OT: unathorized network user.

John Summerfield debian at herakles.homelinux.org
Thu Jan 24 23:15:39 UTC 2008


Dave Ihnat wrote:
> On Thu, Jan 24, 2008 at 12:34:29PM -0500, Jacques B. wrote:
>> My frustration has to do with the fact that someone asked a question
>> on how to secure a wireless connection.  I provided advice of measures
>> available within the context of a typical home wireless router.  And
>> my reference to low hanging fruit and such and the caveat of the kid
>> next door who has all the time in the world to bang away at your
>> system (vs someone driving by) made it obvious that it's not a 100%
>> guaranteed secure solution.
>>
>> In comes Tim stating that most of what I said was "useless".
> 
> FWIW, I agree with you.  A good analogy is a bank--just because they

and for one I generally agree with Tim; Jacques' advice isn't as good as 
he thought.

If you want to test Jacques' advice, just fire up kismet. You will find 
wireless networks, whether they're hidden or not, you will find MAC 
addresses and IP addresses.

And since kismet is a passive sniffer, nobody will know you're doing it 
(Netstumbler, another tool, is an active snooper and anyone watching 
will see it).




-- 

Cheers
John

-- spambait
1aaaaaaa at coco.merseine.nu  Z1aaaaaaa at coco.merseine.nu
-- Advice
http://webfoot.com/advice/email.top.php
http://www.catb.org/~esr/faqs/smart-questions.html
http://support.microsoft.com/kb/555375

You cannot reply off-list:-)




More information about the fedora-list mailing list