> Don't rely on WEP to make your connection or data private, it only takes
> a few hours of packet sniffing to crack the WEP key with publicly
> available software (google for 'AirSnort'), it doesn't even require much
> computer know-how to drive. Even trying to secure by limiting the MAC
> addresses that can 'associate with' (connect to) the router or Access
> Point (AP) is insecure as the MAC address can be overwritten by software
> in most cases...
I wasn't aware of this. Very interesting.
>
> The only way to be really, REALLY secure is to treat the RF network as a
> 'hostile' network. Use of VPN's from the clients (with 'strong'
> authentication) to a firewall between the AP, any wired network, & the
> Internet (& blocking all other traffic) is the best way... All that
> said, however, if they want in, they will eventually get in. you need to
> try & make it too hard for them- thus keeping out the 'script-kiddies'-
> the most likely persons to be doing this.
>
A good firewall including authentication is probably the best way here. I
like your idea of dialing down the signal strength too.
Have there been any documented cases of spammers using techniques such as
this?
Daniel Tan
The olympus mailinglist olympus@xxxxxxxxxx
To unsubscribe: mailto:olympus-request@xxxxxxxxxx?subject=unsubscribe
To contact the list admins: mailto:olympusadmin@xxxxxxxxxx?subject="Olympus
List Problem"
|