In part one of these series I talked about how you can very easily capture mobile traffic using Fiddler.
In this second part, I will talk about how you can actually tamper with the traffic you send and receive to and from your mobile device.
Please note that tampering with traffic is not just limited to mobile traffic!