probe for a hidden SSID, a fake access point can offer a connection.
Programs that act as fake access points are freely available, and include airbase-ng and Karma.
Conclusion:
Though these are technical in nature, the take point is: It is unsafe to use link cloaking software as it is very very prone to attacks by hackers who can get away with all the information stored. Not only that they can use it to their advantage also without our knowledge.
less